...Appendix A Final Project Overview and Timeline Final Project Overview In completing each assignment, you build the sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview of your final project company...
Words: 899 - Pages: 4
...Associate Program Material Appendix A Final Project Overview and Timeline Final Project Overview In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements: • Deployment scenario • IEEE wireless network type • Access point management • Location of wireless devices • Wireless security policy Final Project Timeline Budget your time wisely and work on your project throughout the course. Some of the discussion questions, CheckPoints, and assignments in the course will assist you in creating your final project. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to complete your project successfully. □ Suggested in Week One: Read the Final Project Overview and Timeline in Appendix A. Review Appendix I and Appendix J. □ Suggested in Week Three: Begin to identify the hardware components that your network may use based on the list of components compiled in the Wireless Network Components assignment. You will not be able to finalize this list...
Words: 446 - Pages: 2
...Syllabus NT2799 Network Systems Administration Capstone Project SYLLABUS Credit hours: 4.5 Contact hours: 56 (34 Theory, 22 Lab) Prerequisite(s): Completion of a minimum of 72 credits earned in the program of study including NT2640 IP Networking or equivalent. © ITT Educational Services, Inc. All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail...
Words: 7871 - Pages: 32
...contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from the series of seminar attended and visitation organized. Recommended/Required Materials Main Reference(s) | Newspapers, magazine, articles, journals, research paper | Course Assessment Participation | : | 5% | Assignments/Project | : | 45% | Final Examination | : | 50% | Total: | 100% | Course Requirements & Policies Example: You are expected to fulfill the following...
Words: 832 - Pages: 4
...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...
Words: 3381 - Pages: 14
... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...
Words: 1433 - Pages: 6
...Information Assurance 1 The Necessity of Information Assurance Adam Smith Student ID: Western Governors University The Necessity of Information Assurance 2 Table of Contents Abstract ........................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Project Scope .............................................................................................................................. 6 Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details .......................................................
Words: 12729 - Pages: 51
...DETAILED RESPONSE REQUIREMENTS 10 EXECUTIVE SUMMARY 10 SCOPE, APPROACH, AND METHODOLOGY 10 DELIVERABLES 11 PROJECT MANAGEMENT APPROACH 11 DETAILED AND ITEMIZED PRICING 11 APPENDIX: REFERENCES 11 APPENDIX: PROJECT TEAM STAFFING AND BIOGRAPHIES 11 APPENDIX: COMPANY OVERVIEW 12 EVALUATION FACTORS FOR AWARD 13 CRITERIA 13 SCOPE OF WORK 14 REQUIREMENTS 14 DELIVERABLES 14 USING THIS TEMPLATE Savid Technologies has developed this Request For Proposal (“RFP”) template to help organizations identify and select a quality security vendor to perform professional services work. This template is absed off templates provided by Foundstone, Verisign, and other security institutions including countless RFP responses Savid has provided. It also lists questions organizations should consider asking potential vendors to ensure that a thorough and comprehensive approach to the project will be taken. This template should apply for a variety of information security projects including: External Network Vulnerability Assessment and Penetration Testing Internal Network Vulnerability Assessment and Penetration Testing Web Application Penetration Testing Dial-In / RAS Security Testing DMZ or Network Architecture Designs / Reviews Wireless Network Assessment and Penetration Testing Virtual Infrastructure Security Assessment Server Configuration Reviews Firewall and Router Configuration Reviews VPN Configuration...
Words: 2629 - Pages: 11
...______________________________________________________________________________ Project Name NSA Capstone Project Charter ______________________________________________________________________________ Prepared By: [insert name] Date of Publication: [insert date] Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 9-27-14 | Josh | Started Charter | 2.0 | 10-4-14 | All members | Provided each of our parts of charter | | | | | | | | | | | | | Table of Contents Project Description 3 Project Objectives 3 Project Scope 4 In Scope: 4 Out of Scope: 4 Deliverables Produced: 4 Stakeholders: 5 Requirements: 5 Acceptance Criteria:Project Estimated Effort/Cost/Duration 5 Estimated Cost: 6 Estimated Effort Hours: 6 Estimated Duration: 6 Project Assumptions 7 Project Risks 7 Project Constraints 8 Project Dependencies 8 Project Approach 8 Project Organization 9 Communication Plan: 9 Project Guidelines: 9 Project Approvals 10 Project Description Ace’s IT Solutions will design and implement a fully functional network infrastructure for Greenway Bank. The equipment that is currently at all locations is outdated and will be replaced with state-of-the-art compatible systems. There are four branches which are located in: New York, Seattle, Orlando, and Los Angeles. The headquarters will be located in St. Louis. This location will have system capability and capacity to provide data storage...
Words: 1815 - Pages: 8
...Games construction project Programme Baseline Report Champion Products are examples of tools and formats used by the Olympic Delivery Authority (ODA) in executing its programme. The ODA is publishing these as part of its Learning Legacy in the anticipation that they may be of use to future projects seeking best practice examples of tools and templates that have been used successfully on a large, complex programme. Purpose of the document, description and how it was used The purpose of the Programme Baseline Report was to provide a comprehensive summary of the ODA’s Olympic Programme, detailing scope, programme, budget and risk against which performance could be measured both internally and externally. The scope defined in the report includes all works required regarding site platform and infrastructure, venues, transport, and legacy transformation. This document was used to present a comprehensive statement of the scope of works required and the necessary budget for delivery. Once the document was agreed at the commencement of the programme, delivery of the works was monitored against the baseline and change could be managed robustly. Olympic Delivery Authority Programme Baseline Report Summary November 2007 report The report was updated in 2009 reflecting the status of the programme two years after the original report and after substantial completion of the ODA’s Games-time scope. Benefit to future projects This Champion Product...
Words: 37339 - Pages: 150
...this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic materials are available on the student website. Software TestOut LabSim® Network+ Week One: Evolution of the Telecommunications Industry Details Due Points Objectives 1.1 Describe the evolution of the telecommunications industry and its major technologies. 1.2 Identify past and present voice communications technologies. 1.3 Describe telecommunications network structures....
Words: 2225 - Pages: 9
...Final Project Report for Media Tracking System Version 2.0 approved [pic] Table of Contents Table of Contents i Revision History iii Group Members iii 1. Final Project Summary i 1.1. Content Summary i 1.2. Lessons Learned ii 1.3. Learning Outcomes Summary ii 1.3.1 Communications iii 1.3.2 Critical Thinking v 1.3.3 Network Design v 1.3.4 Management Information Systems v 1.3.5 Systems Administration and Scripting vi 1.3.6 Security vi 1.3.7 Employability vi 2. Future directions vii 3. Annotated Bibliography viii 4. Appendix A: Vision and Scope viii 5. Appendix B: Status Report 1 15 6. Appendix D: Presentation Slides 27 7. Appendix E: Other Deliverables/Artifacts 27 Revision History |Name |Date |Reason For Changes |Version | |Kenneth Wright |07/01/2010 |Initial Draft |1.0 | |Kenneth Wright, et al |07/15/2010 |With contributions and edits from all team members, we |1.5 | | | |refined the document | | |Kenneth Wright, et al |07/23/2010 |Style, editing, additional information from all team |1.6 ...
Words: 3643 - Pages: 15
...Appendix A Final Project Overview and Timeline Final Project Overview In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations. The organization is growing and expanding their operations with the acquisition of a plant in China as well as several other offices throughout the United States. The following are the requirements for the new wide area network. • The network should be designed using all new equipment. • The design document must recommend the types of lines that should be used for each location (i.e. Ethernet, fiber, satellite, and so forth). • There are multiple departments that must be grouped logically to address security. Locations: o Headquarters—Atlanta, Georgia • Houses corporate operations, marketing, administrative staff, and accounting o Engineering—Atlanta, Georgia (across the street from the headquarters building office) • Houses sales and engineering o Distribution offices—Chicago, Phoenix, and New York • Each distribution office has a small sales staff as well as administrative staff. o Plant facility—China • Weekly meetings are held in the corporate conference room at headquarters, with people attending from multiple locations, including China, New York, Chicago, and Phoenix. Final Project Timeline You should budget your time wisely and work on your project throughout the...
Words: 416 - Pages: 2
... This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and...
Words: 2455 - Pages: 10
...| Project Scope & Charter | Metro Detroit Consolidated Health Care | | Project designed by IT Solutions | | Shane Bireley, Mike Beasinger, Matt Dunham, Kenneth Tolliver III, Seth Opoku | 5/31/2013 | | Statement of Work Project Title: Metro Detroit Consolidated Health Care Introduction: Metro Detroit Consolidated Health Care which consists of five doctors that have formed a partnership and would like to consolidate their businesses to leverage their investments and provide better service to their patients. Each of the existing five offices will remain intact. One located in the center of the city, one in the north, another in the south, and the remaining two on the west and east sides. Each of the lead doctors would like to tend to their patients at any of the sites, and access any of their patients’ information from any of the sites. The doctors’ offices can be open 6 to 14 hours per day (7 a.m.-9pm.), depending on when the doctors are in. Metro Detroit Consolidated Health Care has asked IT Solutions to provide consultation of a complete networking infrastructure. This project will be comprised of a three phase approach. Each phase will include examples defining the phase process: * Scope of the phase * Materials used for that segment of the phase * Cost of goods used for the segment * Timeline of the work to be accomplished foe that phase * Structural drawing * Placement of cables, outlets, and hardware used in that phase ...
Words: 1178 - Pages: 5