CMGT 433 ENTIRE COURSE | University Of Phoenix
- University of Phoenix / CMGT 433
- 01 Mar 2019
- Price: $55
- Other / Other
CMGT 433 ENTIRE COURSE | University Of Phoenix
CMGT 433 ENTIRE COURSE (2018)
WEEK 1
CMGT 433 Week 1 Individual Assignment Individual: Cyber Security, ICT, Legal Obligations and Constraints
Instructions:
You have been asked by the CIO of your company, or another
company, to create a PowerPoint® informational presentation.
Examples of companies might be a company you have worked for in
the past or wish to work for in the future. The audience for this week's
presentation will be a group of department supervisors.
The objectives of this presentation are to:
- Define "cyber security," and identify threats to private and public
organizations.
- Define Information and Communication Technology (ICT), and
explain why it is a very important component of cyber security.
- Identify the pillars of personal security that assist in personal
protection.
- Define the Six Principles of Information Security Management and
legislation constraints that apply to cyber security.
Create an 8- to 10-slide PowerPoint® informational presentation,
including the following:
- Content for each of the objectives
- Speaker's notes
- References used to support your presentation, including a minimum
of two outside academic references in addition to course textbooks and
videos
WEEK 2
CMGT 433 Week 2 Learning Team Assignment Learning Team: Red Team/Blue Team Exercise, Part I
Instructions:
Review the initial project description in Week One.
The Red Team completes the following:
- Select three attacks that the team will launch.
- Describe these attacks.
- Justify the attacks based on the latest threats and/or the
vulnerability known for the company's industry.
- Locate and document at least two references used in your
justification.
The Blue Team completes the following:
- Select three defenses that the team will implement.
- Describe these defenses.
- Justify the defenses planned based on the latest threats and/or the
vulnerability known for the company's industry.
- Locate and document at least two references used in your
justification.
Based on the instructions for your team, complete a 5-slide
PowerPoint® presentation, including detailed speaker's notes.
Team/Blue Team Exercise
CMGT 433 Week 2 Individual Assignment Individual: Hot Topics in Cyber Security
Instructions:
The CIO, of the company you chose in Week One, has asked you to
create a PowerPoint® informational presentation. The audience for this
week's presentation will be a group of IT Operations employees.
The objectives of this presentation are to:
- Explain why the three most active areas in cyber security are the
Internet, mobile technology, and cloud computing.
- Describe the growing use of penetration (pen) testing in many
companies.
- Identify what the pen testing process is and how the outcomes
should be handled.
- Explain the Six Principles of Information Security Management and
why they are important.
Create an 8- to 10-slide PowerPoint® informational presentation,
including the following:
- Content for each of the objectives
- Speaker's notes
- References used to support your presentation, including a minimum
of two outside academic references in addition to course textbooks and
videos
Submit your presentation using the Assignment Files tab above.
WEEK 3
CMGT 433 Week 3 Learning Team Assignment Learning Team: Red Team/Blue Team Exercise, Part II
Instructions:
Review the initial project description in Week One.
At the beginning of the week, provide a copy of your Learning Team's
Week Two presentation to your counterpart.
The Red Team completes the following:
- Review the Blue Team's presentation.
- Assess whether the attack matched the protection put up by the
Blue Team.
- Plan one new attack that the team will launch.
- Describe the attack.
- Justify the attack planned based on the latest threats and/or the
vulnerability known for the company's industry.
- Locate and document at least two references used in your
justification.
The Blue Team completes the following:
- Review the Red Team's presentation.
- Assess if the protection matched the attack put up by the Red
Team.
- Plan one new defense.
- Describe the defense.
- Justify the defense planned based on the latest threats and/or the
vulnerability known for the company's industry.
- Locate and document at least two references used in your
justification.
Based on the instructions for your team, complete a 5-slide
PowerPoint® presentation, including detailed speaker's notes.
Submit your presentation using the Assignment Files tab above.
SupportingMaterial:Learning Team Instructions: Red Team/Blue Team
Exercise
CMGT 433 Week 3 Individual Assignment Individual: Risk, Contingency Planning, and Defensive Management
Instructions:
The CIO of the company you chose in Week One, has asked you to
create a PowerPoint® informational presentation. The audience for this
week's presentation will be a group of department managers within the
company.
The objectives of this presentation are to:
- Explain why risk, risk analysis, and prioritization of a company's risks
are some of the best methods to reduce threats in vulnerability
management.
- Identify the major components of contingency planning.
- Define and explain what makes up the process called "vulnerability
management."
- Explain several options that can be taken when severe risk is found
in the area of incidence response.
Create an 8- to 10-slide PowerPoint® informational presentation,
including the following:
- Content for each of the objectives
- Speaker's notes
- References used to support your presentation, including a minimum
of two outside academic references in addition to course textbooks and
videos
Submit your presentation to the Assignment Files tab above.
WEEK 4
CMGT 433 Week 4 Learning Team Assignment Learning Team: Red Team/Blue Team Exercise, Part III
Instructions:
Review the initial project description in Week One.
At the beginning of the week, provide a copy of your Learning Team's
Week Three presentation to your counterpart.
The Red Team completes the following:
- Review the Blue Team's presentation.
- Assess whether the attack matched the protection put up by the
Blue Team.
- Plan one new attack that the team will launch.
- Describe the attack.
- Justify the attack planned based on the latest threats and/or the
vulnerability known for the company's industry.
- Locate and document at least two references used in your
justification.
The Blue Team completes the following:
- Review the Red Team's presentation.
- Assess if the protection matched the attack put up by the Red
Team.
- Plan one new defense.
- Describe the defense.
- Justify the defense planned based on the latest threats and/or the
vulnerability known for the company's industry.
- Locate and document at least two references used in your
justification.
Based on the instructions for your team, complete a 4- to 5-slide
PowerPoint® presentation, including detailed speaker's notes.
Submit your presentation to the Assignment Files tab above.
SupportingMaterial:Learning Team Instructions: Red Team/Blue Team
Exercise
CMGT 433 Week 4 Individual Assignment Individual: Standard Operating Procedures
Instructions:
The CIO, of the company you chose in Week One, has asked you to
create a PowerPoint® informational presentation. The audience for this
week's presentation will be the members of the executive staff,
including the Vice Presidents, CIO, and CEO.
The objectives of this presentation are to:
- Identify at least five opportunities areas for management to improve
company's security plan.
- Identify at least five opportunities for employees to contribute a
positive effect on the company's security plan.
- Identify at least three opportunities for management to display their
support for the efforts of the IT Department in the pursuit of safe
computing for all employees.
Create an 8- to 10-slide PowerPoint® training presentation, including
the following:
- Content for each of the objectives
- Speaker's notes
- References used to support your presentation, including a minimum
of two outside academic references in addition to course textbooks and
videos
Submit your presentation using the Assignment Files tab above.
WEEK 5
CMGT 433 Week 5 Learning Team Assignment Red Team/Blue Team Exercise, Final Project
Consolidate all of the previous weeks Learning Team presentations,
and edit them into a single threat (Red Team) or protection (Blue Team)
plan.
Prepare a 15- to 20-slide PowerPoint® presentation to present to
company executives, including the following:
- Title
- Lessons learned from the Red Team - Blue Team Exercises
- Speaker's notes
- References used during the project
Submit your presentation using the Assignment Files tab above.
CMGT 433 Week 5 Individual Assignment Cyber Security Awareness for Executives and Managers
The company you chose in Week One will hold a national convention of
all of the U.S.-based executive staff members across 15 locations. The
CIO has chosen "Cyber Security Awareness" as the theme for the
convention. Based on the quality of your previous training
presentations, you have been chosen to write and deliver a
presentation at one of the Executive Round Table Meetings during the
convention. The CIO has stressed creating a presentation that will
capture the attention of executive management.
Create a 15- to 20-slide PowerPoint® presentation, including speaker's
notes. Use graphics, animation, or charts as appropriate.
Create a 1-page executive summary that the executives can use to
communicate the highlights of the presentation within their
organizations.
Include the following topics in the presentation. Avoid using research
quotes or acronyms. Combine and/or order the topics in the way you
believe to be most effective:
- What is network protection? What needs protecting?
- What is a Cyber Attack? How can cyber security help?
- Security and ROI
- Legislation and government influence
- Ethical and legal issues
- The Six Principles of Information Security Management.
- What challenges are there with cloud computing?
- Why is the Internet often considered the cause of cyber security
issues?
- The role of the workforce in security
- Training, awareness, motivation, and continuous improvement
- Disaster recovery and business continuity
- Why are contingency planning and vulnerability management
important?
- Security Audits - What are they? Who uses and performs them?
- Risk Management in reducing the probability of a negative event
- Social Engineering - What is it? How might we be vulnerable to it?
- Backups (full, copy, incremental, differential)
- Deterring network attacks
- Roles of our employees in cyber security
Compile all files into a ZIP folder.