Reference no: EM133998357 , Length: Word Count:750
Assessment 1:
Introduction
You will submit work in tutorial activities during the study period. This is an individual assessment.
The following are laboratory activities (tutorial) that you are to perform and submit weekly.
Tutorial 1:
Analyze and explain the malware reports on the following website:
Explain deep inspection analysis.
Tutorial 2:
Analyze and explain the malware reports on the following website:
Cuckoo.cert.ee
Explain deep inspection analysis.
Tutorial 3:
Watch and following an introduction video on Microsoft Defender.
Explore and explain Microsoft Defender features and activities as per the youtube videos and features.
Tutorial 4-5
Create Intune Free Account intune.microsoft.com (may need to signup via the MS Evaluation Software)
Create a Device Policy
Create an App Policy
Create a Provisioning Policy
Create a Managed Device - Compliance Policy
Note: You will need an Outlook account (create one for free). Free account cannot enroll a device (e.g. Win 11 virtual machine). Hence, just go
through the setup configurations.
Tutorial 6
Create Entra Free Account entra.microsoft.com
Create Users
Go through the Identity, Identity Governance, and Protection Tabs and explain how they can be used.
Assessment 2:
Introduction
Assignment 1 is an individual video assessment. You will use Malware Analyser to perform deep analysis on a suspected file (e.g. a file from virus
vault) and determine if the file is malicious.
Your video will be 6-8 minutes long. You may be required to perform a face-to-face questions and answers.
Warning: Only do this in a virtual environment. See the laboratories for details.
In a Windows Machine with Cuckoo.cert.ee or joesandboxcloud.com or any.run (need to sign up) download a malware file from one of the following
links. Perform a security deep inspection analysis or deep-dive. In a Sandbox (only in a sandbox in a virtual machine) on malware and determine how the machine is detected.
Explain your steps in the video. No AI shortcuts — Only authentic assignment help from real expert tutors.
Explain what you have achieved and how detection was measured.
Explain how a malware would not be detected with regards to your analysis.
Explain how you determined it was a malicious file (e.g. explain the processes or network packets it tried to execute)
Assessment 3:
Introduction
This is an individual assessment. You will deploy a Software Deployment Server (e.g. Microsoft System Centre Configuration Manager (SCCM) or the
new End Point Manager or Open Source,
You will set up a virtual environment (see laboratories for details).
You will deploy the Software Deployment Software and demonstrate and explain software deployment, configurations and end-point health and
security posture. In addition to adding a client (e.g. Ubuntu/Windows) to OSPI and pushing out an agent and deploying software.
You will submit a video with your face(s) (compulsory) and your voice(s) explaining the steps, and justification and show the Software Deployment
Software pushes out applications updates, patches, code, etc.