1 / 6

CIS 534 Enthusiastic Study / snaptutorial.com

Case Study: The Ethical Hacker<br>Due Week 3 and worth 70 points<br>Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified.

Stephenson5
Download Presentation

CIS 534 Enthusiastic Study / snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 534 Enthusiastic Study--snaptutorial.com

  2. CIS 534 Enthusiastic Study--snaptutorial.com CIS 534 Week 3 Case Study The Ethical Hacker For more classes visit www.snaptutorial.com Case Study: The Ethical Hacker Due Week 3 and worth 70 points Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified.

  3. CIS 534 Enthusiastic Study--snaptutorial.com CIS 534 Week 4 Assignment 1 Defense in Depth For more classes visit www.snaptutorial.com Assignment 1: Defense in Depth Due Week 4 and worth 70 points Oftentimes, the process of implementing security opens one’s eyes to other forms of security they hadn’t thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

  4. CIS 534 Enthusiastic Study--snaptutorial.com CIS 534 Week 8 Assignment 2 Mister Network Engineer For more classes visit www.snaptutorial.com Assignment 2: Mister Network Engineer Due Week 8 and worth 70 points Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

  5. CIS 534 Enthusiastic Study--snaptutorial.com CIS 534 Week 10 Term Paper Project: Designing a Secure Network For more classes visit www.snaptutorial.com Term Paper Project: Designing a Secure Network Due Week 10 and worth 190 points This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services.

  6. CIS 534 Enthusiastic Study--snaptutorial.com

More Related