journal

As you begin to learn cybersecurity fundamentals, reflecting on what you have read and learned in this module is important. In your journal, you will reflect on cybersecurity fundamentals. Specifically, you will discuss the basic tenets of cybersecurity, the process of risk management, and common risk methodologies. Your journal entry should be three or more … Read more

cisco packet tracer

  Congratulations, you have been chosen to build out a network for a new facility for your company, ACME, Inc. Office Schematic, (select ) each office is approximately a 10’x10′ space with 10′ ceilings. Building is roughly 125’x150′. Your focus will only be for the areas marked A, B, C, D, E, F and G … Read more

IT Security in HIMS

 2 paragraph, include references- SWS format  Choose a current health care breach from any online source. Briefly explain what had occurred. Be sure you include details like cost of the breach to all stakeholders. How was the breach identified and what was done to rectify the problems that occurred? What improvements and requirements can be … Read more

IT Security in HIMS

2 paragraph, include references- SWS format  Choose a current health care breach from any online source. Briefly explain what had occurred. Be sure you include details like cost of the breach to all stakeholders. How was the breach identified and what was done to rectify the problems that occurred? What improvements and requirements can be … Read more

Week 10 Discussion – Reflection on Labs

For the lab from which you learned the most: Describe the single most important lesson you learned from completing this lab. Explain how you will apply this lesson in your current position or one you hope to obtain. For the lab from which you learned the least: Explain what you hoped to learn from completing … Read more

Week 7 – Evaluate Automated IT Security Policy Compliance Systems

   Assume you are a security professional for a supplier of military products to the U.S. Department of Defense (DoD). Your organization has approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors. A recent security breach exposed flaws in your company’s Internet use policy and physical access … Read more

Week 11 Discussion – What’s Next?

Suppose you have graduated from Strayer University with your degree and you have been working on a variety of projects. Now, you are ready to pursue a certification in project management, but you are not sure which one to get. While visiting the Project Management Institute’s (PMI) CertificationsLinks to an external site. website, you see … Read more

Remote work

The remote workplace has become common throughout all industries, and as such, presents new challenges for cybersecurity professionals and new opportunities for bad actors. Moving a workforce to a remote work scenario requires that current security policies be adjusted to consider remote work-specific attack vectors and associated vulnerabilities. Create a 10- to 12-slide digital presentation … Read more