Ethical hacking
Ethical hacking
Information assurance
Assignment 1:
1.Write a brief reflection on this course and on how it will aid your professional career and development.
- How will this course impact your professional objectives?
- What were the major work-related lessons that you learned?
- How will this course prepare you for further studies related to your chosen professional career?
Assignment 2:
Zero Trust Security – Never Trust, Always Verify
Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
The strategy around Zero Trust means that you should not trust anyone. This means cutting off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized.
Discussion/Research Questions
- Briefly explain your views on what the zero trust architecture is attempting to solve?
- How do you build a Zero Trust Architecture?
The initial post is due by Thursday 11:59 pm EST. At least two replies to other students are due by Sunday 11:59 pm EST
Assignment 3
Write a brief reflection on this course and on how it will aid your professional career and development.
- How will this course impact your professional objectives?
- What were the major work-related lessons that you learned?
- How will this course prepare you for further studies related to your chosen professional career?