CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
$149.99$275.00
CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CYB 360 Week 1 Wireless Network Needs and Requirement
CYB 360 Week 2 Wireless Site Survey
CYB 360 Week 3 Configuring a Secure Wireless Network Part 1
CYB 360 Week 3 Team Technical Specification Document
CYB 360 Week 4 Configuring a Secure Wireless Network Part 2
CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation
CYB 360 Week 5 Attack Vectors and Wireless Network Hardening
CYB 360 Week 5 Packet Capture Analysis
Description
CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CYB 360 Week 1 Wireless Network Needs and Requirement
CYB 360 Week 2 Wireless Site Survey
CYB 360 Week 3 Configuring a Secure Wireless Network Part 1
CYB 360 Week 3 Team Technical Specification Document
CYB 360 Week 4 Configuring a Secure Wireless Network Part 2
CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation
CYB 360 Week 5 Attack Vectors and Wireless Network Hardening
CYB 360 Week 5 Packet Capture Analysis
CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CYB 360 Week 1 Wireless Network Needs and Requirement
Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following:
- Design requirements that must be addressed
- Justification to use different frequencies, channels, and antennae in the installation
- Regulatory requirements to consider in implementation
- Security requirements
Create a 1/2- to 1-page table for your team. In the table, summarize possible frequency choices, including an explanation of the strength and weakness of each.
CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CYB 360 Week 2 Wireless Site Survey
Perform a basic assessment of a familiar environment (e.g., your home, work, or a local business). Identify the following:
· Your goal (e.g., provide wireless coverage for a two-story house with two desktop computers and a printer)
· Possible sources of interference
· Existing wireless infrastructure
· Potential access point placement
· Potential antenna placement
· Potential equipment and supporting equipment
Note: You may provide photographs to support the site survey.
Based on your visual inspection of the site, create a 1- to 2-page site survey. Provide your conclusions from your assessment and detail the following:
· Methods of gathering information
· Information gathered
· Possible sources of interference
· Existing wireless infrastructure
· Recommendations for access point and antenna placement
· Recommendations for equipment and supporting equipment
No plagiarism. APA format
CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX
CYB 360 Week 3 Configuring a Secure Wireless Network Part 1
Your office has implemented a WLAN and needs you to configure the WLAN environment with three Cisco Meraki™ MR62 wireless access points (WAPs) in order to access the Internet and intercommunicate. Security is not overly important at this time.
WAP Placement:
The Visio® diagram provided, “Office Wireless Network,” shows the placement of each WAP within the building.
Firewall:
The firewall is located in the Data Center.
IP Information:
The organization has an external IP address of 23.4.178.126 and uses private IPv4 space on the 10 network. The IP space for internal routers and access points is 10.0.1.x with all IPs available above 10.0.1.10.
Before working on this assignment, research the wireless access pointon the Cisco Meraki™ documentation site.
Using the information from the Cisco Meraki™ site, document the configuration value to implement each device in the “WLAN Configuration Design Template” to allow all networked computers to communicate with each other and the Internet.
Complete the 1-page “WLAN Configuration Design Template” spreadsheet.
Create 1- to 2-page diagram depicting the process you took to identify the appropriate configuration settings for each device. Your audience is your director, so be clear and explain the vulnerabilities that exist in the implemented environment.
For the diagram you can use Visio®, Microsoft® Word, or PowerPoint® or other appropriate application.