... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...
Words: 1433 - Pages: 6
...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...
Words: 60675 - Pages: 243
...# Lab Title 1 Performing Reconnaissance and Probing using Common Tools 2 Performing a Vulnerability Assessment 3 Enabling Windows Active Directory and User Access Controls 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control 5 Performing Packet Capture and Traffic Analysis 6 Implementing a Business Continuity Plan 7 Using Encryption to Enhance Confidentiality and Integrity 8 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities 9 Eliminating Threats with a Layered Security Approach 10 Impementing an Information Systems Security Policy# Lab Title 1 Performing Reconnaissance and Probing using Common Tools 2 Performing a Vulnerability Assessment 3 Enabling Windows Active Directory and User Access Controls 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control 5 Performing Packet Capture and Traffic Analysis 6 Implementing a Business Continuity Plan 7 Using Encryption to Enhance Confidentiality and Integrity 8 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities 9 Eliminating Threats with a Layered Security Approach 10 Impementing an Information Systems Security Policy# Lab Title 1 Performing Reconnaissance and Probing using Common Tools 2 Performing a Vulnerability Assessment 3 Enabling Windows Active Directory and User Access Controls 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control 5 Performing...
Words: 426 - Pages: 2
...Protocol (DHCP) Lab – 1: Installing DHCP Service Lab – 2: Creating a Scope Lab – 3: Creating DHCP Reservations Lab – 4: DHCP Server Backup and Restore Page No. 5 6 12 20 22 2 Domain Naming System (DNS) Lab – 1: Installing DNS Service Lab – 2: Creating Standard Primary Forward Lookup Zones Lab – 3: Creating Standard Primary Reverse Lookup Zones Lab – 4: Creating Secondary Zone Lab – 5: Creating Stub Zone Lab – 6: Creating Active Directory Integrated Primary zone Lab – 7: Conditional Forwarders Lab – 8: Forwarders Lab – 9& 10: Root Hints and Cache Server 24 25 27 33 38 42 44 47 48 49 3 Internet Information Services (IIS)- Web Server Lab – 1: Installing Internet Information Service - Web Server Lab – 2: Creating a Website Lab – 3: Configuring Redirection of Websites Lab – 4: Creating Virtual Directory Lab – 5: Changing the Website IP address or Port no Lab – 6: Creating Self-Signed Certificate for HTTPS Website Lab – 7: Creating a HTTPS Web Site 50 51 54 62 64 67 68 71 4 Internet Information Services (IIS)- Ftp Server Lab – 1: Installing Internet Information Service - FTP Server Lab – 2: Creating Do not Isolate User FTP Site Lab – 3: Creating Isolate User FTP Site Lab – 4: Creating Isolate User using Active Directory FTP Site 84 85 86 90 96 2 Windows Server 2008 - Network Administration 5 Routing Lab – 1: Assigning the IP Address to Configure Routing Lab – 2: Installing Routing Service on Router1 & Router2 Lab – 3: Enabling Routing...
Words: 12134 - Pages: 49
...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...
Words: 2032 - Pages: 9
...Documentation LAB 2 Introduction In this lab, you will learn how to use several different applications and interfaces to identify and document an IP network design and schema. Chief among these is PuTTY, which you used in Lab #1. The primary use of PuTTY is to establish Telnet and SSH sessions to remote servers. You will use PuTTY to collect information about those resources. You will also use Wireshark to capture packet data from the sessions you establish with PuTTY. Learning Objectives Upon completing this lab, you will be able to: • Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1 • Use PuTTY to establish Telnet and SSH to the IP addresses of the identified interfaces on Cisco routers, switches, and firewalls • Use Cisco show commands to display the MAC-layer addresses of Ethernet ports, IP addressing schema, and subnet mask addressing used throughout the IP networking infrastructure • Document the MAC addresses and IP addresses of the IP networking infrastructure • Document the IP host addresses of the VM server farm hosts TOOLS AND SOFTWARE USED NAME Wireshark PuTTY Cisco IOS MORE INFORMATION http://www.wireshark.org/ http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://www.cisco.com/warp/cpropub/45/tutorial.htm 17 38504_LMxx_Lab02.indd 17 8/30/12 7:51 PM 18 LAB #2 | Network Documentation Deliverables Upon completion of this lab, you are required...
Words: 1982 - Pages: 8
...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...
Words: 3209 - Pages: 13
...IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy. Learning Objectives Upon completing this lab, you will be able to: • Identify risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure. Determine which domain is impacted by the risk, threat, or vulnerability. Determine...
Words: 1159 - Pages: 5
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17
...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...
Words: 25969 - Pages: 104
...each lab and major equipments S. No Name of the Course Name of the laboratory/workshop Total Area of lab/ workshop sq.m Major equipment Cost in Lacs i) Applied Mechanic ii) Environment Lab. iii) Survey Lab. 1 Civil Engineering iv) Hydraulic or Fluid Mechanics Lab v) Material Testing Lab. 140.00 90.00 75.00 120.00 120.00 1) Compression Testing Machine 2) Tri axial Shear Test Apparatus 3) Direct Shear Test Apparatus 4) Electronic distance meter N1- 450 5) One second theodolite 6) Digital Planimeter 7) Auto level 8) PH Meter 8) Vicat Apparatus. 10) Le-Chatelier Apparatus. 11) Aggregate Impact Testing Machine. 12) Compaction Factor Apparatus. 13) Universal Testing Machine (100T) 14) Universal Testing Machine (20T) 15) Compression Testing Machine (200T) 16) Torsion Testing Machine 17) Hardness Testing Machine 18) Impact Testing Machine 19) Fatigue Testing Machine 20) Timber Testing Machine 21) Concrete Mixer 22) Tile Flexure Testing Machine Distillation Column, Surface Evaporation Equipment, Extraction Equipment Ball Mill, Pulveriser, Sieve Analyser, Plate and Frame Filter, PH Meter 0.59 0.24 1.23 3.95 8.78 2 Chemical Engineering i) Chemistry Lab ii) Mass & Transfer Lab iii) Process Control Lab. iv) Mechanical Operations Lab. 100.00 120.00 90.00 120.00 0.36 1.26 2.80 1.01 Please purchase PDFcamp Printer on http://www.verypdf.com/ to remove this watermark. i) Software Lab-I. ii) Software Lab-II. 3 Computer Technology iii) Project & Hardware Lab. iv)...
Words: 952 - Pages: 4
...1 SPRING, 2014-2015 SCIENCE AND INFORMATION TECHNOLOGY Class Id 00001 00002 00003 00004 00005 00006 Course Name ADVANCED COMPUTER NETWORKS LABORATORY ADVANCED COMPUTER NETWORKS LABORATORY ADVANCED COMPUTER NETWORKS LABORATORY ADVANCED COMPUTER NETWORKS LABORATORY ADVANCED TOPICS IN PROGRAMMING III LABORATORY ALGORITHM LABORATORY 00007 00008 00009 00010 00011 00012 00013 00014 00015 00016 00017 00018 ALGORITHM LABORATORY ALGORITHM LABORATORY ALGORITHM LABORATORY ALGORITHM LABORATORY ALGORITHM LABORATORY ALGORITHM LABORATORY ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEM LABORATORY ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEM LABORATORY ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEM LABORATORY ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEM LABORATORY COMPUTER GRAPHICS LABORATORY COMPUTER GRAPHICS LABORATORY 00019 00020 00021 COMPUTER GRAPHICS LABORATORY COMPUTER GRAPHICS LABORATORY COMPILER DESIGN A D C B A D C B A G F E D C B A A B C D Sec A Time 12:0-2:0 11:0-2:0 10:0-12:0 11:0-2:0 4:0-6:0 2:0-5:0 4:0-6:0 5:0-8:0 4:0-6:0 5:0-8:0 08:0-10:0 08:0-11:0 10:0-12:0 08:0-11:0 12:0-2:0 11:0-2:0 2:0-4:0 2:0-5:0 08:0-10:0 08:0-11:0 4:0-6:0 08:0-11:0 4:0-6:0 5:0-8:0 2:0-4:0 2:0-5:0 4:0-6:0 11:0-2:0 12:0-2:0 11:0-2:0 4:0-6:0 5:0-8:0 08:0-10:0 08:0-11:0 10:0-12:0 08:0-11:0 12:0-2:0 11:0-2:0 2:0-4:0 2:0-5:0 12:30-2:0 Day T S W M S T T S M W S T M W T S W M M W W TH S T T S T TH W M M W W M T S W M T S ST RM 441 CL8 441 CL8 441 CL8 422 CL7 424 CL5 441 CL3 441 CL2 431 CL3 431 CL3 434 CL6 434 CL6 424 CL3 441 CL4...
Words: 15098 - Pages: 61
...2 Using Microsoft Word or Excel, create a chart similar to Table 1-3 for the hexadecimal codes for the numbers from 0 through 0) 0000 1) 0001 2) 0010 3) 0011 4) 0100 5) 0101 6) 0110 7) 0111 8) 1000 9) 1001 Exercise1.4.3 What are the binary and decimal values of the ASCII letter K? Show the steps of the conversion. decimal | binary | 75 | 01001011 | Exercise1.4.4 Use the web to explore the origin of the Universal Character Set (UCS)—ISO/IEC 10646—and explain why it was developed. And contrast this system with ASCII. What is the relationship of ASCII to the UCS encoding? A) For communication and exchange of electronic information B) The way they encode each character and the number of bits used Exercise1.4.5 Use the web to explore the application of UTF-8 text encoding. What features are provided by UTF-8 that is not provided by ASCII? Why was it chosen to replace ASCII as the standard for the web? A) A variable with encoding that can represent every character in the Unicode character set B) Utf-8 functions better on the web C) It can translate foreign languages Lab Review 1.4 1. Using the ASCII encoding scheme, write your name (including the space between your first and last name) in hexadecimal. How much memory would it take to store your name if each ASCII character occupied a byte?...
Words: 1580 - Pages: 7
...Student Lab Manual © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION Student Lab Manual © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT Auditing IT Infrastructures for Compliance © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION IS4680 © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett©Learning, LLC Learning, LLC, an Ascend Learning Company Bartlett Current Version Date: 11/21/2011 © Jones & Learning, LLC Copyright 2013 by Jones & Bartlett www.jblearning.com! NOT FOR SALE OR DISTRIBUTION ...
Words: 30948 - Pages: 124
...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus ...
Words: 1834 - Pages: 8