...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...
Words: 2387 - Pages: 10
...Oracle SOA Suite 11g overview Break 10:45 – 11:00 11:00 – 12:00 12:30 – 1:00 1:00 – 2:00 2:00 – 3:00 3:00 – 4:00 4:00 Lab Set-up SOA Lab 0 – Oracle Service Bus Lunch SOA Lab 1 – Mediator & Adapters SOA Lab 2 – BPEL SOA Lab 3 – Business Rules Q&A - Wrap-up Lab Set-Up 3 Oracle BPM and SOA Solution Enterprise Modeling BPA Suite 11g Organization and Business Goals IT and Business Infrastructure Document Publish Repository Business Focus Social BPM Workspace Process Spaces Enterprise 2.0 Services Business Process Guides Unstructured Processes BPM Suite 11g User- centric Design BPM Studio Process Composer Process Analysis and Simulation WYDIWYE Model Multichannel Development BPEL Human Tasks Business Rules BAM SOA Suite 11g Service Infrastructure Unified Engine Business Catalog End-to-End Management Integration Services Scalable Architecture IT Focus Application Server Foundation Weblogic Suite 11g JEE Engine Security Services Messaging Scalability High Availability Unified Process Engine Unifies execution to reduce complexity and cost Oracle BPM Suite 11g Oracle BPM Suite 11g • Single efficient engine with Native BPMN 2.0 BPEL, Rules, and Human Workflow execution • Unifies execution of all types of processes • Unified runtime with SOA with shared SOA Services with common persistence, binding, policy management and adapters • Unified security with OPSS Value Value • Reduced complexity...
Words: 456 - Pages: 2
...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...
Words: 3209 - Pages: 13
...Module 3 Working with Methods and Encapsulation Lab 3.1 Creating a Method In this lab, you will complete two tasks related to Java methods. The tasks performed in this lab will help you use method overloading and understand ambiguous overloading. Task 1 Write a program for swapping two numbers. In the program: • Create a method by passing primitive values as parameters for checking the result. • Create another method by passing object references as parameters for checking the result. • Identify the difference between two outputs. Task 2 Write a Java program that accepts 10 numbers from the user and finds the greatest and smallest numbers among them. Create two methods, findGreatest() and findSmallest(), to find the greatest and smallest numbers, respectively. Task 3 Write a Java program that implements the following methods: • getNumbers()to accept two numbers from the user. • calculateHCD()to calculate the highest common divisor (HCD) of the two numbers. Please note that it should be a recursive function. • calculateLCM()to calculate the least common multiple (LCM) of the two numbers. Display()to display HCD and LCM. Submission Requirements: Compress your Java project folder and responses in a Microsoft Word document into one zipped folder and submit it to the instructor. Evaluation Criteria: Your submission will be evaluated against the following criteria using the lab rubric: Task 1 • Did you create a method by passing primitive...
Words: 384 - Pages: 2
...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...
Words: 22068 - Pages: 89
...Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet ............................................................................
Words: 48147 - Pages: 193
...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...
Words: 74170 - Pages: 297
...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file...
Words: 635 - Pages: 3
...tch Lab 4.4.2 VTP Configuration Challenge Topology [pic] Addressing Table |Device |Interface |IP Address |Subnet Mask |Default Gateway | |(Hostname) | | | | | |S2 |VLAN 99 |172.17.99.12 |255.255.255.0 |N/A | |S3 |VLAN 99 |172.17.99.13 |255.255.255.0 |N/A | |PC1 |NIC |172.17.10.1 |255.255.255.0 | | |PC2 |NIC |172.17.20.1 |255.255.255.0 | | |PC3 |NIC |172.17.30.1 |255.255.255.0 | | |PC4 |NIC |172.17.10.2 |255.255.255.0 | | |PC5 |NIC |172.17.20.2 |255.255.255.0 | | |PC6 |NIC |172.17.30.2 |255.255.255.0 | | Port Assignments...
Words: 1364 - Pages: 6
...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...
Words: 60675 - Pages: 243
...Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 70 Vocabulary Exercise: Completion on page 71 Concept...
Words: 2825 - Pages: 12
...Virtual Lab 1 1. Open the Server Manager console on your Windows Server 2008 computer. What selections are available to you in the left pane? The selections available to me include: Roles, Features, Diagnostics, Configuration, and Storage. 2. Using the Windows Help option, describe any roles and features that are currently installed on this server. There are currently no Roles or Features installed on the server. 3. Explain in your own words why it is a best practice to configure a server, such as a DNS server, with a static IP address rather than allowing it to obtain an IP address using DHCP. To put it simply, if the IP address of the server is consistently being changed by DHCP, then the ports that were opened up to allow the server to work through the firewall are going to be remain opened on the server’s old address, and not necessarily on the new one. This could cause applications to not run properly or at all, but worse, could create security vulnerabilities for the network. A static IP address allows other workstations on the network to easily keep track of the server. 4. Explore the netsh command menus. Record three commands that you can issue from the command line using netsh, and describe what each command does. 1. Exec- runs a script file 2. Add- adds a configuration entry to a list of entries 3. Online- sets the current mode to online Matt Carlson IT255.XM1.10WTR Instructor Vincent Tran January 9, 2010 Virtual Lab 2 ...
Words: 3462 - Pages: 14
...8650: Electrical, electronics, instrumentation industries 9110: Company specific/case studies 9510: Multinational corporations Geographic Names: Japan Companies: Matsushita Electric Corp of America Duns:00-891-9813 Sony Corp Ticker:SNE Duns:69-055-3649 Abstract: As companies transfer their R&D activities abroad, they will have to confront a challenging management issue: how to successfully operate R&D laboratories dispersed around the world. Both Matsushita Electric and Sony seem to have coped with this issue successfully by introducing new management systems and practices - redefining the mission and goals of their global R&D, assigning two types of projects at the same time, rather than specializing projects among different labs, coordinating not by large-scale committees or meeting but through human relationships among a small number of top R&D mangers, drastically changing their organizational structures. It appears that both companies have already realized some of the anticipated benefits. Full Text: Copyright Industrial Research Institute, Incorporated Mar/Apr 1999 [Headnote] A long tradition of conducting R&D overseas has helped these Japanese companies adapt to changing competitive conditions. [Headnote] OVERVIEW: As companies transfer their R&D activities abroad, they will have to confront a challenging management issue: how to...
Words: 6426 - Pages: 26
...respond using ISBARR? In the situation, Dr. Roberts seemed angry at the fact the patient’s labs were not available at the time he wanted to view them. As a nurse, it is better to focus on what is in the best interest of the patient and have control over your emotions. In order to maintain a collegial form of communication and not contribute to his anger, the best response would be in ISBARR. ISBARR allows for members of the interprofessional team to communicate in a professional manner (Weiss & Tappen, 2015). ISBARR is an acronym for introduction, situation, background, assessment, recommendation, and read-back. Within giving ISBARR, I would include the time the blood for the lab report was collected and sent for analysis. Also, I would be active in trying to solve the current problem. In this situation with an angry physician, ISBARR ignores the attitude of the doctor and focuses on the patient and their needs. 2. Explain the concept of accountability in delegation. What are the legal ramifications of accountability in delegation?...
Words: 651 - Pages: 3
...order to discuss individual grade calculations you can set up an appointment during your teacher’s office hours. Your science teacher will explain the grading policy during this meeting. Your child’s grades will also be available for you to view on line through a program called Pupil Path, www.Pupilpath.com Your child will receive the instructions and passwords for this within the first week of school. • Class participation –Class participation covers every aspect of a student’s behavior in the classroom. This includes the questions you ask, the comments you make, the notes you take, completion of class work, notebook check, presenting your reference tables and your prompt arrival to class. Students are expected to remain on task while in class and are accountable for their conduct. Class participation is 20% of your grade • Homework – Homework assignments must include the student’s name, period, date and the HW#. Every problem assigned must be attempted. Homework must be neat and submitted on a standard loose leaf paper. Sloppy homework will earn no credit. In addition, students must show all their work. You may also submit your homework electronically by sending it as an attachment to the following email:...
Words: 1313 - Pages: 6