CYB 205 Entire Course


View larger image
 

CYB 205 Entire Course


Price: $50.00
Status: Product will be sent by Email within 1 hour after successful payment
Quantity:

Please leave this field blank.

Add to Wish List (Log in first.)

CYB 205 Entire Course

˙

CYB 205 week 1 Discussion Question: Asset Management

Asset management is an important part of information security. Without knowing what assets you have, you cannot begin to secure them. But what is an asset?

Discuss˙the various types of assets a company might have, how they might be inventoried, and the potential threats to the various assets.

˙

CYB 205 week 1 Discussion Question: Vulnerabilities

Vulnerabilities can exist in both a business? software and hardware.

Discuss˙the differences between software and hardware vulnerabilities. How might these vulnerabilities impact a business?

˙

CYB 205 week 2 Discussion Question: Threats to Data and Systems


Threats to data cannot be fully evaluated without knowing where information resides. A decade ago, all information was stored on servers in secure data centers accessible only on a company?s network. Today, datacenters could be on the premises or in the cloud and the data might be accessible from anywhere.

Research˙threats to modern information systems.

Share˙two different threats specific to data or to the systems hosting it. Discuss the threats in your classmates? posts.

˙

CYB 205 week 2 Discussion Question: Examples of Threats


Today?s datacenters are populated with not only physical hardware but systems hosting virtual machines and containers. These systems communicate locally and around the globe over networks.

Discuss˙two different examples of threats to various parts of heterogeneous architectures and how they might manifest. Do not forget about the hardware, operating systems, applications, networks, and other integral parts. Discuss the threats in your classmates? posts.
˙

CYB 205 week 3 Discussion Question: Cryptography

Cryptography has been around for millennia. Modern digital crypto systems are more robust than ever before.

Explain˙cryptography. Discusshow a modern encryption system is used to protect data and data use.

˙

CYB 205 week 3 Discussion Question: Malware


Malware is an all-encompassing term for code which might perform malicious or unwanted functions on your system. It could include viruses, Trojans, worms, ransomware, rootkits, bots, and even adware.

Discuss˙potential defenses against malware. What is your experience with malware?
˙

CYB 205 week 4 Discussion Question: Policies


Policies are a critical backbone to any information security program.

Research˙and˙discuss˙some of the elements necessary in modern information security policies for both on-premise systems and cloud-based services.

Respond˙to the policies presented by your classmates.
˙

CYB 205 week 4 Discussion Question: Controls


Controls are countermeasures used to treat risks. Within the categories of administrative or technical controls, there can be preventative, detective, and responsive types of controls.

Research˙a specific control, and˙discuss˙how it differs from the other technical controls.

Example: An appropriate use policy could be an administrative preventative control.



CYB 205 week 5 Discussion Question: Cloud BC/DRP
˙

Cloud-based systems and services are often ideal options for critical parts of a Business Continuity (BC) or Disaster Recovery Plan (DRP).

Research˙some of the ways this is being done today.

Discuss˙how cloud-based systems support business continuity.˙ How can potential risks be transferred to cloud providers?

Note: This information can be applied to the Week Five Individual Assignment, ?Business Continuity and the Cloud.?

˙

CYB 205 week 5 Discussion Question: Cloud-Based Risks


While the cloud-based systems and services are often ideal options for business continuity, these systems also come with risks.

Research˙some of the risks associated with a particular use of cloud services.

Discuss˙the differences between the IT risks faced by cloud-based services and a local datacenter.

Note: This information can be applied to the Week Five Individual Assignment, ?Business Continuity and the Cloud.?

CYB 205 Entire Course

Write a Review of CYB 205 Entire Course