Ask a Question

CYB 120 ENTIRE COURSE

Sale price $50.00 Regular price

CYB 120 ENTIRE COURSE
 
 
WEEK  1

CYB 120 Week 1 Individual Assignment Mitigation and Deterrent Techniques

 

Instructions: Complete the following exercises in Practice Lab "CUS-EH - Ethical Hacker: Mitigation and Deterrent Techniques":   

  • Exercise 1 - "Disabling Unnecessary Services"
  • Exercise 2 - "Protecting Management Interfaces and Applications"
  • Exercise 3 - "Renaming Unnecessary Accounts" Capture screenshots for each task while completing each exercise. Paste your screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab and explain how you are defending your network. Submit your assignment using the Assignment Files tab.

 

 


WEEK  2

 

CYB 120 Week 2 Individual Assignment Network Vulnerabilities

 

Instructions: Complete the following exercises in Practice Lab "SY0-401 - CompTIA Security+: Network Vulnerabilities":   

  • Exercise 1 - "Network Footprinting"
  • Exercise 2 - "Packet Sniffing"
  • Exercise 3 - "MitM with ARP Spoofing"
  • Exercise 4 - "Denial of Service" Capture screenshots for each task while completing each exercise. Paste your screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab and explain how each step in the lab added to the security of the network. Submit your assignment using the Assignment Files tab.

 

 

CYB 120 Week 2 Individual Assignment Challenges for Fixing Vulnerabilities

 

Instructions: Review the "Challenges for Fixing Vulnerabilities" activity. Create a table comparing ten of the vulnerabilities, threats, and risks for the real world security incident discussed by the class, along with related vulnerabilities that may have contributed to the security incident. Include the following as at least 3 of the comparisons used in the table.   

  • How was the vulnerability detected?
  • What protocol was attacked?
  • How steps were taken to resolve the vulnerability? Write a 175- to 350-word narrative explaining trends shown from the table. Submit your assignment using the Assignment Files tab.

 

WEEK  3

 CYB 120 Week 3 Individual Assignment Threats – Trojans and Malware Protection


Instructions: Complete the following exercises in Practice Labs "SY0-401 - CompTIA Security+: Threats - Trojans and Malware Protection":   

  • Exercise 1 - "Activating a Trojan"
  • Exercise 2 - "Testing Network Services with netcat"
  • Exercise 3 - "Deploying Malware Protection" Capture screenshots for each task while completing each exercise. Paste your screenshots in a Word document. Submit your assignment using the Assignment Files tab.

 

 

WEEK  4

 CYB 120 Week 4 Individual Assignment Controls, Protocols, and Threats

 

Instructions: You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs. Create an 8- to 10-slide multimedia rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Include the following in your presentation:   

  • What do they protect against?
  • What is their purpose? Write a 1- to 2-page analysis of your findings answering the following questions.
  • How are they implemented to defend against attacks and to limit risk?
  • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
  • What controls and protocols would you find in a security policy? Submit your assignment using the Assignment Files tab.

 

WEEK  5

 CYB 120 Week 5 Individual Assignment Compliance – User Rights and Permissions


Instructions: Complete the following exercises in Practice Lab "SY0-401 - CompTIA Security+: Compliance - User Rights and Permissions":   

  • Exercise 1 - "Managing File System Security Using Permissions"
  • Exercise 2 - "Understanding System Auditing"
  • Exercise 3 - "Ensure Network Policies and Procedures" Capture screenshots for each task while completing each exercise. Paste your screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab. Explain how each step in the lab added to the security of the network. Submit your assignment using the Assignment Files tab.

Questions & Answers

Have a Question?

Be the first to ask a question about this.

Ask a Question