CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives .............................
Words: 48147 - Pages: 193
38 LAB #3 | Perform Data Gathering and Footprinting on a Targeted Website LAB #3 – ASSESSMENT WORKSHEET Perform Data Gathering and Footprinting on a Targeted Website Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you targeted an organization with an e-commerce website and performed data gathering and footprinting for that site. You collected public domain information about an organization’s website by making use of Google hacking techniques
Words: 918 - Pages: 4
Lab #3 – Assessment Worksheet Enabling Windows Active Directory and User Access Controls Course Name and Number: NT2520 Introduction to Information Security_V2.0 Student Name: Rony Azanon Instructor Name: Brandon Solomon Lab Due Date: august 9, 2015 Overview In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain
Words: 482 - Pages: 2
Business Solution Assessment and Validation TouchPoint Packaging Jan Morrison Capella University TS5343 September 23, 2011 Table of Contents 1 Introduction 3 1.1 Introduction to the Case Study – TouchPoint Packaging 3 1.2 Case Study Background 3 2 Proposed Solution Compliance with Functional Requirements – TouchPoint Packaging 3 2.1 Identify Functional Requirements 3 2.2 Evaluate current solution with Functional Requirements 3 3 Evaluate Compliance of Security Requirements
Words: 1139 - Pages: 5
IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the
Words: 1159 - Pages: 5
Lab 2 Part 1: 10 points Learning Objectives and Outcomes * Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista
Words: 684 - Pages: 3
To do Lab Report for Single and Double Replacement reactions : This is a formal lab report. It must be typed or written by hand with blue or black ink. Make sure that you include the following: 1. Title 2. List of Materials 3. Safety that includes MSDS risk assessment for all the materials used ( instructions were given to you already and they are in Moodle) 4. Pre-lab questions 5. Data Tables with the results obtained ( observations and predictions) 6. Post Lab: Part I : Single
Words: 374 - Pages: 2
[pic] ACME Global Transportation Company Corporate Training Department Instructional Design Plan: Introduction to Internet Explorer Instructional Designer: James Smith Scenario The accounting division of ACME Global Transportation has recently implemented an Intranet that is to be used by the supervisory staff to access the new web based version of the corporate Human Resource Management System (HRMS)
Words: 3947 - Pages: 16
Communication IX. Collaboration I. Data Collection History of Present Problem: Pneumonia-COPD JoAnn Walker is an 84-year-old female who has had a productive cough of green phlegm 4 days ago that continues to persist. She was started 3 days ago on prednisone 60 mg po daily and azithromycin (Zithromax) 250 mg po x5 days by her clinic physician. Though she has had intermittent chills, she first noticed a fever last night of 102.0. She has had more difficulty breathing during the night
Words: 2774 - Pages: 12
Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) LAB #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about the target. Hackers
Words: 786 - Pages: 4