In this part of W5 Assignment 2, you will complete the course project you started in Week 1.
You will focus on network security based on your network topology and
logical network design. You will also consider physical security,
information security, and appropriate security technologies.
Using the South University Online Library or the Internet, research network security tools and network security diagrams.
Continuing with the course project, on the basis of your research and reading, complete the following tasks this week:
- Choose a network management tool and a security
tool that can be used in your network design. There are many other tools
that you can explore. Justify your selections. An example of a network
monitoring tool is Paessler Router Traffic Grapher (PRTG). Click here to access the tool.
- Update the vendor and costs table from W4 Assignment 2 based on the updates you made to the proposed network design.
- Finally, add a network
security diagram using any of the tools that you have downloaded so
far. You may also look for examples of network security diagrams over
Compile your answers to both parts of this
assignment in a 7- to 8-page Microsoft Word document. Include a
discussion in your response on how to utilize the knowledge/experience
gained from the hands-on labs of Weeks 1–5 in doing the course project assignment components.
Support your responses with appropriate research, reasoning, and examples.
Cite any sources in APA format.