Analyze the existing security situation in the organization.

 

    • Include a final network design.
    • Include a timeline for the project.
    • Explain the design approach and rationale.
    • Prove that the design meets the data rate requirements.
    • Analyze the existing security situation in the organization.
    • Identify the predominant electronic and physical threats to communications networks.
    • Explain the importance of explicit enterprise security policies and procedures.
    • Describe potential threat detection and protection techniques.
    • Explain the importance of explicit enterprise security policies and procedures.
    • Describe how firewalls mitigate some network attack scenarios.
    • List and describe common security concerns inherent to wired, wireless, and mobile networking.
    • Design a security hardware and software environment that will protect the organization.