CMGT 230 FUNDAMENTALS OF SSCP (CMGT230)

University Of Phoenix

Here are the best resources to pass CMGT 230 FUNDAMENTALS OF SSCP (CMGT230). Find CMGT 230 FUNDAMENTALS OF SSCP (CMGT230) study guides, notes, assignments, and much more.

All 8 results

Sort by

Week 3 Individual Business Continuity and Disaster Recovery
  • Week 3 Individual Business Continuity and Disaster Recovery

  • Other • 12 pages • 2019
  • The public university that has hired you as a security consultant does not have in place effective means to handle incidents associated with risks and does not have an effective plan in place for business continuity or disaster recovery. Create a 14- to 16-slide PowerPoint® presentation with presentation notes to members of the university executive team addressing the following areas: Elements involved in effective handling of security incidents Rationale for a Business Continuity Plan, what ...
    (0)
  • $7.49
  • + learn more
Week 4 Individual Networking and Wireless Security
  • Week 4 Individual Networking and Wireless Security

  • Other • 4 pages • 2019
  • As part of a consulting agreement for a public library system, you are tasked with advising the organization on risks associated with both wired and wireless networks in the public facilities managed by the agency. Write a 1- to 2-page briefing report with recommendations for the agency. Detail the particular risks faced by exposing the network to public access and the recommended actions or measures needed to help decrease risks. Include the following key topics: Physical network security Log...
    (0)
  • $7.49
  • + learn more
Week 1 Individual Access Controls
  • Week 1 Individual Access Controls

  • Other • 4 pages • 2019
  • You have been hired to consult on access controls for a public health care provider, which provides medical services to a surrounding lower- to lower-middle-class community. Information about clients of this health care provider include Personally Identifiable Information (PII) and Protected Health Information (PHI), which is governed by the federal Health Insurance Portability and Accountability Act (HIPAA) regulation. Write a 1- to 2-page briefing paper addressed to the executives at the hea...
    (0)
  • $7.49
  • + learn more
Week 5 Individual Security for Cloud Computing and Endpoints
  • Week 5 Individual Security for Cloud Computing and Endpoints

  • Other • 5 pages • 2019
  • As part of a consulting agreement for a major package shipping and delivery company, you are tasked with advising the company on security. The company uses a cloud computing environment for processing orders and maintaining all company records concerning vendors and customers. In addition, the company utilizes internet-based applications to communicate over mobile devices with its delivery drivers in the field. Support personnel in the office use desktop computers with typical peripheral devices...
    (0)
  • $7.49
  • + learn more
Week 4 Individual Networking Concepts
  • Week 4 Individual Networking Concepts

  • Other • 4 pages • 2019
  • You have been hired by a public library to consult on improving security, focusing on network security in the public facilities it manages. Create a 1- to 2-page reference document that lists the basic technology and concepts involved in networks so that management might better understand what technology is used in networking and how networks function. Submit your assignment using the Assignment Files tab.
    (0)
  • $7.49
  • + learn more
Week 2 Individual Protecting Against Threats
  • Week 2 Individual Protecting Against Threats

  • Other • 12 pages • 2019
  • As part of a consulting agreement for a private financial services company with approximately 300 endpoints, as described in Ch. 3 of SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide. You are tasked with providing analysis of the most common malicious code and activity to which the company is exposed. Create a 10- to 12-slide PowerPoint® presentation with presenter notes of a plan to company leadership detailing how to help protect the company from the analyzed threats...
    (0)
  • $7.49
  • + learn more
Week 5 Individual Malware Threats
  • Week 5 Individual Malware Threats

  • Other • 3 pages • 2019
  • Research common malware threats companies face today. Using your company or this university as an example, create a 1/2- to 1-page matrix organized as follows: Label the first column "Areas of Concern" and list three categories in the first column: Endpoints Servers Cloud-based applications Label the second column "Threats" and list particular threats that are associated with each area of concern Label the third column "Threat Mitigation" and list steps organizations can take to mitigate...
    (0)
  • $7.49
  • + learn more
Week 2 Individual Malicious Code
  • Week 2 Individual Malicious Code

  • Other • 4 pages • 2019
  • You work for a financial banking firm. There has been an increase in attempts to spread malicious code on company computers. Write a 1- to 1.5-page Frequently Asked Questions (FAQ) document explaining to management what the characteristics of malicious code activity look like and what activities should be monitored to protect information and data. Submit your FAQ document using the Assignment Files tab.
    (0)
  • $7.49
  • + learn more