CIS 552 Assignment 1 Encryption and Hashing Algorithms Tools and Commands NEW ..
CIS 552 Lab 1 Assignment 1 Assessing and Securing Systems on a Wide Area Network (WAN) NEW ..
CIS 552 Lab 2 Assignment Applying Encryption and Hashing Algorithms for Secure Communications Latest
CIS 552 Lab 2 Assignment Applying Encryption and Hashing Algorithms for Secure Communications NEW ..
CIS 552 Lab 5 Attacking a Vulnerable Web Application and Database NEW ..
CIS 552 Lab 8 Auditing a Wireless Network and Planning for a Secure WLAN Implementation NEW ..
CIS 552 Week 1 Discussion Question Penetration Testing in a Corporate Environment NEW Imagine you are an information security manager. How would you consider utilizing penetration testing in a corporate environment? Are there situations in which you feel another technique is more appropriate? In ..
CIS 552 Week 10 Discussion Question Network-based and host-based IDS NEW Compare and contrast network-based and host-based IDS use in an enterprise network infrastructure. Determine the feasibility and necessity of utilizing one of these IDS implementations over the others and explain which you f..
CIS 552 Week 11 Discussion Question NEW “Elevator talk for CIS 552” Write a speech that you would give to a friend in an elevator summing up the contents of this course. You have 30 to 90 seconds to inform your friend of the most important elements. Go! • Hint: Discuss w..
CIS 552 Week 2 Discussion Question Hashing algorithms MD5 or SHA1 NEW In your opinion which is the better hashing algorithm: MD5 or SHA1? What are the differences, strengths, and weaknesses of each? Create a scenario in which each would be the more suitable method to secure data. Examine..
CIS 552 Week 3 Lab 7 Analyzing Network Traffic to Create a Baseline Definition NEW ..
CIS 552 Week 4 Discussion Question Port scanning tools NEW Use the Internet or the Strayer Library and research at least two commonly used port scanning tools. What is the greatest source of information that can be gained in the footprinting process? How are hackers able to obtain it? How can the..
CIS 552 Week 4 Hacking Research Report NEW ..
CIS 552 Week 4 Lab 3 Assignment Data Gathering and Foot printing on a Targeted Website NEW ..
CIS 552 Week 5 Discussion Question Creating unique passwords NEW Cracking passwords has become easier due to the tools available, making the current password best-practices obsolete. What advice could you give anyone to create a unique password and to protect a password that is “non-traditional a..
CIS 552 Week 6 Discussion Question Attacks on web servers and/or databases NEW Research a recent (within the last six months) attack that resulted in a successful attack on a Web server and/or database, include a link to the article or source material. Summarize the attack you researched. Determi..
CIS 552 Week 7 Discussion Ransomware NEW This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk. Use the Internet or the Strayer Librar..
CIS 552 Week 8 Discussion Question Kali Linux NEW Choose one tool from the top 25 listed and provide a history of the tool, its purpose, what OS it runs on, whether it is part of the Kali Linux distribution. What is the best approach to learn “new” tools used in pentesting? Provide a video or res..
CIS 552 Week 9 Discussion Question Social Engineering NEW Social engineering requires that a hacker manipulate users to prey on their human weakness/ignorance and willingness to interact. What, in your opinion, are the inherent dangers to you as an IT security professional and a private person? D..
Showing 1 to 18 of 18 (1 Pages)