SEC 435 Education Organization / snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

SEC 435 Education Organization / snaptutorial.com

Description:

For more classes visit www.snaptutorial.com You will need to create your own original thread. The create thread button is in the upper left corner once you click on the link above. "Session Hijacking" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: • Consider the “What if” case in Chapter 1 from the Book: Web Applications and Data Servers and respond to one or more of the questions asked. • Research the web, and discuss any recent story concerning session hijacking. Provide summary and discussion on what might have been done to prevent such hijacking, or how such hijacking can be recognized. • Any current topic or article related to penetration techniques. • The instructor insight. – PowerPoint PPT presentation

Number of Views:16

less

Transcript and Presenter's Notes

Title: SEC 435 Education Organization / snaptutorial.com


1
SEC 435 Education Organization / snaptutorial.com
2
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 1 Discussion Session Hijacking For
more classes visit www.snaptutorial.com   You
will need to create your own original thread.
The create thread button is in the upper left
corner once you click on the link above.
"Session Hijacking" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph Consider the What if
case in Chapter 1 from the Book Web Applications
and Data Servers and respond to one or more of
the questions asked.
3
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 1 Lab For more classes
visit www.snaptutorial.com   Click the link above
to submit your assignment. Students, please
view the "Submit a Clickable Rubric Assignment"
in the Student Center. Instructors, training on
how to grade is within the Instructor Center. If
you have not logged into the iLabs environment
yet, use your access code emailed to you by the
bookstore when you purchased the books to
register. Lab Assignments
4
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 2 Discussion Web Application
Threats For more classes visit www.snaptutorial.co
m   "Web Application Threats" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph
Review the attacks listed on the OWASP website,
located at https//www.owasp.org/index.php/Categor
yAttack. Focus on selecting three attacks that
you believe to be the greatest security threat,
rank what you believe
5
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 2 Lab Hacking Webservers For more
classes visit www.snaptutorial.com   Lab
Assignment 2 Due Week 2 and worth 40
points Complete the following EC-Council
Labs. Note Lab 2 contains deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Ethical Hacking and Countermeasures Web
Applications and Data Servers (2nd ed.). Cengage
Learning.
6
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 3 Discussion Cracking For more
classes visit www.snaptutorial.com   "Cracking"
Select one of the following and discuss in no
less than three paragraphs, and have at least one
response to another student of at least one
paragraph Based on the What if case in
Chapter 4 from the Book Web Applications and
Data Servers discuss the ethical aspects of what
Regi did, and the possible ramifications of his
actions.
7
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 3 Lab Hacking Web Applications For
more classes visit www.snaptutorial.com   Lab
Assignment 3 Due Week 3 and worth 40
points Complete the following EC-Council
Labs. Note Lab 3 contains deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Ethical Hacking and Countermeasures Web
Applications and Data Servers (2nd ed.). Cengage
8
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 4 Discussion SQL Injection Attacks
and Preventions For more classes
visit www.snaptutorial.com   "SQL Injection
Attacks and Preventions" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph Read
Sammut, T., Schiffman, M. (2013, April 5).
Understanding SQL Injection. Retrieved from
9
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 4 Lab SQL Injection For more classes
visit www.snaptutorial.com   Lab Assignment 4 Due
Week 4 and worth 30 points Complete the following
EC-Council Labs. Note Lab 4 contains
deliverables that are partially derived from the
following course required textbook EC-Council
Press. (2017). Ethical Hacking and
Countermeasures Web Applications and Data
Servers (2nd ed.). Cengage Learning.
10
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 5 Discussion Case Study For more
classes visit www.snaptutorial.com   Case Study"
Have an original post of no less than three or
four paragraphs, and offer advice of a paragraph
or two to at least one other student. This is
the proposal for your term paper due in week 9.
Papers should not be written in a one week or
weekend, but should take some time to research,
consider, and then draft. Once drafted, ideally,
one sleeps on the paper, so one can proof and
revise one last time before submitting the final
draft.
11
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 6 Discussion Macs and Viruses For
more classes visit www.snaptutorial.com   "Macs
and Viruses" Select one of the following and
discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph A common misconception
with Mac OS X systems is that they are not as
susceptible to viruses and malware as PCs and
therefore do not require users to apply
additional security measures. Discuss whether or
not you believe this is true. Provide a rationale
for your response.
12
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 6 Lab Assignment 5Hacking Wireless
Networks For more classes visit www.snaptutorial.c
om   Lab Assignment 5 Due Week 6 and worth 30
points Complete the following EC-Council
Labs. Note Lab 5 contains deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Secure Network Operating Systems and
Infrastructures. (2nd ed.). Cengage Learning.
13
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 7 Discussion Mobile Malware For more
classes visit www.snaptutorial.com   "Mobile
Malware" Select one of the following and discuss
in no less than three paragraphs, and have at
least one response to another student of at least
one paragraph Determine whether or not you
believe both that mobile malware is the new
frontier for virus makers and hackers and whether
or not mobile device security concerns will
surpass those of standard computing devices over
the next five years (e.g., desktops, servers,
etc.). Justify your response.
14
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 7 Lab Assignment 6 Hacking Mobile
Platforms For more classes visit www.snaptutorial.
com   Lab Assignment 6 Due Week 7 and worth 30
points Complete the following EC-Council
Labs. Note Lab 6 contains deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Secure Network Operating Systems and
Infrastructures. (2nd ed.). Cengage Learning.
Lab 1 (Exercise I) Creating Binary Payloads
using Kali Linux to Hack
15
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 8 Discussion What If For more
classes visit www.snaptutorial.com   "What If?"
Select one of the following and discuss in no
less than three paragraphs, and have at least one
response to another student of at least one
paragraph Read the What if case in Chapter 3
from the Book Secure Network Operating Systems
and Infrastructures provide a brief summar
16
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 8 Lab Assignment 7 Evading IDS,
Firewalls and Honeypots For more classes
visit www.snaptutorial.com   Lab Assignment 7 Due
Week 8 and worth 30 points Complete the following
EC-Council Labs. Note Lab 7 contains
deliverables that are partially derived from the
following course required textbook EC-Council
Press. (2017). Secure Network Operating Systems
and Infrastructures. (2nd ed.). Cengage
Learning.
17
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 9 Discussion GET and POST For more
classes visit www.snaptutorial.com   Select one
of the following and discuss in no less than
three paragraphs, and have at least one response
to another student of at least one paragraph
Imagine that a systems administrator for a
midsized company has recently noticed numerous
odd characters in the log servers. Specifically,
http GET and POST log entries within their
externally facing IIS version 5 web server.
18
SEC 435 Education Organization / snaptutorial.com
SEC 435 Week 10 Discussion Encryption in
Organizations For more classes visit www.snaptutor
ial.com   "Encryption in Organizations" Select
one of the following and discuss in no less than
three paragraphs, and have at least one response
to another student of at least one paragraph
Suppose an executive-level manager asked you to
explain the importance of encryption. Detail the
key points that you would use to justify the
importance of using encryption during the overall
security posture analysis o
19
SEC 435 Education Organization / snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com