For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Lab Details Unit 2 Lab: Patching, Securing Systems, and Configuring Antivirus Outcomes addressed in this activity: Unit Outcomes: Determine secur

Lab Details

Unit 2 Lab: Patching, Securing Systems, and Configuring Antivirus

Outcomes addressed in this activity:

Unit Outcomes:

Determine secure software concepts.Modify a system by patching and securing it.Modify a system by configuring antivirus software.

Course Outcome:

IT544-1: Determine vulnerabilities in both systems and application software configurations.

Purpose

As you read about security breaches in the news, you are bound to read about a situation where the breach occurred because software was not patched, or ports on software systems were left open, or antivirus solutions were not configured properly (to name a few reasons). In this Lab, you will secure and patch a Windows Server® operating system. The intent of the Lab is for you to determine vulnerabilities in software systems and to take the proper steps to make them more secure.

Part 1:

Complete the Lab called Patching, Securing Systems, and Configuring Anti-Virus. In the Lab environment, you will find step-by-step instructions. As you work through the Lab, there will be capture-the-flag challenges. To provide proof you captured the flags, you will need to take screenshots of the flags you capture. After capturing all flags, there will be one last thing you will do, which is to take a screenshot of the threat you detected in the Lab from the antivirus scan.

Part 2:

After you complete the Lab, you will write a 2-page report to stakeholders about the importance of patching and securing systems. You will compose this report within the same document as your Part 1 screenshots. Be sure to label your screenshots as Part 1 and your report as Part 2 in your Word document. Your report must include the security measures used from the Lab, clearly explaining why the security measures from the Lab are important to prevent breaches. Provide the stakeholders with real-world examples of the possible ramifications to an organization if the proper security measures are not taken.

Lab Requirements

Place your work from Part 1 and Part 2 into a Microsoft® Word® document. For Part 2, the report should be at least 2 pages long. Support any assertions made with credible sources using APA style formatting.

For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Plagiarism

Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.

For more information on University’s Plagiarism policy, refer to the current University Catalog.

Directions for Submitting Your Lab

Name your Microsoft Word document according to this convention: IT544_Unit2_FirstNameInitialLastName. Submit your completed work to the Unit 2 Dropbox by the deadline.

Links for Labs> Patching, Securing Systems, and Configuring Anti-Virus

WhatsApp
Hello! Need help with your assignments? We are here