Computer Science Homework Help

Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place (200-250 words per course reflection. If you were a full time

Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place (200-250 words per course reflection. If you were a full time student and took 2 courses, you should write a total of 400-500 words).

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

Students should;

  • Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.
  • Be able demonstrate the application of theory to workplace in written form.
  • Be able to identify the benefits of incorporating real-world experience into an academic program.

Below are the courses and syllabus

Access  Control:

·       Define the authorization and the access to an IT infrastructure based on an access control policy framework.

·       Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.

·       Analyze how a data classification standard impacts an IT infrastructure’s access control requirements and implementation.

·       Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.

·       Assess the consequences of failed access controls and mitigate unauthorized access.

·       Apply various access control methods to solve a range of business challenges.

·       Define proper security controls for information systems within IT infrastructures.

·       Explore ways to secure the facilities that house sensitive resources and use biometric technology to verify identity.

·       Design appropriate authentication solutions throughout an IT infrastructure based on user types and data classification standards.

·       Utilize policies, standards, guidelines, and procedures to implement and maintain access control.

·       Implement a secure remote access solution.

·       Implement PKI and encryption solutions to ensure the confidentiality of business communications.

·       Mitigate risk from unauthorized access to IT systems through proper testing and reporting.

Telecomm Network Security:

Course Objectives/Learner Outcomes: 

Upon completion of this course, the student will: • 

Explain the fundamental concepts of network security. (Major Instructional Areas: Network security risks, threats, and vulnerabilities) • Describe the fundamental functions performed by firewalls. (Major Instructional Areas: Firewall types, functions, uses, and deployment strategies) • Describe the foundational concepts of VPNs. (Major Instructional Areas: VPN types, functions, uses, and deployment strategies) • Recognize the impact that malicious exploits and attacks have on network security. • Describe network security implementation strategies and the roles each can play within the security life cycle. (Major Instructional Areas: Network-centric TCP/IP protocols and applications) • Identify network security management best practices and strategies for responding when security measures fail. (Major Instructional Areas: Layered network security strategies; secure network design; best practices and strategies for network security and incident response) • Manage and monitor firewalls and understand their limitations. • Assess firewall design strategies and apply firewall management best practices. • Appraise firewall and other security options available for personal and small office/home office (SOHO) environments. • Appraise elements of VPN implementation and management. • Describe common VPN technologies. • Follow the creation of an example firewall implementation and an example VPN implementation. • Evaluate available resources and trends in network security.