OFFERS! offer image Get Expert-crafted assignments
Save 51%

CIS098- 2 Cyber Defence Tools, Assignment, University of Bedfordshire

Request Plagiarism Free Answer Published: 06 Jan, 2025
Category Assignment Subject Computer Science
University University of Bedfordshire Module Title CIS098- 2 Cyber Defence Tools

Unit learning Outcomes

1. Demonstrate the following knowledge and understanding:

Critically examine the frameworks, methodologies, tools and techniques for cyber defence and network attack analysis in terms of their effectiveness and suitability in different organisational contexts and threat landscapes

2. Demonstrate the following skills and abilities:

Flexibly and autonomously apply the frameworks, methodologies, tools, and techniques in real-time reputation intelligence in order to evaluate and respond to multi-faced attacks towards innovative and pragmatic solutions in network security

You are to research, investigate, demonstrate, and discuss a tool that will be allocated to you by the unit coordinator.
<Tool name – See your allocated topic in the “Assessment Topic Allocation.xlsx” file>

Task 1 :

Report your own work in a well-structured and written report with full explanations and justifications provided for tasks 2 to 4. Note the 15% for report structure, clarity of writing, and citations and references.

Task 2 :

You are required to research your allocated tool, briefly discussing its features, and its application in relation to Cyber Defence. You have to be very specific as to how this tool is used in Cyber Defence. No general textbook details, and no historical information about the tool should be included. Any content used from external sources must be written in your own words and cited using Harvard referencing (see Cite Them Right (citethemrightonline.com) and selecting Login via the institution option).

Task 3 :

You are to install, configure, and demonstrate the tool in operation using a walkthrough method (i.e. step-by-step with detailed explanations). For some allocated topics, you can use your host operating system (OS) to do the work, while for other topics, you may require the use of one or two VMs for the demonstration. As part of the demonstration, you have to capture full evidence in the form of screenshots, from your host OS, or VM(s) to confirm the operation of the tool. All commands and their results should be shown in the screenshots and not as cleartext in the report. All command parameters must be explained.

Your system or VM(s) MUST show your name or student’s ID. All screenshots must have your name or student’s ID appearing on them (not pasted as an image). For example, when using a VM, the VM name can be given your name or student’s ID. On a host, you can write the name or student’s ID in notepad to appear on all captured screens. Any screenshot with missing details will not be marked and may result in lower overall marks allocated to your work. VMWare Workstation can used in place of VirtualBox if issues are encountered with the latter.

Up to Five (5) marks deduction for failing to show your student ID in all screenshots will be incurred.

Task 4 :

Successfully complete the two Cisco courses Cyber Threat Management, and Network Defense, by the Friday of week 6 submitting the completion screens as evidence (You should only submit Gradebook output showing the completion with your username on it and the percentages of completion for each module). Five (5) marks deduction for failing to show your student ID on all screenshots will be incurred.

Task 5 Mini-Viva:

Each student will be required to attend a face-to-face mini-viva to be asked questions related to the tool they investigated and/or general ones related to the topic area of the tool. This will take place in week 6 during the Practical session.

Completing your CIS108-6 BLK2 Cyber Defence Tools Assignment can be easier with our online assignment help services. Our experts will assist you in researching and demonstrating cyber defence tools while critically examining frameworks and methodologies used in network attack analysis. With our computer science assignment help UK, you’ll learn how to evaluate security threats and apply real-time solutions. Need a guide? You can get free samples for your guidance to improve your understanding and writing. For detailed assignments, our dissertation writing services ensure well-structured, plagiarism-free work that meets university standards and helps you achieve better grades!

Workingment Unique Features

Hire Assignment Helper Today!


Latest Free Samples for University Students

QUALIFI Level 5 Unit 1: Theories, Principles and Models in Education and Training Assessment Example

Category: Assignment (Qualifi Level 5)

Subject: Management

University: __________

Module Title: QUALIFI Level 5 Unit 1: Theories, Principles and Models in Education and Training

View Free Samples

IS6138 Digital Governance and Compliance Assessment Answer PDF  | UCC

Category: Assignment

Subject: Business

University: University College Cork (UCC)

Module Title: IS6138 Digital Governance and Compliance

View Free Samples

BSNS5001 Organisations in an Aotearoa New Zealand Context Assessment Answer Solution PDF | Open Polytechnic

Category: Assignment

Subject: Business

University: Open Polytechnic (OP)

Module Title: BSNS5001 Organisations in an Aotearoa New Zealand Context

View Free Samples

BSRV4602 – Law for Real Estate Licensees Assessment 1 Answer Sample PDF | Open Polytechnic

Category: Assignment

Subject: Education

University: Open Polytechnic (OP)

Module Title: BSRV4602 – Law for Real Estate Licensees

View Free Samples

ABKA638 Certificate in MYOB Business Essentials Payroll Assessment Answer Solution| The Career Academy

Category: Assignment

Subject: Business

University: The Career Academy NZ

Module Title: ABKA638 Certificate in MYOB Business Essentials Payroll

View Free Samples
Online Assignment Help in UK