Are DOS Attacks Still Useful?

  Mitigation Strategies Given how expansive the internet is and with the addition of cloud services, is the use of DDOS and DOS attacks still relevant? Please perform additional research as necessary on this topic outside of the textbook. Initial Post: What is a DoS or DDoS attack? What is involved in such attacks? Include … Read more

Volume II Reflection

  Volume II Reflection:  As we finish up volume 2 and modules 5-8, please walk through each module and reflect on your strengths, areas for additional learning, any challenges you faced, how you overcame them, or your steps you plan to take to master these concepts. Each volume builds upon the previous so having mastered … Read more

Performing Distributed Denial of Service Attack using HOIC Lab

 Unlimited Attempts AllowedDetails Virtual Labs: Perpetrators of DoS Consider what you have learned so far about Denial of Service as you review the objectives and scenario below.  Complete the lab that follows on EC-Council’s website using the link below. Objective Denial of Service (DoS) is an attack on a computer or network that prevents legitimate … Read more

Ways to Protect | Discussion

  Preventing Social Engineering What, according to you, are the necessary countermeasures for preventing social engineering and identity theft? Please perform additional research as necessary on this topic outside of the textbook. Initial Post: There are a number of ways to protect oneself from the effects of social engineering attacks. Choose 5 and expand on … Read more

Sniffing Facebook Credentials using Social Engineering Toolkit (SET) | Labs

 Unlimited Attempts AllowedDetails Virtual Labs: Sniffing & Social Engineering Consider what you have learned so far about Sniffing and Social Engineering as you review the objectives and scenario below.  Complete the lab that follows on EC-Council’s website using the link below. Objective Social engineering is the art of convincing people to reveal confidential information. Social … Read more

BC/DR Plans

  BC/DR Plans As you craft your initial post, you will be using information from your texts, along with conducting independent research with sources outside of the required texts. Start your discussion with the following questions:  What is BC/DR plan and why is it important to an organization? Based on your research, how do BC/DR … Read more

Final Project

 Unlimited Attempts AllowedDetails Taking all of the information that was discussed this term, I want you to do some independent research and find an organization that interests you.  I want you to look at their current operations, what their business requirements are, current IT situation and I want you to put together a presentation for … Read more

Incident Response Teams

  Incident Response Teams As you craft your initial post, you will be using information from your texts, along with conducting independent research with sources outside of the required texts. Start with the following questions:  Although our textbook did not go over incident response teams, please do some outside research into this and describe the … Read more

Security Operations Center

 Unlimited Attempts AllowedDetails Graduate-level student learning will involve more of a focus on “diving in deeper” to the content. Written and oral presentation on the field of study experience, in combination with independent research and course content, will be essential elements of your graduate studies.  To have an experience isn’t enough to establish learning – … Read more

Sniffing Tools & Techniques | Research Assignment

 Unlimited Attempts AllowedDetails Research. Analyze. Define Choose 5 sniffing tools and 3 sniffing techniques and provide detailed analysis about the differences between each. Research and Write: After choosing 5 sniffing tools and 3 sniffing techniques, provide a detailed analysis of their differences in a 3-5 page double spaced paper with citations. For each technique, describe … Read more