sec 435 network penetration testing full course n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
SEC 435 NETWORK PENETRATION TESTING FULL COURSE-STRAYER PowerPoint Presentation
Download Presentation
SEC 435 NETWORK PENETRATION TESTING FULL COURSE-STRAYER

Loading in 2 Seconds...

play fullscreen
1 / 17

SEC 435 NETWORK PENETRATION TESTING FULL COURSE-STRAYER - PowerPoint PPT Presentation


  • 10 Views
  • Uploaded on

Visit Below Link, To Download This Course:\n\nhttps://www.tutorialsservice.net/product/sec-435-network-penetration-testing-full-course-strayer/\n\nOr \nEmail us on\nSUPPORT@TUTORIALSSERVICE.NET\n\nSEC 435 Network Penetration Testing Full Course-Strayer\nSEC435\nSEC435 Network Penetration Testing\nSEC 435 Week 1 DQ Latest-Strayer\nYou will need to create your own original thread. The create thread button is in the upper left corner once you click on the link above.\n“Session Hijacking” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:\n

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'SEC 435 NETWORK PENETRATION TESTING FULL COURSE-STRAYER' - tutorialsservicesnet


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
sec 435 network penetration testing full course

SEC 435 NETWORK PENETRATION TESTING FULL

COURSE-STRAYER

Visit Below Link, To Download This Course:

https://www.tutorialsservice.net/product/sec-435-network-penetration-testing-full-course-strayer/

Or

Email us on

SUPPORT@TUTORIALSSERVICE.NET

SEC 435 Network Penetration Testing Full Course-Strayer

SEC435

SEC435 Network Penetration Testing

SEC 435 Week 1 DQ Latest-Strayer

You will need to create your own original thread. The create thread button is in the upper left corner

once you click on the link above.

“Session Hijacking” Select one of the following and discuss in no less than three paragraphs, and have at

least one response to another student of at least one paragraph:

Consider the “What if” case in Chapter 1 from the Book:Web Applications and Data Servers and

respond to one or more of the questions asked.

Research the web, and discuss any recent story concerning session hijacking. Provide summary

and discussion on what might have been done to prevent such hijacking, or how such hijacking

can be recognized.

Any current topic or article related to penetration techniques.

The instructor insight.

While the minimum requirement is an original and single response, one can get much more from the class

by going beyond minimums and engaging in conversation with your professor or other students. I

encourage one to go beyond the minimum and those that can engage in four or more posts will truly learn

much more than what is just in the physical classroom or text books. I do give bonus points for extra

work assuming quality, and good writing.

I take the rubric seriously so I grade 20 percent of the post on style, format, and writing. So please

use good paragraphs, don’t write in mounds of text, and bury ideas. Use salutations in both the subject

line and the message. Use proper citations for any sources one uses. Never cut and paste from the

web or other source and use it by itself

web or other source and use it by itself as an original post, or response. Use direct quotes properly tied

to your words, or if you want to share an article or other material, do so as an additional post, with proper

citation.

SEC 435 Week 2 DQ Latest-Strayer

“Web Application Threats” Select one of the following and discuss in no less than three paragraphs, and

have at least one response to another student of at least one paragraph:

Review the attacks listed on the OWASP website, located

at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you

believe to be the greatest security threat, rank what you believe to be the top three greatest

security threats (e.g., cookie/session poisoning, platform exploits, etc.), and provide a rationale

for your rankings. Explain the key inherent dangers of the chosen threats, and indicate the key

reasons why you believe such threats pose more of a risk than other current ones in existence.

Justify your answer.

Review the attacks listed on the OWASP website, located

at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you

believe to be the greatest security threat, rank what you believe to be the top three greatest

security threats (e.g., cookie/session poisoning, platform exploits, etc.), discuss the appropriate

countermeasures that security personnel could utilize in order to minimize the damage of such

threats. Determine whether or not the countermeasures that you have ranked are reactive or

proactive in nature, and suggest the primary ways in which each countermeasure could assist in

preventing further damage from the threats in question. Explain whether or not honeypots would

assist in protecting and evaluating the three threats selected. Provide a rationale for your

response.

Any current topic or article related to penetration techniques.

The instructor insight.

Note: Reminder that you need to create your own original thread, use a proper subject, and have

salutations for all posts in the subject line and message, use proper paragraphs and citations if

you have sources, and that you are sharing your thoughts, not regurgitating the text or outside

sources. I encourage you to do more than just the minimum, and fully engage in conversations.

SEC 435 Week 3 DQ Latest-Strayer

“Cracking” Select one of the following and discuss in no less than three paragraphs, and have at least

one response to another student of at least one paragraph:

Based on the “What if” case in Chapter 4 from the Book:Web Applications and Data

Servers discuss the ethical aspects of what Regi did, and the possible ramifications of his actions.

Based on the “What if” case in Chapter 5 from the Book:Web Applications and Data

Servers discuss the ethics of whether the company had an obligation to report or not, and why?

What would you have done and why?

Any current topic or article related to penetration techniques.

The instructor insight.

sec 435 week 4 dq latest strayer

SEC 435 Week 4 DQ Latest-Strayer

“SQL Injection Attacks and Preventions” Select one of the following and discuss in no less than three

paragraphs, and have at least one response to another student of at least one paragraph:

Read Sammut, T., & Schiffman, M. (2013, April 5). Understanding SQL Injection. Retrieved

from http://www.cisco.com/web/about/security/intelligence/sql_injection.html.

Read Wichers, D., Manico, J., & Seil, M. (2014, April 12). SQL Injection Prevention Cheat Sheet.

Retrieved from https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet.

Describe the major concerns that information security professionals and SQL database

administrators should have with SQL injection attacks. Additionally, provide the key reasons why

you believe such attacks are popular among hackers, both malicious and ethical. Justify your

response.

Suggest what you believe to be the two most critical best practices for protecting against SQL

injection attacks, and establish whether or not you believe that there are significant efforts for

security professionals who implement these best practices. Provide a rationale for your response.

Any current topic or article related to penetration techniques.

The instructor insight.

SEC 435 Week 5 DQ Latest-Strayer

Case Study” Have an original post of no less than three or four paragraphs, and offer advice of a

paragraph or two to at least one other student. This is the proposal for your term paper due in week

9. Papers should not be written in a one week or weekend, but should take some time to research,

consider, and then draft. Once drafted, ideally, one sleeps on the paper, so one can proof and revise one

last time before submitting the final draft. I expect a 400 level paper, so give some thought to your case

study and provide me a short synopsis of what you hope to look at, why, and what you hope to learn or

accomplish.

Research the web and find an appropriate incident related to either a successful or failed

penetration testing effort, or a successful or unsuccessful hacking attempt against an

organization, business or government facility. For the discussion lay out the basic details of the

case, why you chose this case, and speculate on what specific lessons you learned from the

case, as well as possible recommendations for future situations. This proposal should be no less

than three or four paragraphs.

SEC 435 Week 6 DQ Latest-Strayer

“Macs and Viruses” Select one of the following and discuss in no less than three paragraphs, and have at

least one response to another student of at least one paragraph:

A common misconception with Mac OS X systems is that they are not as susceptible to viruses

and malware as PCs and therefore do not require users to apply additional security measures.

Discuss whether or not you believe this is true. Provide a rationale for your response.

Review current Mac security features from Apple’s website located at

http://www.apple.com/macos/security, and read the article 10 Best Antivirus for the Mac

at http techtop100 com 9 best antivirus

at http://techtop100.com/9-best-antivirus-for-mac-do-macs-need-antivirus-best-free-mac-antivirus.

Select two tools, and research their features, functionality, provided protections, mitigated risks,

costs, and any other pertinent information. Evaluate the quality of at least two of the selected Mac

security tools, based on their available features, functionality, provided protections, mitigated

risks, costs, and any other pertinent information discovered in your research. Decide whether or

not you would recommend either of the tools for a Mac user. Justify your response.

Any current topic or article related to penetration techniques.

The instructor insight.

SEC 435 Week 7 DQ Latest-Strayer

“Mobile Malware” Select one of the following and discuss in no less than three paragraphs, and have at

least one response to another student of at least one paragraph:

Determine whether or not you believe both that mobile malware is the new frontier for virus

makers and hackers and whether or not mobile device security concerns will surpass those of

standard computing devices over the next five years (e.g., desktops, servers, etc.). Justify your

response.

Analyze the mobile device OS that you believe is the easiest to hack. Additionally, explain the

ineffective security features that are utilized by this specific mobile device OS, and indicate the

key reasons why you believe the security feature is failing to provide better protection. Provide a

rationale for your response.

Any current topic or article related to penetration techniques.

The instructor insight.

SEC 435 Week 8 DQ Latest-Strayer

“What If?” Select one of the following and discuss in no less than three paragraphs, and have at least one

response to another student of at least one paragraph:

Read the “What if” case in Chapter 3 from the Book:Secure Network Operating Systems and

Infrastructures provide a brief summary and respond to the two questions that are asked.

Discuss any aspect of “honeypots” and share your views on the value of such honeypots for

ethical hackers, or how as a security professional you can protect yourself against providing such

honeypots for exploitation.

Any current topic or article related to penetration techniques.

The instructor insight

SEC 435 Week 9 DQ Latest-Strayer

Select one of the following and discuss in no less than three paragraphs, and have at least one response

to another student of at least one paragraph:

Imagine that a systems administrator for a midsized company has recently noticed numerous odd

characters in the log servers. Specifically, http “GET” and “POST” log entries within their

externally facing IIS version 5 web server. Discuss the use of the “GET” and “POST” commands

and decide whether or not there are concerns with their presence on the externally facing web

server. Next, provide your analysis of the most damaging attack (i.e. XSS, SQL Injection, CSS,

and Race conditions) against Internet Information Services (IIS). Support your rationale.

slide5

Describe the most prominent signs that a database attack has occurred. Suggest the main steps

that one would take to recover from such an attack. Next, propose one strategy you would use to

prevent such attacks.

Any current topic or article related to penetration techniques.

The instructor insight

SEC 435 Week 10 DQ Latest-Strayer

“Encryption in Organizations” Select one of the following and discuss in no less than three paragraphs,

and have at least one response to another student of at least one paragraph:

Suppose an executive-level manager asked you to explain the importance of encryption. Detail

the key points that you would use to justify the importance of using encryption during the overall

security posture analysis of the executive-level manager’s organization.

Research the web for examples of the manner in which security professionals could use

encryption in organizations today (e.g., database encryption), describe at least two uses of

encryption within organizations today that you found in your research. From the uses identified,

indicate the information resource the encryption is designed to protect. Assess the importance of

protecting such an information resource from a security perspective.

Any current topic or article related to penetration techniques.

The instructor insight.

SEC 435 Week 11 DQ Latest-Strayer

Share your thoughts in the class, and consider:

What you thought of the class;

Identify two new insights about network penetration testing you have discovered from this course,

and/or

Discuss the manner in which you can apply the learning outcomes of this course to your

professional and personal life.

And/or anything else you wish to comment on.

SEC 435 Week 1 Pre-Assessment-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Certification Readiness Assessment 1 and 2

Week Due

Title

Points

1

Certification Readiness Assessment 1: Pre-assessment

70

11

Certification Readiness Assessment 2: Post-assessment

70

a pre assessment and post assessment are part

A pre-assessment and post-assessment are part of the required materials for this course. These

assessments use the material covered within the course in order to evaluate your exam readiness.

Additional specifics surrounding the submission and grading of each assessment are located below.

Each assessment uses the same web-based CEH assessment and consists of two parts:

A screenshot of the CEH assessment results

A written self-assessment response

Pre-assessment/Post-assessment Completion Requirements

Complete the CEH assessment located at https://www.eccouncil.org/programs/certified-ethical-

hacker-ceh/ceh-assessment.

Note: Grading is based on participation and is not influenced by the objective score students

receive on the online assessment.

Take a screenshot of the results page upon completion of the CEH assessment.

Note: This screenshot serves as confirmation of the completed assessment. The screenshot

should at a minimum display your score and general on-screen items. It is not necessary to

include each of the itemized question results. Go to http://www.take-a-screenshot.org/ if you need

a tutorial on taking a screenshot.

Review the interactive results that are displayed with each question. Focus your efforts to gain an

understanding of your strengths and weaknesses with respect to the assessment topics, as well

as the overall concepts that require additional focus.

Please do not be discouraged if you get a low score. This is meant to be an assessment of your

knowledge, skills, and abilities coming into the course. It will help you and your Instructor to know

what you may need more instruction in and what you are already familiar with.

Pre-assessment/Post-assessment Submission Requirements

Submit one Microsoft Word document which contains:

1. A screenshot of the completed CEH assessment results.

2. Write a short answer self-assessment in good paragraphs in Word based on the CEH

assessment results in which you:

o

Summarize both your strengths and weaknesses with respect to the topics you covered

in the assessment.

o

Determine the concepts that you believe challenged you the most and/or those that

require additional focus.

Your assignment must follow these formatting requirements:

Combine both elements (screenshot and written self-assessment) into one Microsoft Word

document or an open-source equivalent.

Documentation must be typed, double-spaced, using Times New Roman font (size 12), with one-

inch margins on all sides.

Include a cover page containing the title of the assignment, your name, the professor’s name, the

course title, and the date. The cover page is not included in the required assignment page length.

click here to view the grading rubric for this

Click here to view the grading rubric for this assignment.

SEC 435 Week 1 Lab 1 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

If you have not logged into the iLabs environment yet, use your access code emailed to you by the

bookstore when you purchased the books to register.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the following:

a. Summarize the technical experiences in completing the lab assignment.

b. Identify the commands that were of greatest benefit to you.

c. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

LAB ASSIGNMENT 1

Due Week 1 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 1 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data

Servers (2nd ed.). Cengage Learning.

Lab VersionModule Title

LocationLab #: Title

Deliverable(s) for Submission

Strayer

SEC 435

1. Screenshots after Steps 13 and 24

Session Hijacking iLab

Lab 2 (Exercise I): “Session Hijacking Using Firebug”

ceh v9

(CEH v9)

Module 10

Click here to view the grading rubric for this assignment.

SEC 435 Week 2 Lab 2 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the following:

a. Summarize the technical experiences in completing the lab assignment.

b. Identify the commands that were of greatest benefit to you.

c. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

Lab Assignment 2

Due Week 2 and worth 40 points

Complete the following EC-Council Labs.

Note: Lab 2 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data

Servers (2nd ed.). Cengage Learning.

Lab

VersionModule Title

LocationLab #: Title

Deliverable(s) for Submission

Hacking

Webservers

Lab 1 (Exercise II): “Footprinting Webserver

Using the httprecon Tool”

Screenshots after Steps 4 and 10

strayer sec 435

Strayer

SEC

435

Screenshot after Step 8

iLab

Module

11

Lab 2 (Exercise III): “Footprinting a Webserver

Using ID Server”

2. Textbook: Web Applications and Data Servers–

(CEH

Chapter 2: Questions 1-2

v9)

Click here to view the grading rubric for this assignment.

SEC 435 Week 3 Lab 3 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the following:

a. Summarize the technical experiences in completing the lab assignment.

b. Identify the commands that were of greatest benefit to you.

c. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

Lab Assignment 3

Due Week 3 and worth 40 points

Complete the following EC-Council Labs.

Note: Lab 3 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data

Servers (2nd ed.). Cengage Learning.

lab version

Lab

Version

Module Title

LocationLab #: Title

Deliverable(s) for Submission

1. Screenshots after Steps 6,

10, and 13

Lab 3 (Exercise I): “Exploiting Parameter Tampering and XSS

Vulnerabilities in Web Applications”

Strayer

SEC 435

iLab

Module

12

Hacking Web

Applications

1. Screenshots after Steps 6,

17, and 21

Lab 4 (Exercise VII): “Website Vulnerability Scanning Using

Acunetix WVS”

(CEH v9)

Click here to view the grading rubric for this assignment.

SEC 435 Week 4 Lab 4 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the following:

a. Summarize the technical experiences in completing the lab assignment.

b. Identify the commands that were of greatest benefit to you.

c. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

LAB ASSIGNMENT 4

Due Week 4 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 4 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data

Servers (2nd ed.). Cengage Learning.

lab version 1

Lab

Version

Module TitleLocationLab #: Title

Deliverable(s) for Submission

iLab

Strayer

SEC 435

1. Screenshots after Steps 9, 16, and

28

SQL

Injection

Lab 1 (Exercise I): “SQL Injection Attacks on MS SQL

Database”

Module

(CEH v9)

13

Click here to view the grading rubric for this assignment.

SEC 435 Week 6 Lab 5 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the following:

a. Summarize the technical experiences in completing the lab assignment.

b. Identify the commands that were of greatest benefit to you.

c. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

Lab Assignment 5

Due Week 6 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 5 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage

Learning.

lab version 2

Lab

Version

Module Title

LocationLab #: Title

Deliverable(s) for Submission

iLab

Strayer

SEC 435

Hacking Wireless

Networks

Lab 1 (Exercise I): “Cracking a WEP Network with Aircrack-ng

for Windows.”

1. Screenshots after Steps 5

and 8

Module

(CEH v9)

14

Grading for this lab assignment will be based on the following rubric.

Click here to view the grading rubric.

SEC 435 Week 7 Lab 6 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the

following:

1. Summarize the technical experiences in completing the lab assignment.

2. Identify the commands that were of greatest benefit to you.

3. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and

spelling are necessary. Points may be deducted for poor writing.

Due Week 7 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 6 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage

Learning.

Lab

Version

Module Title

LocationLab #: Title

Deliverable(s) for Submission

Strayer

SEC 435

Hacking Mobile

Platforms

1. Screenshots after Steps 2 and

4

Lab 1 (Exercise I): “Creating Binary Payloads using Kali Linux to

Hack Android.”

iLab

2 screenshots after steps 6 17 and 22

2. Screenshots after Steps 6, 17,

and 22

Lab 2 (Exercise I): “Harvesting Users’ Credentials Using Social

Engineering Toolkit.”

(CEH v9)

Module

15

Click here to view the grading rubric for this assignment.

SEC 435 Week 8 Lab 7 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the

following:

1. Summarize the technical experiences in completing the lab assignment.

2. Identify the commands that were of greatest benefit to you.

3. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

Complete the following EC-Council Labs.

Note: Lab 7 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage

Learning.

Lab

Version

Module Title

LocationLab #: Title

Deliverable(s) for Submission

iLab

Strayer

SEC 435

1. Screenshots after Steps 15, 36

and 46

Evading IDS, Firewalls and

Honeypots

Lab 1 (Exercise I): “Detecting Intrusions

using Snort”

Module

(CEH v9)

16

Click here to view the grading rubric for this assignment.

SEC 435 Week 9 Assignment Case Study-Strayer

click the link above to submit your assignment

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Assignment: Case Study

Due Week 9 and worth 140 points

Research the web and find an appropriate incident related to either a successful or failed penetration

testing effort, or a successful or unsuccessful hacking attempt against an organization, business or

government facility. Lay out the details of the case, and provide your analysis of what was done and why,

and speculate on what should have been done, or could have been done differently. As part of your

analysis, you can speculate on what you might have done to change the outcome of your particular

case. Draw specific lessons from the case and possible recommendations for future situations.

Write a paper with no less than five pages in which you:

1. Research the web and identify a case study with an appropriate situation related to penetration

testing or hacking for or against a business, organization, or government facility.

2. Lay out the case details, and provide your analysis of what was done and why, the results of the

effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have

been attempted.

3. You may speculate on what actions you might have taken in a similar situation as part of your

analysis.

4. Draw specific lessons and recommendations from your analysis of the case as part of the

conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to

reflect what the paper accomplished once you finish your first draft.

5. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites

do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all

sides; citations and references must follow APA or school-specific format. Check with your

professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor’s name, the

course title, and the date. The cover page and the reference page are not included in the required

assignment page length.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and

language and writing skills, using the following rubric.

Click here to view the grading rubric for this case study.

SEC 435 Week 10 Lab Assignment 8 Latest-Strayer

click the link above to submit your assignment 1

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

1. Log into the EC-Council iLab environment.

2. Complete the weekly lab assignment described below using EC-Council iLab.

3. Submit the screenshots for the steps specified in each lab assignment.

4. Write a short answer in Word format and include with the assignment submission link the

following:

1. Summarize the technical experiences in completing the lab assignment.

2. Identify the commands that were of greatest benefit to you.

3. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary.

Points may be deducted for poor writing.

Complete the following EC-Council Labs.

Note: Lab 8 contains deliverables that are partially derived from the following course required textbook:

EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage

Learning.

Lab

Version

Module TitleLocationLab #: Title

Deliverable(s) for Submission

Lab 1 (Exercise I): “Building a Cloud Using OwnCloud and

Wampserver”

Strayer

SEC 435

1. Screenshots after 15, 22, 30, and 58

iLab

Module

17

Cloud

Computing

Lab 2 (Exercise II) “Transferring Cloud Data Over Secure

Channel”

2. Screenshots after 10, 15, 19, and 34

(CEH v9)

3. Screenshot after Step 15

Strayer

SEC 420

iLab

Module

18

Lab 1 (Exercise I): “Calculating MD5 Hashes and Verifying

File Integrity Using Quick Checksum Verifier”

Cryptography

4. Textbook: Secure Network Infrastructures–

(CEH v9)

Chapter 4 Questions 1-2

Lab 2 (Exercise III): “Basic Data Encryption Using VeraCrypt” 5. Screenshots after Steps 8 and 27

Lab 3 (Exercise IV): “Basic Data Encryption Using CrypTool” 6. Screenshots after Steps 8 and 28

Click here to view the grading rubric for this assignment.

SEC 435 Week 11 Post-Assessment-Strayer

click the link above to submit your assignment 2

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Certification Readiness Assessment 1 and 2

Week Due

Title

Points

1

Certification Readiness Assessment 1: Pre-assessment

70

11

Certification Readiness Assessment 2: Post-assessment

70

A pre-assessment and post-assessment are part of the required materials for this course. These

assessments use the material covered within the course in order to evaluate your exam readiness.

Additional specifics surrounding the submission and grading of each assessment are located below.

Each assessment uses the same web-based CEH assessment and consists of two parts:

A screenshot of the CEH assessment results

A written self-assessment response

Pre-assessment/Post-assessment Completion Requirements

Complete the CEH assessment located at https://www.eccouncil.org/programs/certified-ethical-

hacker-ceh/ceh-assessment.

Note: Grading is based on participation and is not influenced by the objective score students

receive on the online assessment.

Take a screenshot of the results page upon completion of the CEH assessment.

Note: This screenshot serves as confirmation of the completed assessment. The screenshot

should at a minimum display your score and general on-screen items. It is not necessary to

include each of the itemized question results. Go to http://www.take-a-screenshot.org/ if you need

a tutorial on taking a screenshot.

Review the interactive results that are displayed with each question. Focus your efforts to gain an

understanding of your strengths and weaknesses with respect to the assessment topics, as well

as the overall concepts that require additional focus.

Please do not be discouraged if you get a low score. This is meant to be an assessment of your

knowledge, skills, and abilities coming into the course. It will help you and your Instructor to know

what you may need more instruction in and what you are already familiar with.

Pre-assessment/Post-assessment Submission Requirements

Submit one Microsoft Word document which contains:

1.

1. A screenshot of the completed CEH assessment results.

2. Write a short answer self-assessment in good paragraphs in Word based on the CEH

assessment results in which you:

slide17

Summarize both your strengths and weaknesses with respect to the topics you

covered in the assessment.

Determine the concepts that you believe challenged you the most and/or those

that require additional focus.

Your assignment must follow these formatting requirements:

Combine both elements (screenshot and written self-assessment) into one Microsoft Word

document or an open-source equivalent.

Documentation must be typed, double-spaced, using Times New Roman font (size 12), with one-

inch margins on all sides.

Include a cover page containing the title of the assignment, your name, the professor’s name, the

course title, and the date. The cover page is not included in the required assignment page length.

Click here to view the grading rubric for this assignment.

Download Now