CCSI 460 Course Inspiring Minds / tutorialrank.com - PowerPoint PPT Presentation

About This Presentation
Title:

CCSI 460 Course Inspiring Minds / tutorialrank.com

Description:

For more course tutorials visit www.tutorialrank.com   Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following   date and time of transactions protocol used to communicate with the server – PowerPoint PPT presentation

Number of Views:10
Slides: 18
Provided by: kanidone

less

Transcript and Presenter's Notes

Title: CCSI 460 Course Inspiring Minds / tutorialrank.com


1
CCSI 460 Course Inspiring Minds/
tutorialrank.com
The Best way to predict the Future is to create
it.....To Best way....
www.tutorialrank.com
2
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 1 Homework
Analyze the wireshark packet capture file called
week1.pcap in doc sharing. view the packet and
produce a short report including the following
date and time of transactions protocol used to
communicate with the server All IPs utilized Mac
Address of PC Communicating with the server
3
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 1 Lab Survey of Forensic Toolkits
CCSI 460 Week 1 Lab Survey of Forensic Toolkits
4
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 2 Current Issues in Digital
Forensics
CCSI 460 Week 2 Current Issues in Digital
Forensics
5
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 2 Homework
CCSI 460 Week 2 Homework
6
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 2 MD5SUM Hash Value Image Report
CCSI 460 Week 2 MD5SUM Hash Value Image Report
7
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 3 Homework
Week 3 homework Download the picture Doc
Sharing called hidden.jpg. Use md5um to get the
hash value of the file and size. Download the
program steghide.zip from Doc Sharing. You will
use this program to hide another picture inside
the hidden.jpg image (its a command line program
so you will need some time working with it).
8
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 3 Lab Report Internet Research
CCSI 460 Week 3 Lab Report Internet Research
9
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 4 Homework
Week 4 homework Analyze the Wireshark packet
capture fils called ftp.pcap in Doc Sharing.View
the packets and produce a short report including
the following. Date and time of
transactions Protocol used communicate with
server All IPS utilized Usename of connection
10
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 4 Lab Report Hard Drive Image
Analysis
Lab Number and Title Lab4 Hard Drive Image
Analysis Summary of Findings The source code was
exposed by means of criminal activity that Denny
Vette was involved in through 1/2/02. There were
many items found through the analysis of the hard
drive that indicate hacking, steganographic, and
cryptographic activities.
11
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 5 Homework
Week 5 homework Stalk yourself or a family
member. Pretend that you a cyber stalker and you
are going to stalk yourself. Provide a summary on
the information that you found about yourself.
Are there things you found that surprised you? Do
you feel you have control over your information
on the internet? Please do not provide the
specific information you found concerning
yourself, only provide a summary of your thought
concerning it. Tip Try searching your address,
phone number, Facebook page, Twitter account,
and even maiden name, etc. Think uot-of-the-box
for this one. You should try a variety of
12
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 5 Lab Report Bid ridding and Cyber
Stalking
CCSI 460 Week 5 Lab Report Bid ridding and
Cyber-Stalking
13
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 6 Homework
Week 6 homework Mobile Phone Photo
Analysis Your client has been accused of a crime.
You have take the clients phone and acquired the
image called client.jpg. The hash for the files
is 059B138917504F80599E556F3017B246. The client
says that this photo will help to clear him or
her of the investigation. You need to determine
the date, time, and locations of the photo. Look
for the actual location (not the GPS coordinates,
but youll need to use those to find the
location).What steps should be taken next to
validate the claims of the client?
14
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 7 Course Project Forensic System
Image Investigation
CCSI 460 Week 7 Course Project Forensic System
Image Investigation
15
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 7 Homework Honeypot Research
Research two different honeypots that are
available to use free or open source. List the
sites and honeypots that you selected. Discuss
the benefits of utilizing a virtual machine for
the implementation of the honeypots that you
selected (one paragraph). What resources would
you need to be able to set up and utilize a
honeypot for the https//devryu.instructure.com
domain (two paragraphs)?
16
CCSI 460 Course Inspiring Minds/ tutorialrank.com
CCSI 460 Week 7 Homework Honeypot Research
Research two different honeypots that are
available to use free or open source. List the
sites and honeypots that you selected. Discuss
the benefits of utilizing a virtual machine for
the implementation of the honeypots that you
selected (one paragraph). What resources would
you need to be able to set up and utilize a
honeypot for the https//devryu.instructure.com
domain (two paragraphs)?
17
CCSI 460 Course Inspiring Minds/ tutorialrank.com
The Best way to predict the Future is to create
it.....To Best way....
www.tutorialrank.com
Write a Comment
User Comments (0)
About PowerShow.com