Chat with us, powered by LiveChat You have been hired as part of the network securit | Writedemy

You have been hired as part of the network securit

You have been hired as part of the network securit

You have been hired as part of the network security team at UMGC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.The university has completed the implementation of the leased building in Adelphi, Maryland. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance. In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.As you will recall, the university leased building in Adelphi, Maryland was designed and implemented via the following layout:You’ve been asked to perform network security analysis and planning, secure the boundary devices, hosts, and software; and secure the data at rest and in transit. Your deliverable should explain the requirement, propose a solution, and justify the solution. You should make use of the TestOut LabSim material to create the task, and study for CompTIA Security+ certification. You should also make use of other sources as required. It is important that your deliverable explain the technical issues in layman’s terms. Before you begin, make sure to review the Network Security Proposal (Parts 1-3).In this learning demonstration, you will use TestOut Security Pro to help you understand how to identify and assess network infrastructure and pass the CompTIA Security+ certification. In order to identify your strengths and weaknesses, you will first complete the practice exam that will prepare you for the certification. The learning materials within TestOut LabSim will help you understand the types of vulnerabilities within a network and how to address them. As you step through each set of activities, you will submit a Vulnerability Assessment and Recommendation Document in three parts. Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention. You must complete all online labs in TestOut LabSim; these are the activities with the computer mouse icon. Some of the other areas in TestOut LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics.There are nine steps in this project that lead you through each deliverable. Begin with Step 1, obtaining access to TestOut Security Pro and enrolling in LabSim, and then continue with Step 2, taking the practice exam.Here is the rubric:xcellentGoodAcceptable (Minimally Proficient)Needs ImprovementNeeds Significant ImprovementMissing or UnacceptableAssessed the appropriate vulnerability assessment tools to support the requirements of the organization20 pointsProvided an excellent description of the technical requirements, proposal, and justification for the vulnerability assessment.16 pointsProvided an outstanding description of the technical requirements, proposal, and justification for the vulnerability assessment.14 pointsProvided a description of the technical requirements, proposal, and justification for the vulnerability assessment.12 pointsProvided a description of the technical requirements and proposal for the vulnerability assessment, but lacked an appropriate justification.10 pointsIdentified technical requirements for the vulnerability assessment, but the proposal and justification lacked detail and/or was not well supported.0 pointsThe technical requirements, proposal, and justification for the vulnerability assessment of the paper were off topic or failed to provide required level of detail./ 20Identified the appropriate security policy for the organization15 pointsProvided an excellent description of the technical requirements, proposal, and justification for the security policy.12 pointsProvided an outstanding description of the technical requirements, proposal, and justification for the security policy.10.5 pointsProvided a description of the technical requirements, proposal, and justification for the security policy.9 pointsProvided a description of the technical requirements and proposal for the security policy, but lacked an appropriate justification.7.5 pointsIdentified a technical requirement for the security policy, but the proposal and justification lacked detail and/or was not well supported.0 pointsThe technical requirements, proposal, and justification for the security policy of the paper were off topic or failed to provide required level of detail./ 15Describe the proper risk management solution to reduce risk to an acceptable level20 pointsProvided an excellent description of the technical requirements, proposal, and justification for the proper risk management solution.16 pointsProvided an outstanding description of the technical requirements, proposal, and justification for the proper risk management solution.14 pointsProvided a description of the technical requirements, proposal, and justification for the proper risk management solution.12 pointsProvided a description of the technical requirements and proposal for the proper risk management solution, but lacked an appropriate justification.10 pointsIdentified a technical requirement for the proper risk management solution, but the proposal and justification lacked detail and/or was not well supported.0 pointsThe technical requirements, proposal, and justification for the proper risk management solution of the paper were off topic or failed to provide required level of detail./ 20Assessed the appropriate business continuity plan to enable critical organizational functions to continue15 pointsProvided an excellent description of the technical requirements, proposal, and justification for the business continuity plan.12 pointsProvided an outstanding description of the technical requirements, proposal, and justification for the business continuity plan.10.5 pointsProvided a description of the technical requirements, proposal, and justification for the business continuity plan.9 pointsProvided a description of the technical requirements and proposal for the business continuity plan, but lacked an appropriate justification.7.5 pointsIdentified a technical requirement, but the proposal and justification for the business continuity plan lacked detail and/or was not well supported.0 pointsThe technical requirements, proposal, and justification for the business continuity plan of the paper were off topic or failed to provide required level of detail./ 15Assessed the proper access control models for the organization15 pointsProvided an excellent description of the technical requirements, proposal, and justification for the access control model(s) selected.12 pointsProvided an outstanding description of the technical requirements, proposal, and justification for the access control model(s) selected.10.5 pointsProvided a description of the technical requirements, proposal, and justification for the access control model(s) selected.9 pointsProvided a description of the technical requirements and proposal for the access control model(s) selected, but lacked an appropriate justification.7.5 pointsIdentified a technical requirement for the access control model(s) selected, but the proposal and justification lacked detail and/or was not well supported.0 pointsThe technical requirements, proposal, and justification for the access control model(s) were off topic or failed to provide required level of detail./ 15Use of Authoritative Sources / Resources10 pointsWork contains a reference list containing entries for all cited sources. Reference list entries and intext citations are correctly formatted using the appropriate IEEE style for each type of resource. The description appropriately used information from 3 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.8 pointsWork contains a reference list containing entries for all cited sources. One or two minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 3 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.7 pointsWork contains a reference list containing entries for all cited sources. No more than 5 minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 2 or more authoritative sources, i.e. journal articles, industry or tradeWork publications, news articles, industry or government white papers and authoritative Web sites.6 pointsWork contains a reference list containing entries for cited sources. Work contains no more than 5 minor errors in IEEE format for in-text citations and/or reference list entries. The description appropriately used information from 2 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.5 pointsWork attempts to credit sources but demonstrates a fundamental failure to understand and apply the IEEE formatting standard.The description appropriately used information from 1 or more authoritative sources, i.e. journal articles, industry or trade publications, news articles, industry or government white papers and authoritative Web sites.0 pointsReference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper./ 10Satisfy standards of writing style and grammatical correctness5 pointsNo formatting, grammar, spelling, or punctuation errors.4 pointsWork contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.3.5 pointsErrors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.3 pointsSubmitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.1 pointSubmitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.0 pointsNo work submitted for this assignment./ 5

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order