2. **************************************************
CYB 140 Week 1 Individual Assignment
Individual: Security Control Evaluation
For more classes visit
www.snaptutorial.com
CYB 140 Week 1 Individual Assignment Individual: Security Control
Evaluation
Instructions: Read "Safeguarding the Ultra-Dense Networks with the
Aid of Physical Layer Security: A Review and a Case Study" by Ying
Wang. Write a 2- to 3-page analysis of the case study in which you
examine the security controls that were compromised, determine what
could have been done to prevent the compromise, and compile a list of
future security controls that will need to be put in place to prevent other
attacks. Submit your assignment using the Assignment Files tab.
3. **************************************************
CYB 140 Week 2 Individual Assignment
Individual: Application Data – Establish Host
Security
For more classes visit
www.snaptutorial.com
CYB 140 Week 2 Individual Assignment Individual: Application Data –
Establish Host Security
Instructions: Complete the following exercise from Practice Lab "SY0-
401 CompTIA Security+: Application Data - Establish Host Security":
4. Exercise 1 - "Anti-Virus Programs" Capture screenshots for each task
while completing the exercise. Paste screenshots in a Word document.
Submit your screenshots using the Assignment Files tab.
**************************************************
CYB 140 Week 2 Individual Assignment
Individual: Install OS Updates and Configure
Security Policy
For more classes visit
www.snaptutorial.com
CYB 140 Week 2 Individual Assignment Individual: Install OS Updates
and Configure Security Policy
5. Instructions: Complete the following exercises from Practice Lab "N10-
006-CompTIA Network+: Install OS Updates and Configure Security
Policy":
Exercise 1 - "Configure and Run Windows Update"
Exercise 2 - "Configure Network Security Policy" Capture screenshots
for each task while completing the exercise. Paste screenshots in a Word
document. Submit your screenshots using the Assignment Files tab.
**************************************************
CYB 140 Week 2 Learning Team Assignment
Individual: Monitoring Servers
For more classes visit
www.snaptutorial.com
CYB 140 Week 2 Learning Team Assignment Individual: Monitoring
Servers
6. Instructions: Complete the following exercises from Practice Lab "CS0-
001CompTIA Cybersecurity Analyst (CSA+) - Monitoring Servers":
Exercise 1 - "Data Collector Sets"
Exercise 2 - "Configuring Alerts for Data Collector Sets"
Exercise 3 - "Configure Event Subscription" Capture screenshots for
each task while completing the exercise. Paste screenshots in a Word
document. Submit your screenshots using the Assignment Files tab.
**************************************************
CYB 140 Week 3 Individual Assignment
Individual: Firewall Configuration
For more classes visit
www.snaptutorial.com
7. CYB 140 Week 3 Individual Assignment Individual: Firewall
Configuration
Instructions: Complete the following exercises from Practice Lab "SY0-
401 CompTIA Security+: Network Security - Firewall Rule Based
Management":
Exercise 1 - "Configuring Firewall Rules Using Windows Firewall"
Exercise 2 - "Configuring Firewall Rules Using Windows Firewall with
Advanced Security"
Exercise 3 - "Configuring Firewall Rules Using Remote Desktop"
Exercise 4 - "Configuring Firewall Rules from the Command Line
Interface" Capture screenshots for each task while completing each
exercise. Paste screenshots in a Word document. Write a 1- to 2-page
reflection on the purpose and results of the lab, examining how the
security posture changed, and how exposure has been mitigated or
limited from free public information. Submit your screenshots and
reflection using the Assignment Files tab.
**************************************************
8. CYB 140 Week 4 Individual Assignment
Individual: IDS vs. IPS
For more classes visit
www.snaptutorial.com
CYB 140 Week 4 Individual Assignment Individual: IDS vs. IPS
Instructions: Research IDS and IPS. Create a table comparing IDS and
IPS, including types, placement, and features. Create a 6- to 8-slide
PowerPoint® presentation to the CIO of a company in which you
analyze and justify which IDS and IPS types would be most useful to
them and how an IDS uses rules and signatures to identify potentially
harmful traffic. Submit your assignment using the Assignment Files tab.
**************************************************
9. CYB 140 Week 4 Individual Assignment
Individual: Network Fundamentals:
Understanding IPSec
For more classes visit
www.snaptutorial.com
CYB 140 Week 4 Individual Assignment Individual: Network
Fundamentals: Understanding IPSec
Instructions: Complete the following exercise from Practice Lab "N10-
006 - CompTIA Network+: Understanding How IPSec Works":
Exercise 1 - "Internet Protocol Security - IPSec" Capture screenshots
for each task while completing the exercise. Paste screenshots in a Word
document. Write a 1- to 2-page reflection on the purpose and results of
the lab, issues you had and how you overcame them, and explain how
network monitoring ties into IDS/IPS configuration. Submit your
screenshots and reflection using the Assignment Files tab.
10. **************************************************
CYB 140 Week 4 Individual Assignment
Individual: Understanding IDS Firewall
Evasion and Honeypots
For more classes visit
www.snaptutorial.com
CYB 140 Week 4 Individual Assignment Individual: Understanding IDS
Firewall Evasion and Honeypots
Instructions: Complete the following exercise from Practice Lab "SY0-
401 CompTIA Security+: Understanding IDS Firewall Evasion and
Honeypots":
Exercise 1 - "Install and Configure ZoneAlarm Firewall"
11. Exercise 2 - "Install and Configure Snort""
Exercise 3 - "Using Anonymous Proxy Sites" Capture screenshots for
each task while completing the exercise. Paste screenshots in a Word
document. Submit your screenshots using the Assignment Files tab.
**************************************************
CYB 140 Week 5 Individual Assignment
Individual: VPN Configuration Plan
For more classes visit
www.snaptutorial.com
CYB 140 Week 5 Individual Assignment Individual: VPN Configuration
Plan
Instructions: Review the "Real-World Security Incident" activity and
incorporate your findings in this assignment. Research vulnerabilities
12. that may have contributed to security incidents with respect to VPN/SSL
as discussed in Weeks Three and Five. Create a table comparing the
vulnerabilities, threats, and risks for the real world security incident
discussed by the class, along with related vulnerabilities that may have
contributed to the security incident. Create a 4- to 6-slide multimedia
rich PowerPoint® presentation that you will present to a group of CIOs,
displaying the vulnerabilities, threats, and risks from least significance
to greatest significance and how each would negatively impact the
company. Submit your assignment using the Assignment Files tab.
**************************************************