Ensure your discussion applies to both current and new network technologies.Use an online video platform such as Loom, YouTub

Assessment Description

Cybersecurity professionals must be able to reduce the vulnerability of an organization's network by designing a secure network.

Part 1

Design a secure architecture for a fictional company.

View "Creating a Windows 11 VM in VirtualBox," within the Video Playlist: Technology Implementation of Security Solutions, located in Class Resources.

Design a corporate infrastructure diagram in Visio or another network mapping tool (this deliverable must be readable by your professor; Cisco Packet Tracer is not acceptable). Your network diagram must include a minimum of 2 routers, 2 firewalls, 4 switches, 1 IDS, 1 IPS, a proxy server, an email server, a DHCP server, a DMZ, and finally, 5 separate departments utilizing network segmentation with a minimum of 25 clients per department. You must also include an air-gapped system for your R&D department to utilize.

Perform the following tasks to complete the VirtualBox infrastructure:

  1. Create a Windows 11 VM and join it to the domain.
  2. Create a VM using an operating system of your choice that has not been created yet. It could be a different version of Windows or Linux. It is not necessary to join this VM to the domain.
  3. In a Microsoft Word document, supply screenshots demonstrating the successful creation of both VMs.

NOTE: MS Cyber Students, this infrastructure will be used in your CYB-610 course.

Develop the intellectual tools to explore and understand advance network concepts and protocols. Using your Kali Linux VM, perform a GVM Full and Fast vulnerability scan of your entire VirtualBox infrastructure.

Within the same Word document above, select 3-4 intellectual tools (e.g., Suricata, pfSense, Snort, etc.) and demonstrate how they work together to create a framework. Make sure to include them in your secure network design. Do not use Suricata, pfSense, or Snort for this part of the assignment.

The deliverables for Part 1 will include the corporate infrastructure diagram, a GVM Scan Report, and the Word document described above.

Part 2

Create a 5– to 7-minute screencast addressing the following:

  1. Explain all components and how they interact with each other within the secure network design created.
  2. Discuss the results of the GVM scan.
  3. Describe and discuss the security issues and implications of advanced and novel networks and protocols. Ensure your discussion applies to both current and new network technologies.

Use an online video platform such as Loom, YouTube, or Vimeo to upload your completed video.

Remember that video and audio quality are important and should be taken into consideration. Ensure your video is filmed with sufficient lighting and that the volume is adequate for viewers to hear. Intonation, expression, proper speech, and professional attire are expected.

In addition, make sure to integrate a variety of visuals to support the presentation.

You will be graded on your ability to provide:

  1. Detailed and cited content (to include a brief introduction and a reference section containing at least 3 resources)
  2. A comprehensive and consistent focus throughout the presentation
  3. Effective communication in your awareness of the audience
  4. Professionalism

Your final submission should include all the deliverables from Part 1 along with the Part 2 video link. Place the video link in the Word document from Part 1. Ensure that others can access and view the link to your video prior to submitting it.

Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite. 

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
Hello. Can we help you?