1 / 18

SEC 435 Reading feeds the Imagination/Uophelpdotcom

SEC 435 Reading feeds the Imagination/Uophelpdotcom<br>

aunvc3
Download Presentation

SEC 435 Reading feeds the Imagination/Uophelpdotcom

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEC 435 To exceed, you must read /uophelp.com For more course tutorials visit www.uophelp.com

  2. For more course tutorials visit www.uophelp.com SEC 435 Week 1 Discussion Session Hijacking You will need to create your own original thread.   The create thread button is in the upper left corner once you click on the link above.   "Session Hijacking" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Consider the “What if” case in Chapter 1 from the Book: Web Applications and Data Servers and respond to one or more of the questions asked. Research the web, and discuss any recent story concerning session hijacking. Provide summary and discussion on what might have been done to

  3. For more course tutorials visit www.uophelp.com SEC 435 Week 1 Lab Click the link above to submit your assignment. Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. Instructors, training on how to grade is within the Instructor Center. If you have not logged into the iLabs environment yet, use your access code emailed to you by the bookstore when you purchased the books to register. Lab Assignments

  4. For more course tutorials visit www.uophelp.com SEC 435 Week 2 Discussion Web Application Threats "Web Application Threats" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), and provide a rationale for your rankings.

  5. For more course tutorials visit www.uophelp.com SEC 435 Week 2 Lab Hacking Webservers Lab Assignment 2 Due Week 2 and worth 40 points Complete the following EC-Council Labs. Note: Lab 2 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning.

  6. For more course tutorials visit www.uophelp.com SEC 435 Week 3 Discussion Cracking "Cracking" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Based on the “What if” case in Chapter 4 from the Book: Web Applications and Data Servers discuss the ethical aspects of what Regi did, and the possible ramifications of his actions. Based on the “What if” case in Chapter 5 from the Book: Web Applications and Data Servers discuss the ethics of whether the company had an obligation to report or not, and why? What would you have done and why?

  7. For more course tutorials visit www.uophelp.com SEC 435 Week 3 Lab Hacking Web Applications Lab Assignment 3 Due Week 3 and worth 40 points Complete the following EC-Council Labs. Note: Lab 3 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning. Lab 3 (Exercise I): “Exploiting Parameter Tampering and XSS Vulnerabilities in Web Applications”

  8. For more course tutorials visit www.uophelp.com SEC 435 Week 4 Discussion SQL Injection Attacks and Preventions "SQL Injection Attacks and Preventions" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Read Sammut, T., &Schiffman, M. (2013, April 5). Understanding SQL Injection. Retrieved from http://www.cisco.com/web/about/security/intelligence/sql_injection.html. Read Wichers, D., Manico, J., &Seil, M. (2014, April 12). SQL Injection Prevention Cheat Sheet. Retrieved from https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet.

  9. For more course tutorials visit www.uophelp.com SEC 435 Week 4 Lab SQL Injection Lab Assignment 4 Due Week 4 and worth 30 points Complete the following EC-Council Labs. Note: Lab 4 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning. 

  10. For more course tutorials visit www.uophelp.com SEC 435 Week 5 Discussion Case Study Case Study" Have an original post of no less than three or four paragraphs, and offer advice of a paragraph or two to at least one other student.  This is the proposal for your term paper due in week 9.  Papers should not be written in a one week or weekend, but should take some time to research, consider, and then draft.  Once drafted, ideally, one sleeps on the paper, so one can proof and revise one last time before submitting the final draft.  I expect a 400 level paper, so give some thought to your case study and provide me a short synopsis of what you hope to look at, why, and what you hope to learn or accomplish.  

  11. For more course tutorials visit www.uophelp.com SEC 435 Week 6 Discussion Macs and Viruses "Macs and Viruses" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: A common misconception with Mac OS X systems is that they are not as susceptible to viruses and malware as PCs and therefore do not require users to apply additional security measures. Discuss whether or not you believe this is true. Provide a rationale for your response. Review current Mac security features from Apple’s website located at http://www.apple.com/macos/security, and read the article 10 Best Antivirus for the Mac at http://techtop100.com/9-best-antivirus-for-mac-do-macs-need-antivirus-best-free-mac-antivirus.

  12. For more course tutorials visit www.uophelp.com SEC 435 Week 6 Lab Assignment 5Hacking Wireless Networks Lab Assignment 5 Due Week 6 and worth 30 points Complete the following EC-Council Labs. Note: Lab 5 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.  Lab 1 (Exercise I): “Cracking a WEP Network with Aircrack-ng for Windows.”

  13. For more course tutorials visit www.uophelp.com SEC 435 Week 7 Discussion Mobile Malware "Mobile Malware"  Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Determine whether or not you believe both that mobile malware is the new frontier for virus makers and hackers and whether or not mobile device security concerns will surpass those of standard computing devices over the next five years (e.g., desktops, servers, etc.). Justify your response. Analyze the mobile device OS that you believe is the easiest to hack. Additionally, explain the ineffective security features that are utilized by this specific mobile device OS, and indicate the key reasons why you believe the security feature is failing to provide better protection. Provide a rationale for your response.

  14. For more course tutorials visit www.uophelp.com SEC 435 Week 7 Lab Assignment 6 Hacking Mobile Platforms Lab Assignment 6 Due Week 7 and worth 30 points  Complete the following EC-Council Labs. Note: Lab 6 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning. 

  15. For more course tutorials visit www.uophelp.com SEC 435 Week 8 Discussion What If "What If?" Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Read the “What if” case in Chapter 3 from the Book: Secure Network Operating Systems and Infrastructures provide a brief summary and respond to the two questions that are asked. Discuss any aspect of “honeypots” and share your views on the value of such honeypots for ethical hackers, or how as a security professional you can protect yourself against providing such honeypots for exploitation.

  16. For more course tutorials visit www.uophelp.com SEC 435 Week 8 Lab Assignment 7 Evading IDS Firewalls and Honeypots Lab Assignment 7 Due Week 8 and worth 30 points Complete the following EC-Council Labs. Note: Lab 7 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.

  17. For more course tutorials visit www.uophelp.com SEC 435 Week 9 Discussion GET and POST Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph: Imagine that a systems administrator for a midsized company has recently noticed numerous odd characters in the log servers. Specifically, http “GET” and “POST” log entries within their externally facing IIS version 5 web server. Discuss the use of the “GET” and “POST” commands and decide whether or not there are concerns with their presence on the externally facing web server. Next, provide your analysis of the most damaging attack (i.e. XSS, SQL Injection, CSS, and Race conditions) against Internet Information Services (IIS). Support your rationale.

  18. SEC 435 To exceed, you must read /uophelp.com For more course tutorials visit www.uophelp.com

More Related