Need Help Again Please!!

0 comments

In this part of W5 Assignment 2, you will complete the course project you started in Week 1.
You will focus on network security based on your network topology and
logical network design. You will also consider physical security,
information security, and appropriate security technologies.

Using the South University Online Library or the Internet, research network security tools and network security diagrams.

Continuing with the course project, on the basis of your research and reading, complete the following tasks this week:

  • Choose a network management tool and a security
    tool that can be used in your network design. There are many other tools
    that you can explore. Justify your selections. An example of a network
    monitoring tool is Paessler Router Traffic Grapher (PRTG). Click here to access the tool.
  • Update the vendor and costs table from W4 Assignment 2 based on the updates you made to the proposed network design.
  • Finally, add a network
    security diagram using any of the tools that you have downloaded so
    far. You may also look for examples of network security diagrams over
    the Internet.

Compile your answers to both parts of this
assignment in a 7- to 8-page Microsoft Word document. Include a
discussion in your response on how to utilize the knowledge/experience
gained from the hands-on labs of Weeks 1–5 in doing the course project assignment components.

Support your responses with appropriate research, reasoning, and examples.

Cite any sources in APA format.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}