Each Lab Will Be Submitted Based On The Followed Log
Each Lab Will Be Submitted Based On The Followinglog Into The Toolwir
Each lab will be submitted based on the following: Log into the Toolwire LiveLabs environment. Complete the weekly labs described below using Toolwire LiveLabs. Provide deliverables in the form of documents, files, and/or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment.
Paper For Above instruction
The completion and submission of every lab exercise are critical components of the learning process in cybersecurity. This assignment involves engaging with the Toolwire LiveLabs environment to perform specified tasks that demonstrate understanding of layered security approaches, threat elimination strategies, and security best practices. The core task encompasses logging into the platform, executing the detailed steps outlined in each weekly lab guide, documenting the process with appropriate screenshots and written reports, and answering assessment questions related to each lab's objectives.
Specifically, for Lab 9 titled "Eliminating Threats With a Layered Security Approach," the student is required to generate a comprehensive lab report that includes visual evidence (screenshots) of critical steps, such as Part 1 (Steps 23 and 26), Part 2 (Steps 3, 5, and 10), and Part 3 (Steps 7 and 15). The report must be clear, organized, and demonstrate an understanding of how layered security strategies mitigate threats effectively. Additionally, students will prepare and submit answers to lab assessment questions that reflect their comprehension of the concepts, procedures, and security implications discussed in the lab.
The assignment encourages the use of Microsoft Word or OpenOffice to compile the report, ensuring proper formatting, grammar, punctuation, and spelling, as academic quality impacts grading. The deliverables include the completed lab report with embedded screenshots, the responses to assessment questions, and, optionally, a separate file for challenge questions if assigned by the instructor. The grading criteria emphasize thoroughness, accuracy, presentation, and the application of cybersecurity principles. Submissions that are incomplete, vague, or poorly formatted will result in lower scores, while comprehensive and well-documented work will earn higher marks, up to an 'A' standing for excellence.
References
- Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
- Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson.
- Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in computing. Pearson.
- Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress.
- Gordon, L. A., & Loeb, M. P. (2016). The Economics of Information Security. Communications of the ACM, 59(6), 46-52.
- Containment Strategies for Cyber Threats. Cybersecurity & Infrastructure Security Agency (CISA), 2020.
- National Institute of Standards and Technology (NIST). (2018). Framework for Improving Critical Infrastructure Cybersecurity. NIST.
- Ross, R., et al. (2013). Cloud Security and Privacy. O’Reilly Media.
- ISO/IEC 27001:2013. Information Security Management Systems (ISMS). International Organization for Standardization.
- Information Security Threats and Defense Strategies. SANS Institute, 2021.