1 / 6

CIS 534 Teaching Effectively--snaptutorial.com

For more classes visit<br>www.snaptutorial.com<br>Case Study: The Ethical Hacker<br>Due Week 3 and worth 70 points<br>Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways,

Bailey102
Download Presentation

CIS 534 Teaching Effectively--snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 534 Teaching Effectively--snaptutorial.com

  2. CIS 534 Teaching Effectively--snaptutorial.com CIS 534 Week 3 Case Study The Ethical Hacker For more classes visit www.snaptutorial.com Case Study: The Ethical Hacker Due Week 3 and worth 70 points Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its

  3. CIS 534 Teaching Effectively--snaptutorial.com CIS 534 Week 4 Assignment 1 Defense in Depth For more classes visit www.snaptutorial.com Assignment 1: Defense in Depth Due Week 4 and worth 70 points  Oftentimes, the process of implementing security opens one’s eyes to other forms of security they hadn’t thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this

  4. CIS 534 Teaching Effectively--snaptutorial.com CIS 534 Week 8 Assignment 2 Mister Network Engineer For more classes visit www.snaptutorial.com Assignment 2: Mister Network Engineer Due Week 8 and worth 70 points  Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web

  5. CIS 534 Teaching Effectively--snaptutorial.com CIS 534 Week 10 Term Paper Project: Designing a Secure Network For more classes visit www.snaptutorial.com Term Paper Project: Designing a Secure Network Due Week 10 and worth 190 points  This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting

  6. CIS 534 Teaching Effectively--snaptutorial.com

More Related