NECBF Wk 3 Information Systems Security Policy Lab Report
Week 3: LAB #3 Defining an Information Systems Security Policy Framework for an IT Infrastructure
Please, use your Lab manual to complete Lab 2. This lab manual features step-by-step instructions for completing the following hands-on lab exercises: Please, refer to your manual Lab 2.
As you work through each lab, you will be instructed to record specific information or take a screen capture to document the results you obtained by performing specific actions. The deliverables are designed to test your understanding of the information, and your successful completion of the steps and functions of the lab. All of these documentation tasks should be pasted into a single file (MS Word .doc, .docx, or other compatible format) and submitted for grading by your instructor. You will create two deliverable files for each lab: Lab Report file(including screen captures taken at specific steps in the lab) Lab Assessment file (including answers to questions posed at the end of each lab)You may use either Microsoft® Word or any other compatible word processing software for these deliverables. For specific information on deliverables, refer to the Deliverables section in each lab.