Title: SEC 420Expect Success/newtonhelp.com
1SEC 420 strExpect Success/newtonhelp.com
2SEC 420 Week 1 Discussion Ethical Hacking
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Ethical Hacking" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Suppose a coworker approaches you and asks what
an ethical hacker does.
3SEC 420 Week 2 Discussion Scanning for Exploits
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Scanning for Exploits" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph - Suppose you work as a security analyst and during
a weekly meeting your supervisor asks for your
opinion about the ways in which the department
could best identify vulnerabilities that a hacker
could potentially exploit on a network.
4SEC 420 Week 2 Lab Assignment 1 Footprinting and
Reconnaissance
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab 1 (Exercise I) Collecting Information on
Target Website Using Firebug. -
-
- Lab Assignment 1
- Due Week 2 and worth 38 points
- Complete the following EC-Council Labs.
5SEC 420 Week 3 Discussion Viruses and Antivirus
Utilities
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Viruses and Antivirus Utilities" Select one of
the following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph - Go to the web, research new worms or viruses.
Analyze the primary manner in which one
particular virus or worm was successful.
6SEC 420 Week 3 Lab Assignment 2 Scanning Networks
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab 1 (Exercise IV) Understanding Network
Scanning Using Nmap -
-
- Lab Assignment 2
- Due Week 3 and worth 59 points
- Complete the following EC-Council Labs.
7SEC 420 Week 4 Discussion What if ?
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "What If?" Select one of the following and
discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Review the What if case in Chapter 4 from the
Book Attack Phases.
8SEC 420 Week 4 Lab Assignment 3Enumeration
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab 2 (Exercise V) "Performing Network
Enumeration Using NetBIOS Enumerator. -
- Lab 3 (Exercise VI) Enumerating a Network Using
SoftPerfect Network Scanner. -
- Lab Assignment 3
- Due Week 4 and worth 59 points
9SEC 420 Week 5 Discussion What if ?
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "What If?" Select one of the following and
discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Review the What if case in Chapter 5 from
Attack Phases.
10SEC 420 Week 5 Lab Assignment 4 System Hacking
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab 5 (Exercise V) Dumping and Cracking SAM
Hashes to Extract Plaintext Passwords. -
- Lab 6 (Exercise III) Auditing System Passwords
Using L0phtCrack. -
-
- Lab 7 (Exercise XV) Viewing, Enabling, and
Clearing the Auditing Policy Using Auditpol. -
-
- Lab Assignment 4
11SEC 420 Week 6 Discussion Internet Security
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Internet Security" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Review the source below. Pay particular
attention to the viruses and worms mentioned and
the details surrounding its attack.
12SEC 420 Week 6 Lab Assignment 5Malware Threats
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab Assignment 5
- Due Week 6 and worth 59 points
- Complete the following EC-Council Labs.
- Note Labs contain deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Ethical Hacking and Countermeasures Threats and
Defense Mechanisms (2nd ed.).
13SEC 420 Week 7 Discussion System Upgrade
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "System Upgrade" Select one of the following and
discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Imagine a scenario where Jane, an administrative
employee of a company, receives a call from
James, the companys security administrator.
14SEC 420 Week 7 Lab Assignment 6 Sniffing
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab Assignment 6
- Due Week 7 and worth 38 points
- Complete the following EC-Council Labs.
- Note Labs contain deliverables that are
partially derived from the following course
required textbook
15SEC 420 Week 8 Discussion Phishing
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Phishing" Select one of the following and
discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Research phishing schemes on the web.
16SEC 420 Week 8 Lab Assignment 7 Social Engineering
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Lab Assignment 7
- Due Week 8 and worth 59 points
- Complete the following EC-Council Labs.
17SEC 420 Week 9 Discussion What If
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "What If?" Select one of the following and
discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Consider the what if case in Chapter 6 of
Threats and Defense Mechanisms.
18SEC 420 Week 9 Web Application Attack Scenario
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- Assignment Web Application Attack Scenario
- Due Week 9 and worth 220 points
- Suppose that you are currently employed as an
Information Security Manager for a medium-sized
software development and outsourcing services
company.
19SEC 420 Week 10 Discussion Buffer Overflow
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Buffer Overflow" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph - Explain one of the challenges that a hacker faces
when attempting to cause a segmentation fault by
overflowing a buffer.
20SEC 420 Week 11 Security in the Future
- For more course tutorials visit
- uophelp.com is now newtonhelp.com
- www.newtonhelp.com
-
- "Security in the Future" Discuss in no less than
three paragraphs, and have at least one response
to another student of at least one paragraph - Based on what you've learned in this course, give
your opinion on the current state of the security
industry.
21SEC 420 strExpect Success/newtonhelp.com