Some of the projects that your group may choose to work on are, but not limited to (please choose only one) :
Work on the case study provided
Network security in virtualised data centres
Deployment of advanced authentication and encryption
Tracking and tracing cyber attacks
Network security and disaster recovery
....or, the project of your own choice
Please consider the project case of Lloyds Business School as a MODEL CASE SCENARIO. However, your group can choose to work on it, if they wish to. Furthermore, you are encouraged to select and work on any organisational network security project (including your workplace).
It is important to note that, whether you work on one of above suggested projects or the project of your own choice, the final outcome of the course is to deliver a network security plan.
Your task is to produce a network security plan and demonstrate its technical implementation in order to address the organisation's network security requirements.
tracking and tracing cyber attacks is the topic we have chosen to develop
USEFUL WEB RESOURCES
USEFUL WEB RESOURCES. Select to mark as complete.
URL What is a RACI Chart or Matrix? URL Not completed: What is a RACI Chart or Matrix?. Select to mark as complete.
This web resources provides a good overview of RACI matrix including its benefits in managing project communications. This website provides techniques to create RACI charts and templates as well.
You may use this website as one of your resources to build a RACI Matrix for your project, that you need to submit as a part of your Project Plan due in Week 4.
URL Security Planning URL Not completed: Security Planning. Select to mark as complete.
This web resources discusses about the network security policy guidelines and this may assist you to creating/ enhancing the network security plan and policies for the project that you will be working on.
URL Best Practices for Enterprise Security URL Not completed: Best Practices for Enterprise Security. Select to mark as complete.
This web resouces provides a collection of white papers focusing on the different aspects of security in enterprise networks.
As you will see, these white papers are grouped into three knowledge areas of Security Backgrounders, Security Primers and Security Best Practices. These discussions may assist you to create and implement a security concept in the project that you will be working on.
URL The Ultimate Network Security Checklist URL Not completed: The Ultimate Network Security Checklist . Select to mark as complete.
This web resource may provide you a good help to get started with network security plan for your project.
URL Example Security Plan Template URL Not completed: Example Security Plan Template. Select to mark as complete.
This web resource may provide you a good overview of a Security Plan. Although the template may consist many items that are not relevant to your project, it still gives you a basis to think and plan.
9 freelancers are bidding on average ₹14427 for this job
Hi, I am a CISSP, CCSK, CEH and ISO27001 LA, trainer and consultant. I have delivered training on Cloud Security with AWS. I can deliver this in a weeks time if given a chance.