IT643 Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission | Homework Solution - Grade One Essays

IT643 Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission | Homework Solution

Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission.

Consider your audiences while working on your training manual. The Executive Summary is for management and stakeholders while the Training Manual is for the employees and workers.

To complete the Executive Overview and Purpose sections of the training manual, download the Training Manual Template document and complete the applicable sections in the manual. Address the included prompts and questions for assistance completing these sections.

Don't use plagiarized sources. Get Your Custom Essay on
IT643 Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission | Homework Solution
Just from $13/Page
Order Essay

For this assignment you will begin the work on the purpose section of your training manual. Consider your audiences while working on your training manual as your writing style should change to fit the audience. The Executive Summary is for management and stakeholders while the Training Manual is for the employees and workers.

Prompt

Explain the purpose of this manual. Why is it important that information technology employees at NSSD apply the principles and practices described in this manual? What is at stake if they do not appropriately apply their training and provide high-quality defense and mitigation strategies to the NSSD network?

  1. Executive Overview
    1. Create a brief description of the purpose of the manual that is in consumable terms for the stakeholders. Be sure you address the company’s strategic security goals and the value of the policy changes or updates.

What to Submit

Fill in Purpose of this Manual section of the Training Manual Template document. The rest of the Executive Summary will be completed in Module Nine. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.

IT643 Training Manual Template

Manual Overview

You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients in Los Angeles, North Star Software Developers (NSSD), called with a big problem. Some of its network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the company’s software products. It is not presently known whether this attack came from inside or outside of the company. NSSD is currently dealing with this problem as best as it can, but it needs your company to help prevent this from happening again in the future.

You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place.

Manual Layout

There are seven sections of the manual that cover all the components of a training manual designed to teach employees how to lessen the risk of a security breach and mitigate the effects of a breach should one happen. As the training manager, you must complete each section using information you learned in this course. Refer to the background information on North Star Software Developers (NSSD) and apply the appropriate tools and methods that will help the company defend its network against attacks and detect intrusions, anomalies, and vulnerabilities. Apply best practices of network defense and countermeasures from your research and hands-on lab activities. The following are the main sections of the manual you are responsible for completing:

  1. Introduction and Purpose
  2. Traffic Analysis
  3. Firewalls
  4. Intrusion Detection and Prevention
  5. Vulnerability Assessment
  6. Network Scanning and Assessment
  7. Auditing and Log Collection
  8. Summary of Tools
  9. References

Delete this page before submitting your completed training manual.

Prepared by:

[Learner first and last name]

Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission.

Introduction and Purpose   5

0.1 Introduction. 5

0.2 Purpose of This Manual. 5

Section One: Traffic Analysis  6

1.1 Significance of Traffic Analysis. 6

1.2 Traffic Analysis Tools and Methodology. 6

Section Two: Firewalls  7

2.1 Significance of Firewalls. 7

2.2 Firewall Tools and Methodology. 7

Section Three: Intrusion Detection and Prevention   8

3.1 Significance of Intrusion Detection and Prevention Systems (IDPS) 8

3.2 IDPS Tools and Methodology. 8

Section Four: Vulnerability Assessment   9

4.1 Significance of Vulnerability Assessment. 9

4.2 Vulnerability Assessment Tools and Methodology. 9

Section Five: Network Scanning and Assessment   10

5.1 Significance of Network Scanning and Assessment. 10

5.2 Network Scanning and Assessment Tools and Methodology. 10

Section Six: Auditing and Log Collection   11

6.1 Significance of Auditing and Log Collection. 11

6.2 Auditing and Log Collection Tools and Methodology. 11

Section Seven: Tools Used   12

7.1 A Brief Overview of Tools Used in This Manual. 12

Section Eight: References  13

Introduction and Purpose

0.1 Introduction

Provide an overview of the company (North Star Software Developers), its current issues and concerns, and your role in helping with these problems.

Delete this prompt language when you are finished writing your response.

 

 

0.2 Purpose of This Manual

Explain the purpose of this manual. Why is it important that information technology employees at NSSD apply the principles and practices described in this manual? What is at stake if they do not appropriately apply their training and provide high-quality defense and mitigation strategies to the NSSD network?

Delete this prompt language when you are finished writing your response.

 

Section One: Traffic Analysis

1.1 Significance of Traffic Analysis

Explain the significance of traffic analysis as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss some best practices in the area of traffic analysis based on your research and lab activities.

Delete this prompt language when you are finished writing your response.

 

 

1.2 Traffic Analysis Tools and Methodology
  1. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
  2. Discuss how the tools work to analyze traffic on the network. Offer some examples.
  3. Provide screenshots from the labs illustrating tool configuration and outputs.

 

Delete this prompt language when you are finished writing your response.

 

Section Two: Firewalls

2.1 Significance of Firewalls

Explain the significance of firewalls as a core tenet of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Based on your research and lab activities, discuss some best practices in the area of usage and configuration.

Delete this prompt language when you are finished writing your response.

 

 

2.2 Firewall Tools and Methodology
  1. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
  2. Discuss how the tools work to protect the network. Offer some examples.
  3. Provide screenshots from the labs illustrating tool configuration and outputs.

 

Delete this prompt language when you are finished writing your response.

Get Financial Reporting Essay Help

Section Three: Intrusion Detection

3.1 Significance of Intrusion Detection Systems (IDS)

Explain the significance of intrusion detection as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss the key functions of IDS technologies. Discuss some best practices in the area of intrusion detection based on your research and lab activities.

Delete this prompt language when you are finished writing your response.

 

 

3.2 IDS Tools and Methodology
  1. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
  2. Discuss how the tools work to detect intrusions on the network. Offer some examples.
  3. Provide screenshots from the labs illustrating tool configuration and outputs.

 

Delete this prompt language when you are finished writing your response.

 

Section Four: Vulnerability Assessment

4.1 Significance of Vulnerability Assessment

Explain the significance of a vulnerability assessment as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss the key functions of vulnerability scanning technologies. Discuss some best practices in the area of vulnerability scanning and assessment based on your research and lab activities.

Delete this prompt language when you are finished writing your response.

 

 

4.2 Vulnerability Assessment Tools and Methodology

A.       Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.

B.       Discuss how the tools work to assess vulnerabilities the network. Offer some examples.

C.       Provide screenshots from the labs illustrating tool configuration and outputs.

 

Delete this prompt language when you are finished writing your response.

 

Section Five: Network Assessment

5.1 Significance of Network Assessment

Explain the significance of network assessment as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss the key functions of network scanning technologies. Discuss some best practices in the area of network assessment based on your research and lab activities.

Delete this prompt language when you are finished writing your response.

 

Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission.

5.2 Network Assessment Tools and Methodology

A.       Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance and rationale for selecting these tools.

B.       Discuss how the tools work to detect rogue devices and malicious connections on the network. Offer some examples.

C.       Provide screenshots from the labs illustrating tool configuration and outputs.

 

Delete this prompt language when you are finished writing your response.

 

Section Six: Auditing and Log Collection

6.1 Significance of Auditing and Log Collection

Explain the significance of auditing and log collection as a core activity of network defense and cybersecurity. Be sure to define the terms and use specific details and examples to illustrate its meaning in a business context. Discuss the key activities of auditing and log collection. Discuss some best practices in the areas of auditing and log collection based on your research and lab activities.

Delete this prompt language when you are finished writing your response.

 

 

6.2 Auditing and Log Collection Tools and Methodology

A.     Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.

B.      Discuss how the tools work to audit the network and generate reports. Offer some examples.

C.      Provide screenshots from the labs illustrating tool configuration and outputs.

 

Delete this prompt language when you are finished writing your response.

 

Section Seven: Tools Used

7.1 A Brief Overview of Tools Used in This Manual

List a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.

Delete this prompt language when you are finished writing your response.

 

Section Eight: References

List all references used in the creation of this document here (if applicable). References (and citations) must be in APA format.

Delete this prompt language when you are finished writing your response.

Begin to work on the purpose of your manual as described in the Executive Summary section of the Training Manual Template. This will be submitted as part of your final project in week nine, however submitting this now will allow you to implement feedback before your final submission.

Order NOW to get 15% Discount!

Pages
0.00

Why Choose Us

Quality Papers

We value our clients. For this reason, we ensure that each paper is written carefully as per the instructions provided by the client. Our editing team also checks all the papers to ensure that they have been completed as per the expectations.

Professional Academic Writers

Over the years, our Acme Homework has managed to secure the most qualified, reliable and experienced team of writers. The company has also ensured continued training and development of the team members to ensure that it keep up with the rising Academic Trends.

Affordable Prices

Our prices are fairly priced in such a way that ensures affordability. Additionally, you can get a free price quotation by clicking on the "Place Order" button.

On-Time delivery

We pay strict attention on deadlines. For this reason, we ensure that all papers are submitted earlier, even before the deadline indicated by the customer. For this reason, the client can go through the work and review everything.

100% Originality

At Grade One Essays, all papers are plagiarism-free as they are written from scratch. We have taken strict measures to ensure that there is no similarity on all papers and that citations are included as per the standards set.

Customer Support 24/7

Our support team is readily available to provide any guidance/help on our platform at any time of the day/night. Feel free to contact us via the Chat window or support email: support@gradeoneessays.com.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Grade One Essays has stood as the world’s leading custom essay writing services providers. Once you enter all the details in the order form under the place order button, the rest is up to us.

Essays

Essay Writing Services

At Grade One Essays, we prioritize on all aspects that bring about a good grade such as impeccable grammar, proper structure, zero-plagiarism and conformance to guidelines. Our experienced team of writers will help you completed your essays and other assignments.

Admissions

Admission and Business Papers

Be assured that you’ll definitely get accepted to the Master’s level program at any university once you enter all the details in the order form. We won’t leave you here; we will also help you secure a good position in your aspired workplace by creating an outstanding resume or portfolio once you place an order.

Editing

Editing and Proofreading

Our skilled editing and writing team will help you restructure you paper, paraphrase, correct grammar and replace plagiarized sections on your paper just on time. The service is geared toward eliminating any mistakes and rather enhancing better quality.

Coursework

Technical papers

We have writers in almost all fields including the most technical fields. You don’t have to worry about the complexity of your paper. Simply enter as much details as possible in the place order section.