SlideShare a Scribd company logo
1 of 2
Assignment 2: mister network engineer
Assignment 2: Mister Network EngineerUsing the network diagram below, your task is to
incorporate the devices on the lower right into the diagram to create a secure corporate
network. The devices you need to incorporate into the network diagram include: Web
server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based),
Web proxy, intrusion detection system (IDS), and authentication server. DIAGRAM is ALSO
Attached at the end….Note: All client-based / server-based devices work where a client is
installed on a workstation, which has bidirectional communication with a corresponding
server. Write a four to five (4-5) page paper in which you:1. Determine which devices you
will use for both the current network diagram infrastructure consisting of firewalls, routers,
and workstations as well as the device you need to incorporate. Include the following for
each:1. Make or vendor’s name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com,
etc.)2. Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)3. IP address assigned
to all devices2. Establish the configuration for each device in which you:1. Research
each of the devices you chose and provide a basic configuration you would use in your
network. 2. Use IP addresses to describe your configuration.3. Explain the impact that
each of your configurations has on the security of the entire network.4. Highlight at least
five (5) security features for each device, including devices in network diagram.3. Using
Microsoft Visio or its open source alternative to create a final network diagram that
incorporates all devices into the existing network and ensures the following:1. VPN
sessions (from laptop) are only allowed to access the desktops in the IT department by IT
department employees. 2. All VPN connections from the Internet cloud into the corporate
network terminate at the VPN server. 3. Users from Engineering and Finance and
Accounting CANNOT communicate.4. Vulnerability scans occur daily in which all desktops
are scanned at least once per day.4. Use at least three (3) quality resources in this
assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your
assignment must follow these formatting requirements:· Be typed, double spaced, using
Times New Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your professor for any
additional instructions.· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.· Include charts
or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts
must be imported into the Word document before the paper is submitted.The specific
course learning outcomes associated with this assignment are:· Design a secure
network to address a business problem.· Use technology and information resources to
research issues in network security design.· Write clearly and concisely about Advanced
Network Security Design topics using proper writing mechanics and technical style
conventions.

More Related Content

Similar to Assignment mister network engineer.docx

1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
TatianaMajor22
 
Term Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxTerm Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
mehek4
 
Oftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxOftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docx
carlibradley31429
 
This term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lThis term paper involves putting together the various concepts l
This term paper involves putting together the various concepts l
rochellwa9f
 
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxWeek 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
sheronlewthwaite
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docx
divinapavey
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
manningchassidy
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
reposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxreposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docx
laurieellan
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
wkyra78
 

Similar to Assignment mister network engineer.docx (20)

1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Term Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxTerm Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)
 
Oftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxOftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docx
 
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
 
This term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lThis term paper involves putting together the various concepts l
This term paper involves putting together the various concepts l
 
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxWeek 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
CIS 293 Effective Communication/tutorialrank.com
 CIS 293 Effective Communication/tutorialrank.com CIS 293 Effective Communication/tutorialrank.com
CIS 293 Effective Communication/tutorialrank.com
 
This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docx
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
reposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxreposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Mini Project- Virtual Network Project
Mini Project- Virtual Network ProjectMini Project- Virtual Network Project
Mini Project- Virtual Network Project
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 

More from studywriters

inventor who is currently living in Northeast Ohio and answer.docx
inventor who is currently living in Northeast Ohio and answer.docxinventor who is currently living in Northeast Ohio and answer.docx
inventor who is currently living in Northeast Ohio and answer.docx
studywriters
 
Health care organizations strive to create a culture of.docx
Health care organizations strive to create a culture of.docxHealth care organizations strive to create a culture of.docx
Health care organizations strive to create a culture of.docx
studywriters
 
Health care has become to depend on information technology.docx
Health care has become to depend on information technology.docxHealth care has become to depend on information technology.docx
Health care has become to depend on information technology.docx
studywriters
 
Health care facilities treat many types of For.docx
Health care facilities treat many types of For.docxHealth care facilities treat many types of For.docx
Health care facilities treat many types of For.docx
studywriters
 
he brain changes as we Explain the changes in.docx
he brain changes as we Explain the changes in.docxhe brain changes as we Explain the changes in.docx
he brain changes as we Explain the changes in.docx
studywriters
 
Hawksbill sea turtle Conservation Management.docx
Hawksbill sea turtle Conservation Management.docxHawksbill sea turtle Conservation Management.docx
Hawksbill sea turtle Conservation Management.docx
studywriters
 
Is social media more beneficial or more harmful to our.docx
Is social media more beneficial or more harmful to our.docxIs social media more beneficial or more harmful to our.docx
Is social media more beneficial or more harmful to our.docx
studywriters
 
Having more clarity about helps one become a better.docx
Having more clarity about helps one become a better.docxHaving more clarity about helps one become a better.docx
Having more clarity about helps one become a better.docx
studywriters
 
Is Price gouging criminal or is it the free market.docx
Is Price gouging criminal or is it the free market.docxIs Price gouging criminal or is it the free market.docx
Is Price gouging criminal or is it the free market.docx
studywriters
 

More from studywriters (20)

inventor who is currently living in Northeast Ohio and answer.docx
inventor who is currently living in Northeast Ohio and answer.docxinventor who is currently living in Northeast Ohio and answer.docx
inventor who is currently living in Northeast Ohio and answer.docx
 
Health care organizations strive to create a culture of.docx
Health care organizations strive to create a culture of.docxHealth care organizations strive to create a culture of.docx
Health care organizations strive to create a culture of.docx
 
Health care has become to depend on information technology.docx
Health care has become to depend on information technology.docxHealth care has become to depend on information technology.docx
Health care has become to depend on information technology.docx
 
Health care facilities treat many types of For.docx
Health care facilities treat many types of For.docxHealth care facilities treat many types of For.docx
Health care facilities treat many types of For.docx
 
Health Belief Model.docx
Health Belief Model.docxHealth Belief Model.docx
Health Belief Model.docx
 
Health assessment.docx
Health assessment.docxHealth assessment.docx
Health assessment.docx
 
Health and Professional Ethics.docx
Health and Professional Ethics.docxHealth and Professional Ethics.docx
Health and Professional Ethics.docx
 
Health and Advocacy.docx
Health and Advocacy.docxHealth and Advocacy.docx
Health and Advocacy.docx
 
he brain changes as we Explain the changes in.docx
he brain changes as we Explain the changes in.docxhe brain changes as we Explain the changes in.docx
he brain changes as we Explain the changes in.docx
 
HCR 210 Week 1 DQs.docx
HCR 210 Week 1 DQs.docxHCR 210 Week 1 DQs.docx
HCR 210 Week 1 DQs.docx
 
HCS 131 Course Presentation.docx
HCS 131 Course Presentation.docxHCS 131 Course Presentation.docx
HCS 131 Course Presentation.docx
 
Hawksbill sea turtle Conservation Management.docx
Hawksbill sea turtle Conservation Management.docxHawksbill sea turtle Conservation Management.docx
Hawksbill sea turtle Conservation Management.docx
 
Is social media more beneficial or more harmful to our.docx
Is social media more beneficial or more harmful to our.docxIs social media more beneficial or more harmful to our.docx
Is social media more beneficial or more harmful to our.docx
 
Is relevant to Teslas.docx
Is relevant to Teslas.docxIs relevant to Teslas.docx
Is relevant to Teslas.docx
 
Having more clarity about helps one become a better.docx
Having more clarity about helps one become a better.docxHaving more clarity about helps one become a better.docx
Having more clarity about helps one become a better.docx
 
Is prostitution morally Should we legalize.docx
Is prostitution morally Should we legalize.docxIs prostitution morally Should we legalize.docx
Is prostitution morally Should we legalize.docx
 
Is Moral Anger.docx
Is Moral Anger.docxIs Moral Anger.docx
Is Moral Anger.docx
 
Is Price gouging criminal or is it the free market.docx
Is Price gouging criminal or is it the free market.docxIs Price gouging criminal or is it the free market.docx
Is Price gouging criminal or is it the free market.docx
 
is never total and never The Social.docx
is never total and never The Social.docxis never total and never The Social.docx
is never total and never The Social.docx
 
is medicine and doctors need to prescribe.docx
is medicine and doctors need to prescribe.docxis medicine and doctors need to prescribe.docx
is medicine and doctors need to prescribe.docx
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 

Assignment mister network engineer.docx

  • 1. Assignment 2: mister network engineer Assignment 2: Mister Network EngineerUsing the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server. DIAGRAM is ALSO Attached at the end….Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server. Write a four to five (4-5) page paper in which you:1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:1. Make or vendor’s name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)2. Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)3. IP address assigned to all devices2. Establish the configuration for each device in which you:1. Research each of the devices you chose and provide a basic configuration you would use in your network. 2. Use IP addresses to describe your configuration.3. Explain the impact that each of your configurations has on the security of the entire network.4. Highlight at least five (5) security features for each device, including devices in network diagram.3. Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following:1. VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees. 2. All VPN connections from the Internet cloud into the corporate network terminate at the VPN server. 3. Users from Engineering and Finance and Accounting CANNOT communicate.4. Vulnerability scans occur daily in which all desktops are scanned at least once per day.4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.· Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.The specific
  • 2. course learning outcomes associated with this assignment are:· Design a secure network to address a business problem.· Use technology and information resources to research issues in network security design.· Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.