by Brian Leakey | Oct 5, 2023 | Security
How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.
by Brian Leakey | Sep 28, 2023 | Security
Discussion Questions: 1) In your own words, construct an overview of the critical information sector you choose for this discussion. 2) Examine at least three of the following: Unique aspects as they relate to national securityRisks/threats/hazards/vulnerabilities...
by Brian Leakey | Sep 28, 2023 | Security
Discuss the importance of installing an application-based security scanner on a personal workstation. In one paragraph, describe the name and version of a potential security scanner and its core features. In a second paragraph, describe any risks or threats mitigated...
by Brian Leakey | Sep 28, 2023 | Security
Discuss the importance of installing an application-based security scanner on a personal workstation. In one paragraph, describe the name and version of a potential security scanner and its core features. In a second paragraph, describe any risks or threats mitigated...
by Brian Leakey | Sep 7, 2023 | Security
Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.
by Brian Leakey | Sep 5, 2023 | Security
Assuming you are planning to work in the Northern Virginia area after graduation. There are some resources to prepare you for this. This week’s discussion is about planning for your future. 1. Review the 2022 Labor Market:...