GS1145 Strategies for the Technical Professional Syllabus Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) GS1145 Strategies for the Technical Professional Syllabus COURSE SUMMARY COURSE DESCRIPTION This course reviews characteristic and trends of the global information society including basic information processing, Internet research, other skills used by the technical professionals and techniques that can be used for independent technical learning. MAJOR INSTRUCTIONAL
Words: 14113 - Pages: 57
Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft Baseline Security Analyzer (MBSA) Course Name & Number: NT2580 Student Name: Bryan Villa Instructor Name: Mr. Kravitz Lab Due Date: May 17, 2013 Lab #3 Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization? Allows for testing and documentation of changes before they sent to management for review and implementation. 2. What type of access
Words: 326 - Pages: 2
Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) 1. What is the first Nmap command you ran in this lab? Explain the switches used. The first nmap command used was nmap -O -v 10.20.100.50. -O was to detect the operating system of the 10.20.100.50 machine, while -v showed much detail. 2. What are the open ports when scanning 192.168.3.25 and their service names? There are twelve open ports. 80 is HTTP services, 135 is the Microsoft EPMAP aka DCE/RPC
Words: 291 - Pages: 2
Tutorial and Lab 4 – SD3043 Risk management - security 1. What is risk management? Answer: Risk management is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be controlled or mitigated. 2. List and describe the key areas of concern for risk management. Answer: Risk identification, risk assessment, and risk control. 3. Which community of interest usually provides the resources used when undertaking
Words: 825 - Pages: 4
Lab #3 – Assessment Worksheet Data Gathering and Footprinting on a Targeted Web Site Student Name: ___Westley Mixon________________________________________________ Lab Due Date: __________January 28, 2015________________________________________ Overview The first phase of hacking is the footprinting phase, which is designed to passively gain information about a target. In this lab, you performed technical research against three Web domains using Internet search tools. You collected public
Words: 521 - Pages: 3
Lab #2 – Assessment Worksheet Applying Encryption and Hashing Algorithms for Secure Communications Ethical Hacking Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you applied common cryptographic techniques
Words: 662 - Pages: 3
Recover and Install the Lab #9 Assessment Worksheets on Your Student VM Hard Drive and open the file in Microsoft Word to verify integrity. {Insert your timed RTO using your computer clock – following your documented instructions and steps}. f. N/A. Was not asked to do this portion of the lab and cannot finish this question. 7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower? g. I am assuming from the lab, steps that would be with
Words: 323 - Pages: 2
Lab #1 Assessment Worksheet Crafting an Organization-Wide Security Management Policy for Acceptable Use Student Name: Jonathan Duarte Student Banner ID: 900421269 Date: 2/4/2016 Overview In this lab, you defined an AUP as it relates to the User Domain, you identified the key elements of sample AUPs, and you learned how to mitigate threats and risks with an AUP. Lab Assessment Questions & Answers 1. What are three risks and threats of the User Domain? Threats: * Lack of user awareness
Words: 500 - Pages: 2
Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories:
Words: 3209 - Pages: 13
operator, and lab. We want them to practice proper phone etiquette. We would also like them to communicate professionally and appropriately to family members or the pastor. 4. Critical Thinking…. We want the learners to think critically using their knowledge of PE’s to know what they should and should not do. We want them to recognize that a PE is a medical emergency and should be reported immediately. We want them to think about the tests that have been run (CXR and Lab work and understand
Words: 1461 - Pages: 6