CMGT 433 ENTIRE COURSE | University Of Phoenix

CMGT 433 ENTIRE COURSE  | University Of Phoenix 

CMGT 433   ENTIRE COURSE (2018)


 
 
WEEK  1


 
CMGT 433 Week 1 Individual Assignment Individual: Cyber Security, ICT, Legal Obligations and Constraints


Instructions:

You have been asked by the CIO of your company, or another

company, to create a PowerPoint® informational presentation.

Examples of companies might be a company you have worked for in

the past or wish to work for in the future. The audience for this week's

presentation will be a group of department supervisors.

The objectives of this presentation are to:

  • Define "cyber security," and identify threats to private and public

organizations.

  • Define Information and Communication Technology (ICT), and

explain why it is a very important component of cyber security.

  • Identify the pillars of personal security that assist in personal

protection.

  • Define the Six Principles of Information Security Management and

legislation constraints that apply to cyber security.

Create an 8- to 10-slide PowerPoint® informational presentation,

including the following:

  • Content for each of the objectives
  • Speaker's notes
  • References used to support your presentation, including a minimum

of two outside academic references in addition to course textbooks and

videos

WEEK 2 


CMGT 433   Week 2 Learning Team Assignment  Learning Team: Red Team/Blue Team Exercise, Part I

 

Instructions:

Review the initial project description in Week One.

The Red Team completes the following:

  1. Select three attacks that the team will launch.
  2. Describe these attacks.
  3. Justify the attacks based on the latest threats and/or the

vulnerability known for the company's industry.

  1. Locate and document at least two references used in your

justification.

The Blue Team completes the following:

  1. Select three defenses that the team will implement.
  2. Describe these defenses.
  3. Justify the defenses planned based on the latest threats and/or the

vulnerability known for the company's industry.

  1. Locate and document at least two references used in your

justification.

Based on the instructions for your team, complete a 5-slide

PowerPoint® presentation, including detailed speaker's notes.

Team/Blue Team Exercise

 

 

CMGT 433   Week 2 Individual Assignment  Individual: Hot Topics in Cyber Security

 

 

Instructions:

The CIO, of the company you chose in Week One, has asked you to

create a PowerPoint® informational presentation. The audience for this

week's presentation will be a group of IT Operations employees.

The objectives of this presentation are to:

  • Explain why the three most active areas in cyber security are the

Internet, mobile technology, and cloud computing.

  • Describe the growing use of penetration (pen) testing in many

companies.

  • Identify what the pen testing process is and how the outcomes

should be handled.

  • Explain the Six Principles of Information Security Management and

why they are important.

Create an 8- to 10-slide PowerPoint® informational presentation,

including the following:

  • Content for each of the objectives
  • Speaker's notes
  • References used to support your presentation, including a minimum

of two outside academic references in addition to course textbooks and

videos

Submit your presentation using the Assignment Files tab above.

 

 

 

 

 

 

 

 

 

 

 

WEEK 3


 
CMGT 433   Week 3 Learning Team Assignment Learning Team: Red Team/Blue Team Exercise, Part II

 

 

Instructions:

Review the initial project description in Week One.

At the beginning of the week, provide a copy of your Learning Team's

Week Two presentation to your counterpart.

The Red Team completes the following:

  1. Review the Blue Team's presentation.
  2. Assess whether the attack matched the protection put up by the

Blue Team.

  1. Plan one new attack that the team will launch.
  2. Describe the attack.
  3. Justify the attack planned based on the latest threats and/or the

vulnerability known for the company's industry.

  1. Locate and document at least two references used in your

justification.

The Blue Team completes the following:

  1. Review the Red Team's presentation.
  2. Assess if the protection matched the attack put up by the Red

Team.

  1. Plan one new defense.
  2. Describe the defense.
  3. Justify the defense planned based on the latest threats and/or the

vulnerability known for the company's industry.

  1. Locate and document at least two references used in your

justification.

Based on the instructions for your team, complete a 5-slide

PowerPoint® presentation, including detailed speaker's notes.

Submit your presentation using the Assignment Files tab above.

SupportingMaterial:Learning Team Instructions: Red Team/Blue Team

Exercise

 

 

CMGT 433   Week 3 Individual Assignment Individual: Risk, Contingency Planning, and Defensive Management           

 

Instructions:

The CIO of the company you chose in Week One, has asked you to

create a PowerPoint® informational presentation. The audience for this

week's presentation will be a group of department managers within the

company.

The objectives of this presentation are to:

  • Explain why risk, risk analysis, and prioritization of a company's risks

are some of the best methods to reduce threats in vulnerability

management.

  • Identify the major components of contingency planning.
  • Define and explain what makes up the process called "vulnerability

management."

  • Explain several options that can be taken when severe risk is found

in the area of incidence response.

Create an 8- to 10-slide PowerPoint® informational presentation,

including the following:

  • Content for each of the objectives
  • Speaker's notes
  • References used to support your presentation, including a minimum

of two outside academic references in addition to course textbooks and

videos

Submit your presentation to the Assignment Files tab above.

 

 

WEEK 4


 
CMGT 433  Week 4 Learning Team Assignment Learning Team: Red Team/Blue Team Exercise, Part III

 
Instructions:

Review the initial project description in Week One.

At the beginning of the week, provide a copy of your Learning Team's

Week Three presentation to your counterpart.

The Red Team completes the following:

  1. Review the Blue Team's presentation.
  2. Assess whether the attack matched the protection put up by the

Blue Team.

  1. Plan one new attack that the team will launch.
  2. Describe the attack.
  3. Justify the attack planned based on the latest threats and/or the

vulnerability known for the company's industry.

  1. Locate and document at least two references used in your

justification.

The Blue Team completes the following:

  1. Review the Red Team's presentation.
  2. Assess if the protection matched the attack put up by the Red

Team.

  1. Plan one new defense.
  2. Describe the defense.
  3. Justify the defense planned based on the latest threats and/or the

vulnerability known for the company's industry.

  1. Locate and document at least two references used in your

justification.

Based on the instructions for your team, complete a 4- to 5-slide

PowerPoint® presentation, including detailed speaker's notes.

Submit your presentation to the Assignment Files tab above.

SupportingMaterial:Learning Team Instructions: Red Team/Blue Team

Exercise

 

 

CMGT 433  Week 4 Individual Assignment  Individual: Standard Operating Procedures

 

Instructions:

The CIO, of the company you chose in Week One, has asked you to

create a PowerPoint® informational presentation. The audience for this

week's presentation will be the members of the executive staff,

including the Vice Presidents, CIO, and CEO.

The objectives of this presentation are to:

  • Identify at least five opportunities areas for management to improve

company's security plan.

  • Identify at least five opportunities for employees to contribute a

positive effect on the company's security plan.

  • Identify at least three opportunities for management to display their

support for the efforts of the IT Department in the pursuit of safe

computing for all employees.

Create an 8- to 10-slide PowerPoint® training presentation, including

the following:

  • Content for each of the objectives
  • Speaker's notes
  • References used to support your presentation, including a minimum

of two outside academic references in addition to course textbooks and

videos

Submit your presentation using the Assignment Files tab above.

 

WEEK 5

 

CMGT 433 Week 5 Learning Team Assignment Red Team/Blue Team Exercise, Final Project

 

Consolidate all of the previous weeks Learning Team presentations,

and edit them into a single threat (Red Team) or protection (Blue Team)

plan.

Prepare a 15- to 20-slide PowerPoint® presentation to present to

company executives, including the following:

  • Title
  • Lessons learned from the Red Team - Blue Team Exercises
  • Speaker's notes
  • References used during the project

Submit your presentation using the Assignment Files tab above.

 

 

 

CMGT 433 Week 5 Individual Assignment Cyber Security Awareness for Executives and Managers

 

The company you chose in Week One will hold a national convention of

all of the U.S.-based executive staff members across 15 locations. The

CIO has chosen "Cyber Security Awareness" as the theme for the

convention. Based on the quality of your previous training

presentations, you have been chosen to write and deliver a

presentation at one of the Executive Round Table Meetings during the

convention. The CIO has stressed creating a presentation that will

capture the attention of executive management.

Create a 15- to 20-slide PowerPoint® presentation, including speaker's

notes. Use graphics, animation, or charts as appropriate.

Create a 1-page executive summary that the executives can use to

communicate the highlights of the presentation within their

organizations.

Include the following topics in the presentation. Avoid using research

quotes or acronyms. Combine and/or order the topics in the way you

believe to be most effective:

  • What is network protection? What needs protecting?
  • What is a Cyber Attack? How can cyber security help?
  • Security and ROI
  • Legislation and government influence
  • Ethical and legal issues
  • The Six Principles of Information Security Management.
  • What challenges are there with cloud computing?
  • Why is the Internet often considered the cause of cyber security

issues?

  • The role of the workforce in security
  • Training, awareness, motivation, and continuous improvement
  • Disaster recovery and business continuity
  • Why are contingency planning and vulnerability management

important?

  • Security Audits - What are they? Who uses and performs them?
  • Risk Management in reducing the probability of a negative event
  • Social Engineering - What is it? How might we be vulnerable to it?
  • Backups (full, copy, incremental, differential)
  • Deterring network attacks
  • Roles of our employees in cyber security

Compile all files into a ZIP folder.

Answer Detail

Get This Answer

Invite Tutor