CCSI 460 Effective Communication - tutorialrank.com - PowerPoint PPT Presentation

About This Presentation
Title:

CCSI 460 Effective Communication - tutorialrank.com

Description:

For more course tutorials visit www.tutorialrank.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following date and time of transactions protocol used to communicate with the server All IPs utilized Mac Address of PC Communicating with the server – PowerPoint PPT presentation

Number of Views:2
Slides: 17
Provided by: Bartholomew18

less

Transcript and Presenter's Notes

Title: CCSI 460 Effective Communication - tutorialrank.com


1
CCSI 460 Effective Communication/ tutorialrank.com
2
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 1 Homework   For more course
tutorials visit www.tutorialrank.com   Analyze
the wireshark packet capture file called
week1.pcap in doc sharing. view the packet and
produce a short report including the following
3
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 1 Lab Survey of Forensic
Toolkits   For more course tutorials
visit www.tutorialrank.com   CCSI 460 Week 1 Lab
Survey of Forensic Toolkits
4
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 2 Current Issues in Digital
Forensics   For more course tutorials
visit www.tutorialrank.com   CCSI 460 Week 2
Current Issues in Digital Forensics
5
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 2 Homework   For more course
tutorials visit www.tutorialrank.com   CCSI 460
Week 2 Homework
6
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 2 MD5SUM Hash Value Image
Report   For more course tutorials
visit www.tutorialrank.com   CCSI 460 Week 2
MD5SUM Hash Value Image Report
7
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 3 Homework   For more course
tutorials visit www.tutorialrank.com   Week 3
homework   Download the picture Doc  Sharing
called hidden.jpg. Use md5um to get the hash
value of the file and size.
8
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 3 Lab Report Internet
Research   For more course tutorials
visit www.tutorialrank.com   CCSI 460 Week 3 Lab
Report Internet Research
9
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 4 Homework   For more course
tutorials visit www.tutorialrank.com   Week 4
homework   Analyze the Wireshark packet capture
fils called ftp.pcap in Doc Sharing.View the
packets and produce a short report including the
following.
10
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 4 Lab Report Hard Drive Image
Analysis   For more course tutorials
visit www.tutorialrank.com   Lab Number and
Title Lab4 Hard Drive Image Analysis Summary
of Findings The source code was exposed by means
of criminal activity that Denny
11
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 5 Homework   For more course
tutorials visit www.tutorialrank.com   Week 5
homework   Stalk yourself or a family member.
Pretend that you a cyber stalker and you are
going to stalk yourself. Provide a summary on the
information that you found about yourself.
12
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 5 Lab Report Bid ridding and Cyber
Stalking   For more course tutorials
visit www.tutorialrank.com   CCSI 460 Week 5 Lab
Report Bid ridding and Cyber-Stalking
13
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 6 Homework   For more course
tutorials visit www.tutorialrank.com   Week 6
homework   Mobile Phone Photo Analysis Your
client has been accused of a crime. You have take
the clients phone and acquired the image called
client.jpg. The hash for the files is
14
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 7 Course Project Forensic System
Image Investigation   For more course tutorials
visit www.tutorialrank.com   CCSI 460 Week 7
Course Project Forensic System Image Investigation
15
CCSI 460 Effective Communication/ tutorialrank.com
CCSI 460 Week 7 Homework Honeypot Research   For
more course tutorials visit www.tutorialrank.com  
Research two different honeypots that are
available to use free or open source. List the
sites and honeypots that you selected.
16
CCSI 460 Effective Communication/ tutorialrank.com
Write a Comment
User Comments (0)
About PowerShow.com