Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Ok, I understand!
Your school or university
Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Here are the best resources to pass CMGT 230 FUNDAMENTALS OF SSCP (CMGT230). Find CMGT 230 FUNDAMENTALS OF SSCP (CMGT230) study guides, notes, assignments, and much more.
All
8 results
Sort by
Week 3 Individual Business Continuity and Disaster Recovery
Other • 12
pages
• 2019
The public university that has hired you as a security consultant does not have in place effective means to handle incidents associated with risks and does not have an effective plan in place for business continuity or disaster recovery.

Create a 14- to 16-slide PowerPoint® presentation with presentation notes to members of the university executive team addressing the following areas:

Elements involved in effective handling of security incidents
Rationale for a Business Continuity Plan, what ...
Week 3 Individual Business Continuity and Disaster Recovery
Last document update:
ago
The public university that has hired you as a security consultant does not have in place effective means to handle incidents associated with risks and does not have an effective plan in place for business continuity or disaster recovery.

Create a 14- to 16-slide PowerPoint® presentation with presentation notes to members of the university executive team addressing the following areas:

Elements involved in effective handling of security incidents
Rationale for a Business Continuity Plan, what ...
Week 4 Individual Networking and Wireless Security
Other • 4
pages
• 2019
As part of a consulting agreement for a public library system, you are tasked with advising the organization on risks associated with both wired and wireless networks in the public facilities managed by the agency.

Write a 1- to 2-page briefing report with recommendations for the agency. Detail the particular risks faced by exposing the network to public access and the recommended actions or measures needed to help decrease risks. Include the following key topics:

Physical network security
Log...
Week 4 Individual Networking and Wireless Security
Last document update:
ago
As part of a consulting agreement for a public library system, you are tasked with advising the organization on risks associated with both wired and wireless networks in the public facilities managed by the agency.

Write a 1- to 2-page briefing report with recommendations for the agency. Detail the particular risks faced by exposing the network to public access and the recommended actions or measures needed to help decrease risks. Include the following key topics:

Physical network security
Log...
You have been hired to consult on access controls for a public health care provider, which provides medical services to a surrounding lower- to lower-middle-class community.

Information about clients of this health care provider include Personally Identifiable Information (PII) and Protected Health Information (PHI), which is governed by the federal Health Insurance Portability and Accountability Act (HIPAA) regulation.

Write a 1- to 2-page briefing paper addressed to the executives at the hea...
Week 1 Individual Access Controls
Last document update:
ago
You have been hired to consult on access controls for a public health care provider, which provides medical services to a surrounding lower- to lower-middle-class community.

Information about clients of this health care provider include Personally Identifiable Information (PII) and Protected Health Information (PHI), which is governed by the federal Health Insurance Portability and Accountability Act (HIPAA) regulation.

Write a 1- to 2-page briefing paper addressed to the executives at the hea...
Week 5 Individual Security for Cloud Computing and Endpoints
Other • 5
pages
• 2019
As part of a consulting agreement for a major package shipping and delivery company, you are tasked with advising the company on security. The company uses a cloud computing environment for processing orders and maintaining all company records concerning vendors and customers. In addition, the company utilizes internet-based applications to communicate over mobile devices with its delivery drivers in the field. Support personnel in the office use desktop computers with typical peripheral devices...
Week 5 Individual Security for Cloud Computing and Endpoints
Last document update:
ago
As part of a consulting agreement for a major package shipping and delivery company, you are tasked with advising the company on security. The company uses a cloud computing environment for processing orders and maintaining all company records concerning vendors and customers. In addition, the company utilizes internet-based applications to communicate over mobile devices with its delivery drivers in the field. Support personnel in the office use desktop computers with typical peripheral devices...
You have been hired by a public library to consult on improving security, focusing on network security in the public facilities it manages. 

Create a 1- to 2-page reference document that lists the basic technology and concepts involved in networks so that management might better understand what technology is used in networking and how networks function.

Submit your assignment using the Assignment Files tab.
Week 4 Individual Networking Concepts
Last document update:
ago
You have been hired by a public library to consult on improving security, focusing on network security in the public facilities it manages. 

Create a 1- to 2-page reference document that lists the basic technology and concepts involved in networks so that management might better understand what technology is used in networking and how networks function.

Submit your assignment using the Assignment Files tab.
As part of a consulting agreement for a private financial services company with approximately 300 endpoints, as described in Ch. 3 of SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide. You are tasked with providing analysis of the most common malicious code and activity to which the company is exposed.

Create a 10- to 12-slide PowerPoint® presentation with presenter notes of a plan to company leadership detailing how to help protect the company from the analyzed threats...
Week 2 Individual Protecting Against Threats
Last document update:
ago
As part of a consulting agreement for a private financial services company with approximately 300 endpoints, as described in Ch. 3 of SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide. You are tasked with providing analysis of the most common malicious code and activity to which the company is exposed.

Create a 10- to 12-slide PowerPoint® presentation with presenter notes of a plan to company leadership detailing how to help protect the company from the analyzed threats...
Research common malware threats companies face today.

Using your company or this university as an example, create a 1/2- to 1-page matrix organized as follows:

Label the first column "Areas of Concern" and list three categories in the first column:
Endpoints
Servers
Cloud-based applications
Label the second column "Threats" and list particular threats that are associated with each area of concern
Label the third column "Threat Mitigation" and list steps organizations can take to mitigate...
Week 5 Individual Malware Threats
Last document update:
ago
Research common malware threats companies face today.

Using your company or this university as an example, create a 1/2- to 1-page matrix organized as follows:

Label the first column "Areas of Concern" and list three categories in the first column:
Endpoints
Servers
Cloud-based applications
Label the second column "Threats" and list particular threats that are associated with each area of concern
Label the third column "Threat Mitigation" and list steps organizations can take to mitigate...
You work for a financial banking firm. There has been an increase in attempts to spread malicious code on company computers. 

Write a 1- to 1.5-page Frequently Asked Questions (FAQ) document explaining to management what the characteristics of malicious code activity look like and what activities should be monitored to protect information and data.

Submit your FAQ document using the Assignment Files tab.
Week 2 Individual Malicious Code
Last document update:
ago
You work for a financial banking firm. There has been an increase in attempts to spread malicious code on company computers. 

Write a 1- to 1.5-page Frequently Asked Questions (FAQ) document explaining to management what the characteristics of malicious code activity look like and what activities should be monitored to protect information and data.

Submit your FAQ document using the Assignment Files tab.
Get paid weekly? You can!
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia!
Discover all about earning on Stuvia