Assessment Description Since networks are not homogeneous, cybersecurity professionals must be skilled in creating a hybrid network, joining computers to the domain, and developing security policies i
Get perfect grades by consistently using www.college-experts.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
Assessment Description
Since networks are not homogeneous, cybersecurity professionals must be skilled in creating a hybrid network, joining computers to the domain, and developing security policies in the network to maintain access control.
Note: Complete the “Virtual Cybersecurity Infrastructure Lab” first before beginning this assignment.
Part 1
- View “Access Control via Active Directory Lab – Parts 1-3” within the Video Playlist: Technology Implementation of Security Solutions, located in Class Resources.
- Set static IP addresses on the three new VMs: Windows Server 2019 (192.168.1.10) Windows 10 (192.168.1.11) and Ubuntu (192.168.1.12)
- Configure the following in the Windows Server 2019: DNS, DHCP, Active Directory. DHCP should be set up with IPv4 and IPv6.
- Create a domain name. (Example: sample.com)
- Join the Windows 10 and Ubuntu virtual machines to the domain.
- Using Active Directory, create login policies in Server 2019 for users.
- Log in three times as a user, including one failed login.
- Generate login logs to report the number of successful and failed logins.
- Provide screenshots of the network domain name, the range of IP addresses in the DHCP server, policies that were created in the Active Directory, and the login logs.
Part 2
Write a 500- to 700-word lab report (to include all screenshots from Part 1) addressing the following:
- Summarize the issues encountered, lessons learned, and successes in a bullet point format.
- Describe the screenshots provided.
- Explain 2-3 benefits of having a hybrid network.
- Describe the role of Active Directory in accessing information.
- Explain how reviewing the security logs could be helpful in a security operations center (SOC).
Make sure to support the report with at least 2 credible resources other than the textbook.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.
Get a 15% discount on your order using the following coupon code SAVE15
Order a Similar Paper Order a Different Paper