ICTCYS612 Self-Study Guide Version 1.0
docx
keyboard_arrow_up
School
Northeastern University *
*We aren’t endorsed by this school
Course
612
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
4
Uploaded by PresidentPanther2925
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
Page 1
of 4
SELF-STUDY GUIDE
ICTCYS612 Design and implement
virtualised cyber security
infrastructure for organisations
produce and serve
food for buffets
SITHCCC038
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
About this document
This document is to be used as a self-study guide at home/in your own time to complement the formal
learning you are doing as part of your classroom or online studies. It is a requirement of your course that you complete the activities in this guide.
You will need to take your notes/completed activities to class, or follow your trainer’s direction about how to complete activities. If you are unsure about anything, talk to your trainer/assessor. Self-study Guide
Unit code and title
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
Instructions You are to complete each of the self-study tasks below. Each activity is a mandatory part of your study. After completing each of the tasks, tick the box below to show that you have completed the activity and bring evidence of this to class to share. Page 2
of 4
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
Activity
Task
Expected
time
Completed
Watch Watch the following video:
https://www.youtube.com/watch?v=ehxDFhzsa6E
(05:16) Write notes for class:
What are your key takeaways from the video?
What did you find inspiring?
What did you agree with?
Is there anything you disagree with? Explain.
Has this video prompted you to think differently? How?
2 hours
Practical activity
Brainstorm common risks associated with the cybersecurity infrastructure of an organisation. Conduct a risk assessment for each of the risks you identified.
What is the likelihood of the risk?
Identify what a high, low, critical or moderate risk is.
What is the threat of the risk?
What is the vulnerability?
What is the asset and consequence?
4 hours
Research Research the general cyber security requirements for an organisation. How can you analyse an organisation’s operations to determine requirements? What are organisational operations? What is an organisational infrastructure? Take notes to share in class. 4 hours
Review
Review your assessment requirements for this unit and read through your Project Portfolio so you know what you will be required to do. Make sure you review your Student Guide if you need to revisit some areas of your training. Ask your trainer any questions before you begin your assessment to ensure you understand all of the learning and are ready to be assessed.
3 hours
Reflection Reflect on the following:
2 hours
Page 3
of 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ICTCYS612 Design and implement virtualised cyber security infrastructure for organisations
Activity
Task
Expected
time
Completed
Information learned during your training
Your main key “takeaways” from this unit
What did you learn that you didn’t know already? How can you apply this in your study/work/life?
What did you find challenging or confronting? How did you overcome these challenges or barriers?
Page 4
of 4