SEC 435 Education Begins/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

SEC 435 Education Begins/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com You will need to create your own original thread. The create thread button is in the upper left corner once you click on the link above. "Session Hijacking" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Consider the “What if” case in Chapter 1 from the Book: Web Applications and Data Servers and respond to one or more of the questions asked. Research the web, and discuss any recent story concerning session hijacking. Provide summary and discussion on what might have been – PowerPoint PPT presentation

Number of Views:3
Slides: 20
Provided by: asdfgfgh29

less

Transcript and Presenter's Notes

Title: SEC 435 Education Begins/newtonhelp.com


1
SEC 435 Education Begins/newtonhelp.com
2
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 1 Discussion Session Hijacking
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • You will need to create your own original thread.
    The create thread button is in the upper left
    corner once you click on the link above.
  • "Session Hijacking" Select one of the following
    and discuss in no less than three paragraphs, and
    have at least one response to another student of
    at least one paragraph

3
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 1 Lab
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Click the link above to submit your assignment.
  • Students, please view the "Submit a Clickable
    Rubric Assignment" in the Student Center.
  • Instructors, training on how to grade is within
    the Instructor Center.
  • If you have not logged into the iLabs
    environment yet, use your access code emailed to
    you by the bookstore when you purchased the books
    to register.

4
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 2 Discussion Web Application Threats
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • "Web Application Threats" Select one of the
    following and discuss in no less than three
    paragraphs, and have at least one response to
    another student of at least one paragraph
  • Review the attacks listed on the OWASP website,
    located at https//www.owasp.org/index.php/Categor
    yAttack. Focus on selecting three attacks that
    you believe to be the greatest security threat,
    rank what you believ

5
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 2 Lab Hacking Webservers
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Assignment 2
  • Due Week 2 and worth 40 points
  • Complete the following EC-Council Labs.
  • Note Lab 2 contains deliverables that are
    partially derived from the following course
    required textbook EC-Council Press. (2017).
    Ethical Hacking and Countermeasures Web
    Applications and Data Servers (2nd ed.). Cengage
    Learning.
  • Lab 1 (Exercise II) Footprinting Webserver
    Using the httprecon Tool
  • Lab 2 (Exercise III) Footprinting a Webserver
    Using ID Server

6
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 3 Discussion Cracking
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • "Cracking" Select one of the following and
    discuss in no less than three paragraphs, and
    have at least one response to another student of
    at least one paragraph
  • Based on the What if case in Chapter 4 from the
    Book Web Applications and Data Servers discuss
    the ethical aspects of what Regi did, and the
    possible ramifications of his actions.

7
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 3 Lab Hacking Web Applications
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Assignment 3
  • Due Week 3 and worth 40 points
  • Complete the following EC-Council Labs.
  • Note Lab 3 contains deliverables that are
    partially derived from the following course
    required textbook EC-Council Press. (2017).
    Ethical Hacking and Countermeasures Web
    Applications and Data Servers (2nd ed.). Cengage
    Learning.

8
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 4 Discussion SQL Injection Attacks
    and Preventions
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • "SQL Injection Attacks and Preventions" Select
    one of the following and discuss in no less than
    three paragraphs, and have at least one response
    to another student of at least one paragraph
  • Read Sammut, T., Schiffman, M. (2013, April 5).
    Understanding SQL Injection. Retrieved from
    http//www.cisco.com/web/about/security/intelligen
    ce/sql_injection.html.

9
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 4 Lab SQL Injection
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Assignment 4
  • Due Week 4 and worth 30 points
  • Complete the following EC-Council Labs.
  • Note Lab 4 contains deliverables that are
    partially derived from the following course
    required textbook EC-Council Press. (2017).
    Ethical Hacking and Countermeasures Web
    Applications and Data Servers (2nd ed.). Cengage
    Learning.
  • Lab 1 (Exercise I) SQL Injection Attacks on MS
    SQL Database

10
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 5 Discussion Case Study
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Case Study" Have an original post of no less than
    three or four paragraphs, and offer advice of a
    paragraph or two to at least one other student.
    This is the proposal for your term paper due in
    week 9. Papers should not be written in a one
    week or weekend, but should take some time to
    research, consider, and then draft. Once
    drafted, ideally, one sleeps on the paper, so one
    can proof and revise one las

11
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 6 Discussion Macs and Viruses
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • "Macs and Viruses" Select one of the following
    and discuss in no less than three paragraphs, and
    have at least one response to another student of
    at least one paragraph
  • A common misconception with Mac OS X systems is
    that they are not as susceptible to viruses and
    malware as PCs and therefore do not require users
    to apply additional security measures. Discuss
    whether or not you believe this is true. Provide
    a rationale for your response.

12
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 6 Lab Assignment 5Hacking Wireless
    Networks
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Assignment 5
  • Due Week 6 and worth 30 points
  • Complete the following EC-Council Labs.
  • Note Lab 5 contains deliverables that are
    partially derived from the following course
    required textbook EC-Council Press. (2017).
    Secure Network Operating Systems and
    Infrastructures. (2nd ed.). Cengage Learning.

13
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 7 Discussion Mobile Malware
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • "Mobile Malware" Select one of the following and
    discuss in no less than three paragraphs, and
    have at least one response to another student of
    at least one paragraph
  • Determine whether or not you believe both that
    mobile malware is the new frontier for virus
    makers and hackers and whether or not mobile
    device security concerns will surpass those of
    standard computing devices over the next five
    years (e.g., desktops, servers, etc.). Justify
    your response.

14
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 7 Lab Assignment 6 Hacking Mobile
    Platforms
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Assignment 6
  • Due Week 7 and worth 30 points
  • Complete the following EC-Council Labs.
  • Note Lab 6 contains deliverables that are
    partially derived from the following course
    required textbook EC-Council Press. (2017).
    Secure Network Operating Systems and
    Infrastructures. (2nd ed.). Cengage Learning.

15
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 8 Discussion What If
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • "What If?" Select one of the following and
    discuss in no less than three paragraphs, and
    have at least one response to another student of
    at least one paragraph
  • Read the What if case in Chapter 3 from the
    Book Secure Network Operating Systems and
    Infrastructures provide a brief summary and
    respond to the two questions that are asked.
  • Discuss any aspect of honeypots and share your
    views on the value of such honeypots for ethical
    hackers, or how as a security professional you
    can protect yourself against providing such
    honeypots for exploitation.
  • Any current topic or article related to
    penetration techniques.
  • The instructor insight

16
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 8 Lab Assignment 7 Evading IDS
    Firewalls and Honeypots
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Lab Assignment 7
  • Due Week 8 and worth 30 points
  • Complete the following EC-Council Labs.
  • Note Lab 7 contains deliverables that are
    partially derived from the following course
    required textbook EC-Council Press. (2017).
    Secure Network Operating Systems and
    Infrastructures. (2nd ed.). Cengage Learning.
  • Lab 1 (Exercise I) Detecting Intrusions using
    Snort

17
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 9 Discussion GET and POST
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Select one of the following and discuss in no
    less than three paragraphs, and have at least one
    response to another student of at least one
    paragraph
  • Imagine that a systems administrator for a
    midsized company has recently noticed numerous
    odd characters in the log servers. Specifically,
    http GET and

18
SEC 435 Education Begins/newtonhelp.com
  • SEC 435 Week 10 Discussion Encryption in
    Organizations
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Encryption in Organizations" Select one of the
    following and discuss in no less than three
    paragraphs, and have at least one response to
    another student of at least one paragraph
  • Suppose an executive-level manager asked you to
    explain the importance of encryption. Detail the
    key points that you would use to justify the
    importance of using encryptio

19
SEC 435 Education Begins/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com