SEC 435 WEEK 10 LAB ASSIGNMENT 8 LATEST STRAYER

admin   August 6, 2018   Comments Off on SEC 435 WEEK 10 LAB ASSIGNMENT 8 LATEST STRAYER

SEC 435 WEEK 10 LAB ASSIGNMENT 8 LATEST STRAYER

Visit Below Link, To Download This Course:

https://www.tutorialsservice.com/product/sec-435-week-10-lab-assignment-8-latest-strayer/

 

SEC 435 Week 10 Lab Assignment 8 Latest-Strayer

SEC435

SEC 435 Week 10 Lab Assignment 8 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment.
  4. Write a short answer in Word format and include with the assignment submission link the following:
    1. Summarize the technical experiences in completing the lab assignment.
    2. Identify the commands that were of greatest benefit to you.
    3. Provide general comments on the overall lab assignment experience.

Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Complete the following EC-Council Labs.

Note: Lab 8 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 435

(CEH v9)

Cloud Computing iLab
Module
17
Lab 1 (Exercise I): “Building a Cloud Using OwnCloud and Wampserver” 1. Screenshots after 15, 22, 30, and 58
Lab 2 (Exercise II) “Transferring Cloud Data Over Secure Channel” 2. Screenshots after 10, 15, 19, and 34
Strayer
SEC 420

(CEH v9)

Cryptography iLab
Module
18
Lab 1 (Exercise I): “Calculating MD5 Hashes and Verifying File Integrity Using Quick Checksum Verifier” 3. Screenshot after Step 15

4. Textbook: Secure Network Infrastructures – Chapter 4 Questions 1-2

Lab 2 (Exercise III): “Basic Data Encryption Using VeraCrypt” 5. Screenshots after Steps 8 and 27
Lab 3 (Exercise IV): “Basic Data Encryption Using CrypTool” 6. Screenshots after Steps 8 and 28

Click here to view the grading rubric for this assignment.