Capture the Flag (CTF) Write-Up

  The individual CTF challenge is made up of 100 challenges separated into 10 categories of 10 challenges. You may choose which challenges you want to attempt and may attempt multiple challenges from the same category. Once you have attempted any of the 10 questions out of the 100, proceed to the CTF Challenge Write-Up. … Read more

INFORMATION SECURITY

  Watch the video series for Learning Cryptography and Network Security on LinkedInLearning.com. (You need to be logged in to NU Single Sign-On for the link to work). Learning Cryptography and Network Security  (1 hr 45m) – Video Link Write a 2-page paper on what you learned from the video series. Describe how you would use the … Read more

Online Research Project

 Online Research Project from the field of  CS – Business Computing. The guidelines are included in the pdf file attached down below. In addition, there is an example of how the project should (ideally) look like(excel and word file).

GUI

OOP based GUI project to create a program in java or c# in visual studio 2022 * When the program begins, open a reasonably sized, appropriately titled window. * The window should contain at least 3 working buttons, more if appropriate. Examples: Start/Go button o Help/Information * Credit – listing of programmers * The program … Read more

question1

Alternative Processing Site Proposal R&D Media, LLC has asked you to develop a proposal for an Alternative Processing Site. Conduct research on the latest technologies for Alternative Processing Sites (feel free to use your assignment). Determine who the company’s stakeholders are. Using the results of your research, develop the request for proposal that best meets … Read more

LAB 6

 Write this reflection for the lab:  In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers … Read more