Pre-Lab Questions 1. Nitrogen fixation is a natural process by which inert or unreactive forms of nitrogen are transformed into usable nitrogen. Why is this process important to life? The useable nitrogen created, is extremely important since it is used to form DNA, enzymes, and other biological processes. Nitrogen fixation is also important because when it is inert, it is useless for organisms. 2. Given when you have learned about the hydrogen bonding shared between nucleic acids in DNA, which
Words: 1083 - Pages: 5
Individual Project Date: March 08, 2014 By: Gil Palacio Lab #3 Overview: In this Lab I am learning how to use the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application. This application is an open source tool that automates network exploration to perform several different types of security audit scans of large IP networks (LAB 3, CTU. 2014). SO here is what I gather while doing this Lab: I added several IPs to putty in order to build information or
Words: 1306 - Pages: 6
Lab #9 - Assessment Worksheet Investigating and Responding to Security Incidents Course Name and Number: CSS280-1501A-01 Ethical Hacking Student Name: ***** ****** Instructor Name: ***** ****** Lab Due Date: 2/9/2015 Overview In this lab, you acted as a member of the incident response team who had been assigned an incident response in the form of a help desk trouble ticket. You followed the phases of a security incident response
Words: 1206 - Pages: 5
DEGREE CURRICULUM SAMPLE 3-YEAR CURRICULUM PLAN EFFECTIVE JULY 2014 YEAR 1 Session I Session II S E ME S T E R 1 BIOS-251*: Anatomy & Physiology I with Lab MATH-114*: Algebra for College Students NR-101: Transitions in Nursing (T=1) BIOS-252*: Anatomy & Physiology II with Lab SOCS-185*: Culture & Society or SOCS-325*: Environmental Sociology ENGL-117*: English Composition SEMESTER 2 Credits 2 4 1 2 3 3 BIOS-255*: Anatomy & Physiology III with Lab ENGL-147*: Advanced English
Words: 720 - Pages: 3
Lab #5 – Assessment Worksheet Performing Packet Capture and Traffic Analysis CDS344 - Information Security Course Name and Number: _____________________________________________________ Christian Tiell Student Name: ________________________________________________________________ Scott Blough Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used common applications
Words: 294 - Pages: 2
SAMPLE 3-YEAR CURRICULUM PLAN FOR STUDENTS ENROLLED PRIOR TO JANUARY 2016 YEAR 1 Session I Session II SEMESTER 1 SEMESTER 2 BIOS-251*: Anatomy & Physiology I with Lab MATH-114*: Algebra for College Students NR-101: Transitions in Nursing (T=1) Credits 2 4 1 BIOS-252*: Anatomy & Physiology II with Lab SOCS-185*: Culture & Society ENGL-117*: English Composition 2 3 3 Semester Hours: 15 Credits (LAS=14, NR=1) BIOS-255*: Anatomy & Physiology III with Lab ENGL-147*:
Words: 723 - Pages: 3
Assessment Worksheet Analyzing IP Protocols with Wireshark Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you exercised a wide variety of capabilities of the Wireshark packet capture and analysis software
Words: 381 - Pages: 2
Assessment Worksheet 111 LAB #7 – ASSESSMENT WORKSHEET Relate Windows Encryption and Hashing to Confidentiality and Integrity Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and
Words: 472 - Pages: 2
------------------------------------------------- Week 5 Laboratory: Part 1 Part 1: Assess and Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout
Words: 1625 - Pages: 7
Assessment Worksheet Defining the Scope and Structure for an IT Risk Management Plan Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you defined the purpose of an IT risk management plan, you defined the
Words: 434 - Pages: 2