Assessment Description Since networks are not homogeneous, cybersecurity professionals must be skilled in creating a hybrid network, joining computers to the domain, and developing security policies i

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

Assessment Description

Since networks are not homogeneous, cybersecurity professionals must be skilled in creating a hybrid network, joining computers to the domain, and developing security policies in the network to maintain access control.

Note: Complete the “Virtual Cybersecurity Infrastructure Lab” first before beginning this assignment.

Part 1

  1. View “Access Control via Active Directory Lab – Parts 1-3” within the Video Playlist: Technology Implementation of Security Solutions, located in Class Resources.
  2. Set static IP addresses on the three new VMs: Windows Server 2019 (192.168.1.10) Windows 10 (192.168.1.11) and Ubuntu (192.168.1.12)
  3. Configure the following in the Windows Server 2019: DNS, DHCP, Active Directory. DHCP should be set up with IPv4 and IPv6.
  4. Create a domain name. (Example: sample.com)
  5. Join the Windows 10 and Ubuntu virtual machines to the domain.
  6. Using Active Directory, create login policies in Server 2019 for users.
  7. Log in three times as a user, including one failed login.
  8. Generate login logs to report the number of successful and failed logins.
  9. Provide screenshots of the network domain name, the range of IP addresses in the DHCP server, policies that were created in the Active Directory, and the login logs.

Part 2

Write a 500- to 700-word lab report (to include all screenshots from Part 1) addressing the following:

  1. Summarize the issues encountered, lessons learned, and successes in a bullet point format.
  2. Describe the screenshots provided.
  3. Explain 2-3 benefits of having a hybrid network.
  4. Describe the role of Active Directory in accessing information.
  5. Explain how reviewing the security logs could be helpful in a security operations center (SOC).

Make sure to support the report with at least 2 credible resources other than the textbook.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper