You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients in Los Angeles, North Star Software Developers (NSSD), called with a big problem.
CYBERLEET TRAINING MANUAL
Manual Overview
You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients in Los Angeles, North Star Software Developers (NSSD), called with a big problem. Some of its network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the company’s software products. It is not presently known whether this attack came from inside or outside of the company. NSSD is currently dealing with this problem as best as it can, but it needs your company to help prevent this from happening again in the future.
You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place.
Manual Layout
There are seven sections of the manual that cover all the components of a training manual designed to teach employees how to lessen the risk of a security breach and mitigate the effects of a breach should one happen. As the training manager, you must complete each section using information you learned in this course. Refer to the background information on North Star Software Developers (NSSD) and apply the appropriate tools and methods that will help the company defend its network against attacks and detect intrusions, anomalies, and vulnerabilities. Apply best practices of network defense and countermeasures from your research and hands-on lab activities. The following are the main sections of the manual you are responsible for completing:
Introduction and Purpose
Traffic Analysis
Firewalls
Intrusion Detection and Prevention
Vulnerability Assessment
Network Scanning and Assessment
Auditing and Log Collection
Summary of Tools
References
Delete this page before submitting your completed training manual.
alt=” “
alt=” “
North Star Software Developers
Company Training Manual
Prepared by:
[Learner first and last name]
Introduction and Purpose 5
0.1 Introduction 5
0.2 Purpose of This Manual 5
Section One: Traffic Analysis 6
1.1 Significance of Traffic Analysis 6
1.2 Traffic Analysis Tools and Methodology 6
Section Two: Firewalls 7
2.1 Significance of Firewalls 7
2.2 Firewall Tools and Methodology 7
Section Three: Intrusion Detection and Prevention 8
3.1 Significance of Intrusion Detection and Prevention Systems (IDPS) 8
3.2 IDPS Tools and Methodology 8
Section Four: Vulnerability Assessment 9
4.1 Significance of Vulnerability Assessment 9
4.2 Vulnerability Assessment Tools and Methodology 9
Section Five: Network Scanning and Assessment 10
5.1 Significance of Network Scanning and Assessment 10
5.2 Network Scanning and Assessment Tools and Methodology 10
Section Six: Auditing and Log Collection 11
6.1 Significance of Auditing and Log Collection 11
6.2 Auditing and Log Collection Tools and Methodology 11
Section Seven: Tools Used 12
7.1 A Brief Overview of Tools Used in This Manual 12
Section Eight: References 13
Introduction and Purpose
0.1 Introduction
Provide an overview of the company (North Star Software Developers), its current issues and concerns, and your role in helping with these problems.
Delete this prompt language when you are finished writing your response.
0.2 Purpose of This Manual
Explain the purpose of this manual. Why is it important that information technology employees at NSSD apply the principles and practices described in this manual? What is at stake if they do not appropriately apply their training and provide high-quality defense and mitigation strategies to the NSSD network?
Delete this prompt language when you are finished writing your response.
Section One: Traffic Analysis
1.1 Significance of Traffic Analysis
Explain the significance of traffic analysis as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss some best practices in the area of traffic analysis based on your research and lab activities.
Delete this prompt language when you are finished writing your response.
1.2 Traffic Analysis Tools and Methodology
A. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
B. Discuss how the tools work to analyze traffic on the network. Offer some examples.
C. Provide screenshots from the labs illustrating tool configuration and outputs.
Delete this prompt language when you are finished writing your response.
Section Two: Firewalls
2.1 Significance of Firewalls
Explain the significance of firewalls as a core tenet of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Based on your research and lab activities, discuss some best practices in the area of usage and configuration.
Delete this prompt language when you are finished writing your response.
2.2 Firewall Tools and Methodology
A. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
B. Discuss how the tools work to protect the network. Offer some examples.
C. Provide screenshots from the labs illustrating tool configuration and outputs.
Delete this prompt language when you are finished writing your response.
Section Three: Intrusion Detection
3.1 Significance of Intrusion Detection Systems (IDS)
Explain the significance of intrusion detection as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss the key functions of IDS technologies. Discuss some best practices in the area of intrusion detection based on your research and lab activities.
Delete this prompt language when you are finished writing your response.
3.2 IDS Tools and Methodology
A. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
B. Discuss how the tools work to detect intrusions on the network. Offer some examples.
C. Provide screenshots from the labs illustrating tool configuration and outputs.
Delete this prompt language when you are finished writing your response.
Section Four: Vulnerability Assessment
4.1 Significance of Vulnerability Assessment
Explain the significance of a vulnerability assessment as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss the key functions of vulnerability scanning technologies. Discuss some best practices in the area of vulnerability scanning and assessment based on your research and lab activities.
Delete this prompt language when you are finished writing your response.
4.2 Vulnerability Assessment Tools and Methodology
A. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
B. Discuss how the tools work to assess vulnerabilities the network. Offer some examples.
C. Provide screenshots from the labs illustrating tool configuration and outputs.
Delete this prompt language when you are finished writing your response.
Section Five: Network Assessment
5.1 Significance of Network Assessment
Explain the significance of network assessment as a core activity of network defense and cybersecurity. Be sure to define the term and use specific details and examples to illustrate its meaning in a business context. Discuss the key functions of network scanning technologies. Discuss some best practices in the area of network assessment based on your research and lab activities.
Delete this prompt language when you are finished writing your response.
5.2 Network Assessment Tools and Methodology
A. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance and rationale for selecting these tools.
B. Discuss how the tools work to detect rogue devices and malicious connections on the network. Offer some examples.
C. Provide screenshots from the labs illustrating tool configuration and outputs.
Delete this prompt language when you are finished writing your response.
Section Six: Auditing and Log Collection
6.1 Significance of Auditing and Log Collection
Explain the significance of auditing and log collection as a core activity of network defense and cybersecurity. Be sure to define the terms and use specific details and examples to illustrate its meaning in a business context. Discuss the key activities of auditing and log collection. Discuss some best practices in the areas of auditing and log collection based on your research and lab activities.
Delete this prompt language when you are finished writing your response.
6.2 Auditing and Log Collection Tools and Methodology
A. Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
B. Discuss how the tools work to audit the network and generate reports. Offer some examples.
C. Provide screenshots from the labs illustrating tool configuration and outputs.
Delete this prompt language when you are finished writing your response.
Section Seven: Tools Used
7.1 A Brief Overview of Tools Used in This Manual
List a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.
Delete this prompt language when you are finished writing your response.
Section Eight: References
List all references used in the creation of this document here (if applicable). References (and citations) must be in APA format.
Delete this prompt language when you are finished writing your response.
1
Draft Document
Company Manual Page | 13
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.