Imanietyler
On this page, you find all documents, package deals, and flashcards offered by seller imanietyler.
- 21
- 0
- 1
Community
- Followers
- Following
22 items
![](/docpics/6441202c9bdf1_2628498.jpg)
Need inspiration
Complete the Module Five Lab Worksheet, which is linked in the Lab Worksheet assignment in Module Five of your course. In the worksheet, you will respond to prompts related to these labs:
- Package deal
- Other
- • 2 pages •
Complete the Module Five Lab Worksheet, which is linked in the Lab Worksheet assignment in Module Five of your course. In the worksheet, you will respond to prompts related to these labs:
![](/docpics/64411f3652958_2628478.jpg)
Need inspiration
One of the projects for this course is the creation of a network segmentation strategy in which you will create host-based and network-based firewall policies in a provided network and explain how the network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security...
- Other
- • 4 pages •
One of the projects for this course is the creation of a network segmentation strategy in which you will create host-based and network-based firewall policies in a provided network and explain how the network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security...
![](/docpics/64411d9861809_2628453.jpg)
Need inspiration
For this project (due in Module Seven), you will be writing an evaluation of network protection technologies to your manager. This evaluation requires you to assess multiple technology options by weighing criteria associated with cost and effectiveness and then recommending a solution that satisfies the given requirements. In addition, your recommendation should be guided by a fundamental security design principle you select as a basis for your recommendation.
- Other
- • 3 pages •
For this project (due in Module Seven), you will be writing an evaluation of network protection technologies to your manager. This evaluation requires you to assess multiple technology options by weighing criteria associated with cost and effectiveness and then recommending a solution that satisfies the given requirements. In addition, your recommendation should be guided by a fundamental security design principle you select as a basis for your recommendation.
![](/docpics/64411bea1c384_2628313.jpg)
Fill in the blank
Explore the fundamental principles and practices of application security. Identify common software vulnerabilities and develop strategies to reduce their potential impact. Analyze and assess the security posture of multi-tiered web applications.
- Other
- • 4 pages •
Explore the fundamental principles and practices of application security. Identify common software vulnerabilities and develop strategies to reduce their potential impact. Analyze and assess the security posture of multi-tiered web applications.
![](/docpics/6441254c69cf5_2628610.jpg)
Need inspiration
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
- Other
- • 4 pages •
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
![](/docpics/644124630c15e_2628599.jpg)
Need inspiration
Using this course's cyber playbook, submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning.
- Other
- • 2 pages •
Using this course's cyber playbook, submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning.
![](/docpics/6441241dd5883_2628593.jpg)
Need inspiration
A security analyst’s responsibility in the software development life cycle (SDLC) is not to write code, but to interface with programmers. Secure programming is not necessarily in the skill set of many programmers. Therefore, it is your job as a security analyst to help identify areas of concern.
- Other
- • 11 pages •
A security analyst’s responsibility in the software development life cycle (SDLC) is not to write code, but to interface with programmers. Secure programming is not necessarily in the skill set of many programmers. Therefore, it is your job as a security analyst to help identify areas of concern.
![](/docpics/644123728e0b8_2628580.jpg)
Needs inspiration
Using this course's cyber playbook, submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning.
- Package deal
- Other
- • 2 pages •
Using this course's cyber playbook, submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning.
![](/docpics/64411feb01c27_2628488.jpg)
Need inspiration
As a security analyst, you are tasked with creating a concept brief for your system administrator. This task includes creating multiple accounts, configuring network settings, and modifying group policies. To help you complete this task, your instructor will provide you with a scenario containing network configuration settings and group policy changes that you will need to implement. Additionally, you will be asked to describe the benefits and drawbacks of virtualization technology
- Other
- • 7 pages •
As a security analyst, you are tasked with creating a concept brief for your system administrator. This task includes creating multiple accounts, configuring network settings, and modifying group policies. To help you complete this task, your instructor will provide you with a scenario containing network configuration settings and group policy changes that you will need to implement. Additionally, you will be asked to describe the benefits and drawbacks of virtualization technology
![](/docpics/64411e48274d1_2628463.jpg)
Need inspiration
GNS3 is a software package that provides a platform to virtualize network configurations. Like Packet Tracer, this tool allows you to create a sandbox area where network configurations can be tested and honed to the specifications needed. In addition to the network configuration options that GNS3 provides, it also allows you to access the virtual machine behind the appliance in the GNS3 environment. This assignment gives you the opportunity to explore the basic options in GNS3. It would be in yo...
- Other
- • 2 pages •
GNS3 is a software package that provides a platform to virtualize network configurations. Like Packet Tracer, this tool allows you to create a sandbox area where network configurations can be tested and honed to the specifications needed. In addition to the network configuration options that GNS3 provides, it also allows you to access the virtual machine behind the appliance in the GNS3 environment. This assignment gives you the opportunity to explore the basic options in GNS3. It would be in yo...