CIS4361C IT Security Course Syllabus Version 1 FALL 2015 Course Description This course introduces students to information security. Security often involves social and organizational skills as well as technical understanding. In order to solve the practical security problems, we must balance real-world risks and rewards against the cost and bother of available security techniques. During this course we will use continuous process improvement to investigate these elements. Security is a very
Words: 1802 - Pages: 8
NETW320, Patrick Price 5/18/2014 Lab #2, Silent Suppression Lab Report 1. On the Results Browser, make sure you are on Current Project so you have both sets of results. Expand DB Query and Select DB Query Response Time (sec). Hit the Show button. Zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 1. Which run has a better (lower) DB Query Response
Words: 726 - Pages: 3
Unit 1 Lab 2 Preparing an Application Server LAB 1-2-1 1. Which computer is hosting the Administrator account that you specified in this authentication? . This question confuses me. The administrator account I am logging into is on the VM, but my laptop is the actual host LAB 1-2-2 2. Why is the system prompting you to initialize Disk 1 at this time? Because it was not initialized when it was created 3. What happens to the Disk 1 type and status when the initialization process
Words: 721 - Pages: 3
Week 3 Lab Part 1: Web and Database Attacks & Malware and Malicious Software Learning Objectives and Outcomes Upon completing this lab, students will be able to: * Identify web application and web server backend database vulnerabilities as viable attack vectors * Develop an attack plan to compromise and exploit a web site using cross-site scripting (XSS) against sample vulnerable web applications * Conduct a manual Cross-site Scripting (XSS) attack against sample vulnerable web
Words: 1054 - Pages: 5
Contact the instructor: You are welcome to communicate with me through emails or drop by in my office during office hours. Since there are so many spams around the email system, please make sure that you put your course number in the subject heading (eg. COMP 150 AB2) and send it from your UFV email account. Otherwise, your email may be accidentally filtered/deleted. If I don’t respond in two days, please re-send the email or talk to me directly after class or during my office hours. Course
Words: 832 - Pages: 4
NETW310 Week 5 Lab Report To complete your Week 5 Lab Report, answer all of the questions below. Create your report using the template starting on page 2 and submit it to the Week 5 Dropbox by the due date. NETW310 11/25/2014 Lab #5, Wireshark Introduction Lab Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. Is Wireshark open-source or proprietary? Open Source 2. What is seen in each of the
Words: 271 - Pages: 2
Safety Safety in the lab should always be practiced with the utmost precaution. This lab deals with hot water, a heat exchanger, and water valves. Always wear your personal protective equipment (ppe) in the lab a. Lab coat buttoned up completely to avoid from spills and other materials from harming your clothes or skin b. Completely closed toed shoes and long pants ie. No skirts, shorts, or dresses c. Safety Goggles must be warn as well to protect your eyes from any
Words: 994 - Pages: 4
Lab 61: Confidence Intervals on Proportions In this lab you're going to use the simulation at http://statweb.calpoly.edu/chance/applets/Reeses/ReesesPieces.html to take virtual samples of Reese's pieces (sorry no real chocolate) Open up the simulator and set π = .3. This is really p, but on my screen it comes out as π, set Sample Size, n = 30 . This means we are setting the proportion of orange Reese's pieces as .3 When you click on "Select Sample" the computer will pull 30 Reese's pieces
Words: 563 - Pages: 3
Lab 3.1 Step 1: Variable Name | Problem (Yes or No) | If Yes, what’s wrong? | Declare Real creditsTaken | No | | Declare Int creditsLeft | Yes | Int should be real | Declare Real studentName | Yes | Real should be string | Constant Real credits needed = 90 | Yes | Credits needed should be one word | Step 2: There is no Set keyword used prior to the equation Should be Set creditsLeft = creditsNeeded - creditsTaken Step 3: The student’s name is Nolan Owens Step 4: This program
Words: 275 - Pages: 2
Network Documentation LAB 2 Introduction In this lab, you will learn how to use several different applications and interfaces to identify and document an IP network design and schema. Chief among these is PuTTY, which you used in Lab #1. The primary use of PuTTY is to establish Telnet and SSH sessions to remote servers. You will use PuTTY to collect information about those resources. You will also use Wireshark to capture packet data from the sessions you establish with PuTTY. Learning
Words: 1982 - Pages: 8