Description
Instructions for Assessment 3
Part 1 – Eliminating Threats With a Layered Security Approach Lab
Note: Not all sections mentioned in the lab’s directions are required for this assessment.
(ALL LABS ARE COMPLETED, PLEASE SEE THE SCREENSHOTS ON THE COURSE ASSESSMENT TEMPLATE).
Based on the specific actions taken in the lab, interpret the importance of disabling unneeded services and the potential detriment if these efforts are not taken. (PLEASE SUBMIT ON THE COURSE ASSESSMENT TEMPLATE SECTION PART 1.3 RESPONSE)
Part 2 – Security Planning: Password Management and Logging Standards Presentation
Consider the following policies using information found in the Course Security Scenario as context.
Password Management.
Logging Standards.
Your presentation must include audio narration with supporting visual depictions.
(PLEASE SUBMIT THE NOTES FOR THE AUDIO NARRATION, YOU CAN USE POWERPOINT)
Consider the following scoring guide criteria as you complete your assessment:
Provide required screenshots that document lab completion.(Screenshots are completed)
Create a password management policy that is appropriate for the Course Security scenario.
Create a logging standards policy that is appropriate for the Course Security scenario.
Interpret the importance of disabling unneeded services and the potential detriment if this is not done.
Create a presentation that accurately communicates a security plan to stakeholders.
Additional Instructions
Place your written work and all screenshots from Part 1 (make sure to include the step number associated with each screenshot) in the Assessment X Template. Submit a zip file containing both the Assessment X Template and the Part 2 presentation file.