SEC 420 Str Invent Yourself/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

SEC 420 Str Invent Yourself/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com "Ethical Hacking" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: – PowerPoint PPT presentation

Number of Views:3
Slides: 22
Provided by: narcissus535

less

Transcript and Presenter's Notes

Title: SEC 420 Str Invent Yourself/newtonhelp.com


1
SEC 420 Str Invent Yourself/newtonhelp.com
2
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 1 Discussion Ethical Hacking For
more course tutorials visit www.newtonhelp.com    
"Ethical Hacking" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph Suppose a coworker
approaches you and asks what an ethical hacker
does. She does not understand the role that an
ethical hacker plays in the security industry and
assumes that such a hacker intentionally causes
damage.
3
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 2 Discussion Scanning for Exploits
For more course tutorials visit www.newtonhelp.c
om     "Scanning for Exploits" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph
4
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 2 Lab Assignment 1 Footprinting and
Reconnaissance For more course tutorials
visit www.newtonhelp.com     Lab 1 (Exercise I)
Collecting Information on Target Website Using
Firebug. Lab Assignment 1 Due Week 2 and worth
38 points Complete the following EC-Council Labs.
5
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 3 Discussion Viruses and Antivirus
Utilities For more course tutorials
visit www.newtonhelp.com     "Viruses and
Antivirus Utilities" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph Go to the web, research
new worms or viruses. Analyze the primary manner
in which one particular virus or worm was
successful. Summarize the one way in which the
virus or worm avoided defense mechanisms. Suggest
at least two ways in which the infected parties
could have protected themselves from the threat.
6
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 3 Lab Assignment 2 Scanning
Networks For more course tutorials
visit www.newtonhelp.com     Lab 1 (Exercise IV)
Understanding Network Scanning Using Nmap
Lab Assignment 2 Due Week 3 and worth 59
points Complete the following EC-Council Labs.
7
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 4 Discussion What if ? For more
course tutorials visit www.newtonhelp.com     "Wha
t If?" Select one of the following and discuss
in no less than three paragraphs, and have at
least one response to another student of at least
one paragraph Review the What if case in
Chapter 4 from the Book Attack Phases. Discuss
the ethical concerns of Dougs actions. What
might the ramifications or consequences of his
actions be? Why?
8
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 4 Lab Assignment 3Enumeration For
more course tutorials visit www.newtonhelp.com    
Lab 2 (Exercise V) "Performing Network
Enumeration Using NetBIOS Enumerator. Lab 3
(Exercise VI) Enumerating a Network Using
SoftPerfect Network Scanner. Lab Assignment 3
9
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 5 Discussion What if ? For more
course tutorials visit www.newtonhelp.com     "Wha
t If?" Select one of the following and discuss in
no less than three paragraphs, and have at least
one response to another student of at least one
paragraph Review the What if case in Chapter 5
from Attack Phases. Discuss the ethical and legal
concerns of Brians actions. What might the
ramifications or consequences of his actions be?
Why?
10
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 5 Lab Assignment 4 System Hacking
For more course tutorials visit www.newtonhelp.com
    Lab 5 (Exercise V) Dumping and Cracking
SAM Hashes to Extract Plaintext Passwords. Lab
6 (Exercise III) Auditing System Passwords
Using L0phtCrack.
11
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 6 Discussion Internet Security
For more course tutorials visit www.newtonhelp.com
    "Internet Security" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph Review
the source below. Pay particular attention to
the viruses and worms mentioned and the details
surrounding its attack. Provide a brief summary,
and discuss your thoughts on the severity of the
threat, and how you would have dealt with the
problem.
12
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 6 Lab Assignment 5Malware Threats
For more course tutorials visit www.newtonhelp.com
    Lab Assignment 5 Due Week 6 and worth 59
points Complete the following EC-Council
Labs. Note Labs contain deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Ethical Hacking and Countermeasures Threats and
Defense Mechanisms (2nd ed.).
13
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 7 Discussion System Upgrade For
more course tutorials visit www.newtonhelp.com    
"System Upgrade" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph Imagine a scenario where
Jane, an administrative employee of a company,
receives a call from James, the companys
security administrator.
14
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 7 Lab Assignment 6 Sniffing For
more course tutorials visit www.newtonhelp.com    
Lab Assignment 6 Due Week 7 and worth 38
points Complete the following EC-Council Labs.
Note Labs contain deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Ethical Hacking and Countermeasures Threats and
Defense Mechanisms (2nd ed.).
15
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 8 Discussion Phishing For more
course tutorials visit www.newtonhelp.com     "Phi
shing" Select one of the following and discuss
in no less than three paragraphs, and have at
least one response to another student of at least
one paragraph Research phishing schemes on the
web. Find a recent scheme and summarize and
discuss why it may have been successful. What are
the red flags that one should look out for to
avoid becoming a victim, and what should one do
if one encounters such schemes?
16
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 8 Lab Assignment 7 Social
Engineering For more course tutorials
visit www.newtonhelp.com     Lab Assignment 7 Due
Week 8 and worth 59 points Complete the following
EC-Council Labs. Note Labs contain deliverables
that are partially derived from the following
course required textbook EC-Council Press.
(2017). Ethical Hacking and Countermeasures
Threats and Defense Mechanisms (2nd ed.).
17
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 9 Discussion What If For more
course tutorials visit www.newtonhelp.com     "Wha
t If?" Select one of the following and discuss in
no less than three paragraphs, and have at least
one response to another student of at least one
paragraph Consider the what if case in Chapter
6 of Threats and Defense Mechanisms. Why was the
Distributed Denial of Service (DDOS) attack
successful? What could have been done to protect
ones company from the attack?
18
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 9 Web Application Attack Scenario
For more course tutorials visit www.newtonhelp.com
    Assignment Web Application Attack
Scenario Due Week 9 and worth 220 points Suppose
that you are currently employed as an Information
Security Manager for a medium-sized software
development and outsourcing services company. The
Software Development Director has asked you to
provide a detailed analytical report for her
department regarding the most common web
application threats and the manner in which their
products could compromise customer financial
data.
19
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 10 Discussion Buffer Overflow For
more course tutorials visit www.newtonhelp.com    
"Buffer Overflow" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph Explain one of the
challenges that a hacker faces when attempting to
cause a segmentation fault by overflowing a
20
SEC 420 Str Invent Yourself/newtonhelp.com
SEC 420 Week 11 Security in the Future For
more course tutorials visit www.newtonhelp.com    
"Security in the Future" Discuss in no less
than three paragraphs, and have at least one
response to another student of at least one
paragraph Based on what you've learned in this
course, give your opinion on the current state of
the security industry. Take a position on whether
you believe that hackers or security personnel
have the greater advantage in the real world.
Provide a rationale for your response.
21
SEC 420 Str Invent Yourself/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com