SEC 435 COMPLETE LAB AND ASSIGNMENTS PACK STRAYER

admin   August 6, 2018   Comments Off on SEC 435 COMPLETE LAB AND ASSIGNMENTS PACK STRAYER

SEC 435 COMPLETE LAB AND ASSIGNMENTS PACK STRAYER

Visit Below Link, To Download This Course:

https://www.tutorialsservice.com/product/sec-435-complete-lab-and-assignments-pack-strayer/

 

SEC 435 Complete Lab and Assignments Pack-Strayer

SEC435

SEC 435 Week 1 Pre-Assessment-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Certification Readiness Assessment 1 and 2

Week Due Title Points
1 Certification Readiness Assessment 1: Pre-assessment 70
11 Certification Readiness Assessment 2: Post-assessment 70

A pre-assessment and post-assessment are part of the required materials for this course. These assessments use the material covered within the course in order to evaluate your exam readiness. Additional specifics surrounding the submission and grading of each assessment are located below.

Each assessment uses the same web-based CEH assessment and consists of two parts:

  • A screenshot of the CEH assessment results
  • A written self-assessment response

Pre-assessment/Post-assessment Completion Requirements

  • Complete the CEH assessment located at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/ceh-assessment.
    Note: Grading is based on participation and is not influenced by the objective score students receive on the online assessment.
  • Take a screenshot of the results page upon completion of the CEH assessment.
    Note: This screenshot serves as confirmation of the completed assessment. The screenshot should at a minimum display your score and general on-screen items. It is not necessary to include each of the itemized question results. Go to http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.
  • Review the interactive results that are displayed with each question. Focus your efforts to gain an understanding of your strengths and weaknesses with respect to the assessment topics, as well as the overall concepts that require additional focus.
  • Please do not be discouraged if you get a low score. This is meant to be an assessment of your knowledge, skills, and abilities coming into the course. It will help you and your Instructor to know what you may need more instruction in and what you are already familiar with.

Pre-assessment/Post-assessment Submission Requirements

Submit one Microsoft Word document which contains:

  1. A screenshot of the completed CEH assessment results.
  2. Write a short answer self-assessment in good paragraphs in Word based on the CEH assessment results in which you:
    • Summarize both your strengths and weaknesses with respect to the topics you covered in the assessment.
    • Determine the concepts that you believe challenged you the most and/or those that require additional focus.

Your assignment must follow these formatting requirements:

  • Combine both elements (screenshot and written self-assessment) into one Microsoft Word document or an open-source equivalent.
  • Documentation must be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.

Click here to view the grading rubric for this assignment.

SEC 435 Week 1 Lab 1 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

If you have not logged into the iLabs environment yet, use your access code emailed to you by the bookstore when you purchased the books to register.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
  5. Summarize the technical experiences in completing the lab assignment.
  6. Identify the commands that were of greatest benefit to you.
  7. Provide general comments on the overall lab assignment experience.
    Note:This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
LAB ASSIGNMENT 1

Due Week 1 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 1 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Session Hijacking iLab

Module 10

Lab 2 (Exercise I): “Session Hijacking Using Firebug”
  1. Screenshots after Steps 13 and 24

Click here to view the grading rubric for this assignment.

SEC 435 Week 2 Lab 2 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
  5. Summarize the technical experiences in completing the lab assignment.
  6. Identify the commands that were of greatest benefit to you.
  7. Provide general comments on the overall lab assignment experience.
    Note:This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Lab Assignment 2

Due Week 2 and worth 40 points

Complete the following EC-Council Labs.

Note: Lab 2 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning.

Lab
Version
Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Hacking Webservers iLab
Module
11
Lab 1 (Exercise II): “Footprinting Webserver Using the httprecon Tool”
  •  Screenshots after Steps 4 and 10
Lab 2 (Exercise III): “Footprinting a Webserver Using ID Server”
  •  Screenshot after Step 8

2.     Textbook: Web Applications and Data Servers – Chapter 2: Questions 1-2

Click here to view the grading rubric for this assignment.

SEC 435 Week 3 Lab 3 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
  5. Summarize the technical experiences in completing the lab assignment.
  6. Identify the commands that were of greatest benefit to you.
  7. Provide general comments on the overall lab assignment experience.
    Note:This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Lab Assignment 3

Due Week 3 and worth 40 points

Complete the following EC-Council Labs.

Note: Lab 3 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning.

Lab Version Module Title  Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Hacking Web Applications iLab
Module
12
Lab 3 (Exercise I): “Exploiting Parameter Tampering and XSS Vulnerabilities in Web Applications”
  1. Screenshots after Steps 6, 10, and 13
Lab 4 (Exercise VII): “Website Vulnerability Scanning Using Acunetix WVS”
  1. Screenshots after Steps 6, 17, and 21

Click here to view the grading rubric for this assignment.

SEC 435 Week 4 Lab 4 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
  5. Summarize the technical experiences in completing the lab assignment.
  6. Identify the commands that were of greatest benefit to you.
  7. Provide general comments on the overall lab assignment experience.
    Note:This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
LAB ASSIGNMENT 4

Due Week 4 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 4 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Web Applications and Data Servers (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
SQL Injection iLab

Module 13

Lab 1 (Exercise I): “SQL Injection Attacks on MS SQL Database”
  1. Screenshots after Steps 9, 16, and 28

Click here to view the grading rubric for this assignment.

SEC 435 Week 6 Lab 5 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
  5. Summarize the technical experiences in completing the lab assignment.
  6. Identify the commands that were of greatest benefit to you.
  7. Provide general comments on the overall lab assignment experience.
    Note:This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Lab Assignment 5

Due Week 6 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 5 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Hacking Wireless Networks iLab

Module 14

Lab 1 (Exercise I): “Cracking a WEP Network with Aircrack-ng for Windows.” 1.  Screenshots after Steps 5 and 8

Grading for this lab assignment will be based on the following rubric.

Click here to view the grading rubric.

SEC 435 Week 7 Lab 6 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
    1. Summarize the technical experiences in completing the lab assignment.
    2. Identify the commands that were of greatest benefit to you.
    3. Provide general comments on the overall lab assignment experience.
      Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Due Week 7 and worth 30 points

Complete the following EC-Council Labs.

Note: Lab 6 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Hacking Mobile Platforms iLab

Module 15

Lab 1 (Exercise I): “Creating Binary Payloads using Kali Linux to Hack Android.” 1.  Screenshots after Steps 2 and 4
Lab 2 (Exercise I): “Harvesting Users’ Credentials Using Social Engineering Toolkit.” 2.  Screenshots after Steps 6, 17, and 22

Click here to view the grading rubric for this assignment.

SEC 435 Week 8 Lab 7 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
    1. Summarize the technical experiences in completing the lab assignment.
    2. Identify the commands that were of greatest benefit to you.
    3. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Complete the following EC-Council Labs.

Note: Lab 7 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Evading IDS, Firewalls and Honeypots iLab

Module

16

Lab 1 (Exercise I): “Detecting Intrusions using Snort”
  1. Screenshots after Steps 15, 36 and 46

Click here to view the grading rubric for this assignment.

SEC 435 Week 9 Assignment Case Study-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment: Case Study

Due Week 9 and worth 140 points

Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business or government facility.  Lay out the details of the case, and provide your analysis of what was done and why, and speculate on what should have been done, or could have been done differently.  As part of your analysis, you can speculate on what you might have done to change the outcome of your particular case.  Draw specific lessons from the case and possible recommendations for future situations.

Write a paper with no less than five pages in which you:

  1. Research the web and identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility.
  2. Lay out the case details, and provide your analysis of what was done and why, the results of the effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have been attempted.
  3. You may speculate on what actions you might have taken in a similar situation as part of your analysis.
  4. Draw specific lessons and recommendations from your analysis of the case as part of the conclusion, and have a strong concluding paragraph.  Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft.
  5. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.

Click here to view the grading rubric for this case study.

SEC 435 Week 10 Lab Assignment 8 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
    1. Summarize the technical experiences in completing the lab assignment.
    2. Identify the commands that were of greatest benefit to you.
    3. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Complete the following EC-Council Labs.

Note: Lab 8 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435(CEH v9)
Cloud Computing iLab
Module
17
Lab 1 (Exercise I): “Building a Cloud Using OwnCloud and Wampserver” 1. Screenshots after 15, 22, 30, and 58
Lab 2 (Exercise II) “Transferring Cloud Data Over Secure Channel” 2. Screenshots after 10, 15, 19, and 34
Strayer
SEC 420(CEH v9)
Cryptography iLab
Module
18
Lab 1 (Exercise I): “Calculating MD5 Hashes and Verifying File Integrity Using Quick Checksum Verifier” 3. Screenshot after Step 15

4. Textbook: Secure Network Infrastructures – Chapter 4 Questions 1-2

Lab 2 (Exercise III): “Basic Data Encryption Using VeraCrypt” 5. Screenshots after Steps 8 and 27
Lab 3 (Exercise IV): “Basic Data Encryption Using CrypTool” 6. Screenshots after Steps 8 and 28

Click here to view the grading rubric for this assignment.

SEC 435 Week 11 Post-Assessment-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Certification Readiness Assessment 1 and 2

Week Due Title Points
1 Certification Readiness Assessment 1: Pre-assessment 70
11 Certification Readiness Assessment 2: Post-assessment 70

A pre-assessment and post-assessment are part of the required materials for this course. These assessments use the material covered within the course in order to evaluate your exam readiness. Additional specifics surrounding the submission and grading of each assessment are located below.

Each assessment uses the same web-based CEH assessment and consists of two parts:

  • A screenshot of the CEH assessment results
  • A written self-assessment response

Pre-assessment/Post-assessment Completion Requirements

  • Complete the CEH assessment located at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/ceh-assessment.
    Note: Grading is based on participation and is not influenced by the objective score students receive on the online assessment.
  • Take a screenshot of the results page upon completion of the CEH assessment.
    Note: This screenshot serves as confirmation of the completed assessment. The screenshot should at a minimum display your score and general on-screen items. It is not necessary to include each of the itemized question results. Go to http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.
  • Review the interactive results that are displayed with each question. Focus your efforts to gain an understanding of your strengths and weaknesses with respect to the assessment topics, as well as the overall concepts that require additional focus.
  • Please do not be discouraged if you get a low score. This is meant to be an assessment of your knowledge, skills, and abilities coming into the course. It will help you and your Instructor to know what you may need more instruction in and what you are already familiar with.

Pre-assessment/Post-assessment Submission Requirements

Submit one Microsoft Word document which contains:

    1. A screenshot of the completed CEH assessment results.
    2. Write a short answer self-assessment in good paragraphs in Word based on the CEH assessment results in which you:
      • Summarize both your strengths and weaknesses with respect to the topics you covered in the assessment.
      • Determine the concepts that you believe challenged you the most and/or those that require additional focus.

Your assignment must follow these formatting requirements:

  • Combine both elements (screenshot and written self-assessment) into one Microsoft Word document or an open-source equivalent.
  • Documentation must be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.

Click here to view the grading rubric for this assignment.