Assessment Description Cybersecurity professionals must be able to reduce the vulnerability of an organization’s network by designing a secure network. Part 1 Design a secure architecture for a fictio


Assessment Description

Cybersecurity professionals must be able to reduce the vulnerability of an organization’s network by designing a secure network.

Part 1

Design a secure architecture for a fictional company.

View “Creating a Windows 11 VM in VirtualBox,” within the Video Playlist: Technology Implementation of Security Solutions, located in Class Resources.

Design a corporate infrastructure diagram in Visio or another network mapping tool (this deliverable must be readable by your professor; Cisco Packet Tracer is not acceptable). Your network diagram must include a minimum of 2 routers, 2 firewalls, 4 switches, 1 IDS, 1 IPS, a proxy server, an email server, a DHCP server, a DMZ, and finally, 5 separate departments utilizing network segmentation with a minimum of 25 clients per department. You must also include an air-gapped system for your R&D department to utilize.

Perform the following tasks to complete the VirtualBox infrastructure:

  1. Create a Windows 11 VM and join it to the domain.
  2. Create a VM using an operating system of your choice that has not been created yet. It could be a different version of Windows or Linux. It is not necessary to join this VM to the domain.
  3. In a Microsoft Word document, supply screenshots demonstrating the successful creation of both VMs.

NOTE: MS Cyber Students, this infrastructure will be used in your CYB-610 course.

Develop the intellectual tools to explore and understand advance network concepts and protocols. Using your Kali Linux VM, perform a GVM Full and Fast vulnerability scan of your entire VirtualBox infrastructure.

Within the same Word document above, select 3-4 intellectual tools (e.g., Suricata, pfSense, Snort, etc.) and demonstrate how they work together to create a framework. Make sure to include them in your secure network design. Do not use Suricata, pfSense, or Snort for this part of the assignment.

The deliverables for Part 1 will include the corporate infrastructure diagram, a GVM Scan Report, and the Word document described above.

Part 2

Create a 5– to 7-minute screencast addressing the following:

  1. Explain all components and how they interact with each other within the secure network design created.
  2. Discuss the results of the GVM scan.
  3. Describe and discuss the security issues and implications of advanced and novel networks and protocols. Ensure your discussion applies to both current and new network technologies.

Use an online video platform such as Loom, YouTube, or Vimeo to upload your completed video.

Remember that video and audio quality are important and should be taken into consideration. Ensure your video is filmed with sufficient lighting and that the volume is adequate for viewers to hear. Intonation, expression, proper speech, and professional attire are expected.

In addition, make sure to integrate a variety of visuals to support the presentation.

You will be graded on your ability to provide:

  1. Detailed and cited content (to include a brief introduction and a reference section containing at least 3 resources)
  2. A comprehensive and consistent focus throughout the presentation
  3. Effective communication in your awareness of the audience
  4. Professionalism

Your final submission should include all the deliverables from Part 1 along with the Part 2 video link. Place the video link in the Word document from Part 1. Ensure that others can access and view the link to your video prior to submitting it.

Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.