ICTCYS612 Self-Study Guide Version 1.0

docx

School

Northeastern University *

*We aren’t endorsed by this school

Course

612

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by PresidentPanther2925

Report
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Page 1 of 4 SELF-STUDY GUIDE ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations produce and serve food for buffets SITHCCC038
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations About this document This document is to be used as a self-study guide at home/in your own time to complement the formal learning you are doing as part of your classroom or online studies. It is a requirement of your course that you complete the activities in this guide. You will need to take your notes/completed activities to class, or follow your trainer’s direction about how to complete activities. If you are unsure about anything, talk to your trainer/assessor. Self-study Guide Unit code and title ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Instructions You are to complete each of the self-study tasks below. Each activity is a mandatory part of your study. After completing each of the tasks, tick the box below to show that you have completed the activity and bring evidence of this to class to share. Page 2 of 4
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Activity Task Expected time Completed Watch Watch the following video: https://www.youtube.com/watch?v=ehxDFhzsa6E (05:16) Write notes for class: What are your key takeaways from the video? What did you find inspiring? What did you agree with? Is there anything you disagree with? Explain. Has this video prompted you to think differently? How? 2 hours Practical activity Brainstorm common risks associated with the cybersecurity infrastructure of an organisation. Conduct a risk assessment for each of the risks you identified. What is the likelihood of the risk? Identify what a high, low, critical or moderate risk is. What is the threat of the risk? What is the vulnerability? What is the asset and consequence? 4 hours Research Research the general cyber security requirements for an organisation. How can you analyse an organisation’s operations to determine requirements? What are organisational operations? What is an organisational infrastructure? Take notes to share in class. 4 hours Review Review your assessment requirements for this unit and read through your Project Portfolio so you know what you will be required to do. Make sure you review your Student Guide if you need to revisit some areas of your training. Ask your trainer any questions before you begin your assessment to ensure you understand all of the learning and are ready to be assessed. 3 hours Reflection Reflect on the following: 2 hours Page 3 of 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations Activity Task Expected time Completed Information learned during your training Your main key “takeaways” from this unit What did you learn that you didn’t know already? How can you apply this in your study/work/life? What did you find challenging or confronting? How did you overcome these challenges or barriers? Page 4 of 4