-45%

CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX

$149.99$275.00

CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX

CYB 360 Week 1 Wireless Network Needs and Requirement

CYB 360 Week 2 Wireless Site Survey

CYB 360 Week 3 Configuring a Secure Wireless Network Part 1

CYB 360 Week 3 Team Technical Specification Document

CYB 360 Week 4 Configuring a Secure Wireless Network Part 2

CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation

CYB 360 Week 5 Attack Vectors and Wireless Network Hardening

CYB 360 Week 5 Packet Capture Analysis

Description

CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX

CYB 360 Week 1 Wireless Network Needs and Requirement

CYB 360 Week 2 Wireless Site Survey

CYB 360 Week 3 Configuring a Secure Wireless Network Part 1

CYB 360 Week 3 Team Technical Specification Document

CYB 360 Week 4 Configuring a Secure Wireless Network Part 2

CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation

CYB 360 Week 5 Attack Vectors and Wireless Network Hardening

CYB 360 Week 5 Packet Capture Analysis

CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX

CYB 360 Week 1 Wireless Network Needs and Requirement

Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following:

  • Design requirements that must be addressed
  • Justification to use different frequencies, channels, and antennae in the installation
  • Regulatory requirements to consider in implementation
  • Security requirements

Create a 1/2- to 1-page table for your team. In the table, summarize possible frequency choices, including an explanation of the strength and weakness of each.

CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX

CYB 360 Week 2 Wireless Site Survey

Perform a basic assessment of a familiar environment (e.g., your home, work, or a local business). Identify the following:

· Your goal (e.g., provide wireless coverage for a two-story house with two desktop computers and a printer)

· Possible sources of interference

· Existing wireless infrastructure

· Potential access point placement

· Potential antenna placement

· Potential equipment and supporting equipment

Note: You may provide photographs to support the site survey.

Based on your visual inspection of the site, create a 1- to 2-page site survey. Provide your conclusions from your assessment and detail the following:

· Methods of gathering information

· Information gathered

· Possible sources of interference

· Existing wireless infrastructure

· Recommendations for access point and antenna placement

· Recommendations for equipment and supporting equipment

No plagiarism. APA format

CYB 360 CYB360 CYB/360 ENTIRE COURSE HELP – UNIVERSITY OF PHOENIX

CYB 360 Week 3 Configuring a Secure Wireless Network Part 1

Your office has implemented a WLAN and needs you to configure the WLAN environment with three Cisco Meraki™ MR62 wireless access points (WAPs) in order to access the Internet and intercommunicate. Security is not overly important at this time.

WAP Placement:

The Visio® diagram provided, “Office Wireless Network,” shows the placement of each WAP within the building.

Firewall:

The firewall is located in the Data Center.

IP Information:

The organization has an external IP address of 23.4.178.126 and uses private IPv4 space on the 10 network. The IP space for internal routers and access points is 10.0.1.x with all IPs available above 10.0.1.10.

Before working on this assignment, research the wireless access pointon the Cisco Meraki™ documentation site.

Using the information from the Cisco Meraki™ site, document the configuration value to implement each device in the “WLAN Configuration Design Template” to allow all networked computers to communicate with each other and the Internet.

Complete the 1-page “WLAN Configuration Design Template” spreadsheet.

Create 1- to 2-page diagram depicting the process you took to identify the appropriate configuration settings for each device. Your audience is your director, so be clear and explain the vulnerabilities that exist in the implemented environment.

For the diagram you can use Visio®, Microsoft® Word, or PowerPoint® or other appropriate application.