SEC 435 Teaching Effectively--tutorialrank.com - PowerPoint PPT Presentation

About This Presentation
Title:

SEC 435 Teaching Effectively--tutorialrank.com

Description:

For more course tutorials visit www.tutorialrank.com You will need to create your own original thread. The create thread button is in the upper left corner once you click on the link above. "Session Hijacking" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: – PowerPoint PPT presentation

Number of Views:19
Slides: 19
Provided by: Bailey148

less

Transcript and Presenter's Notes

Title: SEC 435 Teaching Effectively--tutorialrank.com


1
SEC 435 Teaching Effectively--tutorialrank.com
2
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 1 Discussion Session Hijacking   For
more course tutorials visit www.tutorialrank.com  
You will need to create your own original
thread. The create thread button is in the
upper left corner once you click on the link
above. "Session Hijacking" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph
3
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 1 Lab   For more course tutorials
visit www.tutorialrank.com   Click the link above
to submit your assignment. Students, please
view the "Submit a Clickable Rubric Assignment"
in the Student Center. Instructors, training on
how to grade is within the Instructor Center. If
you have not logged into the iLabs environment
yet, use your access code emailed to you by the
bookstore
4
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 2 Discussion Web Application
Threats   For more course tutorials
visit www.tutorialrank.com   "Web Application
Threats" Select one of the following and discuss
in no less than three paragraphs, and have at
least one response to another student of at least
one paragraph Review the attacks listed on the
OWASP website, located at https//www.owasp.org/in
dex.php/CategoryAttack.
5
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 2 Lab Hacking Webservers   For more
course tutorials visit www.tutorialrank.com   Lab
Assignment 2 Due Week 2 and worth 40
points Complete the following EC-Council
Labs. Note Lab 2 contains deliverables that are
partially derived from the following course
required textbook EC-
6
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 3 Discussion Cracking   For more
course tutorials visit www.tutorialrank.com   "Cra
cking" Select one of the following and discuss in
no less than three paragraphs, and have at least
one response to another student of at least one
paragraph Based on the What if case in
Chapter 4 from the Book Web Applications and
Data Servers discuss the ethical aspects of what
Regi did, and the possible ramifications of his
actions.
7
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 3 Lab Hacking Web Applications For
more course tutorials visit www.tutorialrank.com  
Lab Assignment 3 Due Week 3 and worth 40
points Complete the following EC-Council
Labs. Note Lab 3 contains deliverables that
8
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 4 Discussion SQL Injection Attacks
and Preventions   For more course tutorials
visit www.tutorialrank.com   "SQL Injection
Attacks and Preventions" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph Read
Sammut, T., Schiffman, M. (2013, April 5).
Understanding SQL Injection. Retrieved from
9
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 4 Lab SQL Injection   For more
course tutorials visit www.tutorialrank.com   Lab
Assignment 4 Due Week 4 and worth 30
points Complete the following EC-Council
Labs. Note Lab 4 contains deliverables that are
partially derived from the following course
required textbook EC-
10
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 5 Discussion Case Study   For more
course tutorials visit www.tutorialrank.com   Case
Study" Have an original post of no less than
three or four paragraphs, and offer advice of a
paragraph or two to at least one other student.
This is the proposal for your term paper due in
week 9. Papers should not be written in a one
week or weekend, but should take some time to
research, consider, and then draft. Once
drafted, ideally,
11
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 6 Discussion Macs and Viruses   For
more course tutorials visit www.tutorialrank.com  
"Macs and Viruses" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph A common misconception
with Mac OS X systems is that they are not as
susceptible to viruses and malware as
12
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 6 Lab Assignment 5Hacking Wireless
Networks   For more course tutorials
visit www.tutorialrank.com   b Assignment 5 Due
Week 6 and worth 30 points Complete the following
EC-Council Labs. Note Lab 5 contains
deliverables that are partially derived from the
following course required textbook EC-Council
Press. (2017). Secure Ne
13
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 7 Discussion Mobile Malware   For
more course tutorials visit www.tutorialrank.com  
"Mobile Malware" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of
at least one paragraph Determine whether or
not you believe both that mobile malware is the
new frontier for virus makers and hackers and
whether or not mobile device security concerns
will surpass those of standard computing devices
over the
14
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 7 Lab Assignment 6 Hacking Mobile
Platforms   For more course tutorials
visit www.tutorialrank.com   Lab Assignment 6 Due
Week 7 and worth 30 points Complete the
following EC-Council Labs. Note Lab 6 contains
deliverables that are partially derived from the
following course required textbook EC-Council
Press. (2017). Secure Network Operating Systems
and Infrastructures. (2nd ed.). Cengage Learning.
15
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 8 Discussion What If   For more
course tutorials visit www.tutorialrank.com   "Wha
t If?" Select one of the following and discuss in
no less than three paragraphs, and have at least
one response to another student of at least one
paragraph Read the What if case in Chapter 3
from the Book Secure Network Operating Systems
and Infrastructures provide a brief summary and
respond to the two questions that are asked.
16
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 8 Lab Assignment 7 Evading IDS,
Firewalls and Honeypots   For more course
tutorials visit www.tutorialrank.com   Lab
Assignment 7 Due Week 8 and worth 30
points Complete the following EC-Council
Labs. Note Lab 7 contains deliverables that are
partially derived from the following course
required textbook EC-Council Press. (2017).
Secure Network Operating Systems and
Infrastructures. (2nd ed.). Cengage Learning.
17
SEC 435 Teaching Effectively--tutorialrank.com
SEC 435 Week 9 Discussion GET and POST   For more
course tutorials visit www.tutorialrank.com   Sele
ct one of the following and discuss in no less
than three paragraphs, and have at least one
response to another student of at least one
paragraph Imagine that a systems administrator
for a midsized company has recently noticed
numerous odd characters in the log servers.
Specifically, http GET and POST log entries
within
18
SEC 435 Teaching Effectively--tutorialrank.com
Write a Comment
User Comments (0)
About PowerShow.com