Math Expert

(3)

$10/per page/Negotiable

About Math Expert

Levels Tought:
University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,English,HR Management,Math,Psychology,Statistics Hide all
Teaching Since: Apr 2017
Last Sign in: 253 Weeks Ago
Questions Answered: 542
Tutorials Posted: 539

Education

  • Electronics Engineering
    New york Institute of Technology
    Jan-2015 - Dec-2016

Experience

  • Tutor
    NYIT
    Jan-2015 - Present

  • Tutor
    NYIT
    Jan-2015 - Present

Category > Accounting Posted 10 May 2017 My Price 100.00

SEC 435 Complete Labs

SEC 435 Complete Labs

SEC 435 Week 1 Pre-Assessment submission

Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. 
Instructors, training on how to grade is within the Instructor Center. 

Certification Readiness Assessment 1 



Week Due



Title



Points



1



Certification Readiness Assessment 1: Pre-assessment



25

Each assessment uses the same Web-based EC-Council Certified Security Analyst (ECSA) assessment and consists of two (2) parts:

·         A screenshot of the ECSA assessment results

·         A written self-assessment response

Pre-assessment / Post-assessment Completion Requirements

·         Complete the ECSA assessment located at http://www.eccouncil.org/Training/ecsa-assessment.    
Note: Grading is based on participation and is not influenced by the objective score students receive on the online assessment.

·         Take a screenshot of the results page upon completion of the ECSA assessment.
Note: This screenshot serves as confirmation of the completed assessment. The screenshot should at a minimum display your score and general on-screen items. It is not necessary to include each of the itemized question results. Go to 
http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.

·         Review the interactive results that are displayed with each question. Focus your efforts to gain an understanding of your strengths and weaknesses with respect to the assessment topics, as well as the overall concepts that require additional focus.     

Pre-assessment / Post-assessment Submission Requirements
Submit one (1) Microsoft Word document which contains:

·         A screenshot of the completed ECSA assessment results.

·         A (one to two [1-2] paragraph) written self-assessment based on the ECSA assessment results in which you:

·          

o    Summarize both your strengths and weaknesses with respect to the topics you covered in the assessment.

o    Determine the concepts that you believe challenged you the most and / or those that require additional focus.

Your assignment must follow these formatting requirements:

·         Combine both elements (screenshot and written self-assessment) into one (1) Microsoft Word document, or an open source equivalent.

·         Documentation must be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.

Click here to view the grading rubric for this assignment.

 

SEC 435 Week 2 Lab 1 Assignment

Submit each lab based on the following:

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment.

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:

a.      Summarize the technical experiences in completing the lab assignment.

b.      Identify the commands that were of greatest benefit to you.

c.      Provide general comments on the overall lab assignment experience.
Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 1: Foot Printing and Reconnaissance

Due Week 2 and worth 15 points

Complete the following EC-Council Labs.

Lab
Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Foot Printing and Reconnaissance

iLab
Module
2

Lab 1 (Exercise III): “Extracting Company’s Data Using Web Data Extractor”

1.      Screenshots after Steps 14 and 15

Lab 2 (Exercise II): “Mirroring Website Using HTTrack Web Site Copier Tool”

1.      Screenshot after Step 13

 Click here to view the grading rubric for this assignment.

 

SEC 435 Week 2 Lab 2 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 2: Scanning Networks

Due Week 2 and worth 40 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Scanning Networks

iLab
Module
3

Lab 1 (Exercise I): ”Scanning System and Network Resources Using Advanced IP Scanner”

1.      Screenshot after Step 8

Lab 2 (Exercise III): ”Fingerprinting Open Ports Using the Amap Tool”

1.      Screenshot after Step 6

Lab 3 (Exercise IV): ”Monitoring TCP/IP Connections Using the CurrPorts Tool”

1.      Screenshots after Steps 5 and 10

Lab 4 (Exercise V): ”Exploring and Auditing a Network Using Nmap”

1.      Screenshots after Steps 10 and 26

Lab 5 (Exercise IX): ”Auditing Scanning by using Global Network Inventory”

1.      Screenshots after Steps 6, 15 and 23

Lab 6 (Exercise VIII): ”Mapping a Network Using the Friendly Pinger”

1.      Screenshots after Steps 12,15 and 18

Lab 7 (Exercise XII): ”Basic Network Troubleshooting Using the MegaPing”

1.      Screenshots after Steps 5, 9 and 13



 

SEC 435 Week 2 Lab 3 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 3: Sniffers

Due Week 2 and worth 45 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Sniffers

iLab
Module
8

Lab 1 (Exercise I): “Sniffing the Network Using the OmniPeek Network Analyzer”

1.      Screenshots after Steps 8 and 17

Lab 2 (Exercise II): “Spoofing MAC addresses Using SMAC

1.      Screenshots after Steps 8 and 20

Lab 3 (Exercise III): ”Sniffing a Network Using the WinArpAttacker Tool”

1.      Screenshots after Steps 4 and 9

Lab 4 (Exercise IV): ”Sniffing Passwords using Wireshark”

1.      Screenshots after Steps 5 and 15

Lab 5 (Exercise V): ”Performing Man-In-The-Middle Attack using Cain & Abel”

1.      Screenshots after Steps 9, 29, 34, 38 and 46

Lab 6 (Exercise VI): “Detecting ARP attacks with XArp tool”

1.      Screenshots after Steps 6 and 13

Lab 7 (Exercise VII): “Detecting Systems Running in Promiscuous Mode in  a Network Using PromqryUI”

1.      Screenshots after Steps16 and 20

Lab 8 (Exercise VIII): “ Sniffing Passwords from Captured Packets using Sniff-0-Matic”

1.      Screenshots after Steps 8, 19 and 22



 SEC 435 Week 3 Lab 4 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 4: System Hacking

Due Week 3 and worth 55 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

System Hacking

iLab
Module
5

Lab 1 (Exercise I): “Extracting Administrator Passwords Using LCP”

1.      Screenshots after Steps 5 and 18

Lab 2 (Exercise II): “Hiding Files Using NTFS Streams”

1.      Screenshots after Steps 9

Lab 3 (Exercise III): “Seraching for the Hidden Files Using ADS Spy”

1.      Screenshots after Steps 4 and 6

Lab 4 (Exercise IV): “Hiding Files Using Stealth Files Tool”

1.      Screenshots after Steps 6 and 17

Lab 5 (Exercise V): “Extracting SAM Hashes Using PWdump7 Tool”

1.      Screenshot after Step 7

Lab 6 (Exercise VII): “Hiding Data Using Snow Steganography”

1.      Screenshots after Steps13 and 15

Lab 7 (Exercise VIII): “Viewing, Enabling, and Clearing the Auditi Policy Using Auditpol”

1.      Screenshot after Step 6

Lab 8 (Exercise IX): “User System Monitoring and Surveillance needs Using Spytech SpyAgent”

1.      Screenshots after Steps19, 24, 32 and 35

Lab 9 (Exercise XI): “Image Steganography using QuickStego”

1.      Screenshots after Steps 7, 12 and 17

Lab 10 (Exercise XIV): “Extracting Administrator Passwords Using L0phtCrack”

1.      Screenshots after Steps 3 and 14

 

SEC 435 Week 3 Lab 5 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 5: Network Forensics, Investigating Logs and Investigating Network Traffic

Due Week 3 and worth 15 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CHFI v8)

Network Forensics, Investigating Logs and Investigating Network Traffic

iLab
Module
16

Lab 1 (Exercise I): “Capturing and Analyzing Data Packets Using Wireshark Tool”

1.      Screenshots after Steps 5 and 15

Lab 2 (Exercise II): “Analyzing a Network Using the Colasoft Capsa Network Analyzer Tool”

1.      Screenshots after Steps 6 and 21

 

 

SEC 435 Week 4 Lab 6 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 6: Evading IDS, Firewalls, and Honeypots

Due Week 4 and worth 10 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Evading IDS, Firewalls and Honeypots

iLab
Module
17

Lab 1 (Exercise I): “Detecting Intrusions using Snort”

1.      Screenshots after Steps27, 30 and 36

 

SEC 435 Week 6 Lab 7 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 7: Enumeration

Due Week 6 and worth 20 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Enumeration

iLab Module
4

Lab 1 (Exercise I): “Enumerating NetBIOS Using the SuperScan Tool”

1.      Screenshot after Step 7

Lab 2 (Exercise IV): “Enumerating a Network Using SoftPerfect Network Scanner”

1.      Screenshot after Step 6

Lab 3 (Exercise V): “Enumerating a Network Using SolarWinds Toolset”

1.      Screenshots after Steps 5 and 12

 

SEC 435 Week 6 Lab 8 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 8: Hacking Wireless Networks

Due Week 6 and worth 15 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Hacking Wireless Networks

iLab
Module
15

Lab 1 (Exercise I): “Cracking a WEP Network with Aircrack-ng for Windows”

1.      Screenshot after Step 9

Lab 2 (Exercise II): “Sniffing the Network Using the OmniPeek Network Analyzer”

1.      Screenshots after Steps 5 and 14

 

SEC 435 Week 7 Lab 9 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 9: Trojans and Backdoors

Due Week 7 and worth 35 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Trojans and Backdoors

iLab
Module
6

Lab 1 (Exercise I): “Creating a Trojan Server Using ProRat Tool”

1.      Screenshots after Steps 5 and 21

Lab 2 (Exercise II): “Wrapping a Trojan using One File EXE Maker”

1.      Screenshots after Steps 4 and 15

Lab 3 (Exercise III): “Proxy Server Trojan”

1.      Screenshots after Steps10 and 14

Lab 4 (Exercise IV): “HTTP Trojan”

1.      Screenshots after Steps 8 and 19

Lab 5 (Exercise V): “Remote Access Trojans Using Atelier Web Remote Commander”

1.      Screenshots after Steps 6 and 14

Lab 6 (Exercise IX): “Hack Windos 7 Using MEtasploit

1.      Screenshots after Steps 3, 6, 12, 18, 24 and 26

 

SEC 435 Week 7 Lab 10 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 10: Viruses and Worms

Due Week 7 and worth 10 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Viruses and Worms

iLab
 Module
7

Lab 1 (Exercise I): “Creating a Virus Using the JPS Virus Maker Tool”

1.      Screenshots after Steps 4 and 14

 

SEC 435 Week 8 Lab 11 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 11: Cryptography

Due Week 8 and worth 30 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Cryptography

iLab
Module
19

Lab 1 (Exercise I): “Basic Data Encryption Using HashCalc”

1.      Screenshots after Steps 6 and 10

Lab 2 (Exercise II): “Basic Data Encryption Using MD5 Calculator”

1.      Screenshot after Step 6

Lab 3 (Exercise III): “Basic Data Encryption Using Advanced Encryption Package”

1.      Screenshots after Steps 7 and 12

Lab 4 (Exercise IV): “Basic Data Encryption Using TrueCrypt”

1.      Screenshots after Steps 5 and 22

Lab 5 (Exercise V): “Basic Data Encryption Using CrypTool”

1.      Screenshots after Steps 4 and 14

 

SEC 435 Week 9 Lab 12 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 12: Denial of Service

Due Week 9 and worth 10 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Denial of Service

iLab
Module
10

Lab 1 (Exercise I): “SYN Flooding a Target Host using hping3”

1.      Screenshots after Steps 7, 11 and 14

 

SEC 435 Week 9 Lab 13 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 13: Buffer Overflow

Due Week 9 and worth 10 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Buffer Overflow

iLab
Module
18

Lab 1 (Exercise I): “Buffer Overflow Example”

1.      Screenshots after Steps 3 and 14

 

 

SEC 435 Week 10 Lab 14 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 14: Hacking Web Servers

Due Week 10 and worth 15 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Hacking Webservers

iLab
Module
12

Lab 1 (Exercise I): “Footprinting Webserver Using the httprecon Tool”

1.      Screenshots after Steps 4 and 13

Lab 2 (Exercise II): “Footprinting a Webserver Using ID Serve”

1.      Screenshot after Step 6

 

SEC 435 Week 10 Lab 15 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 15: Hacking Web Applications

Due Week 10 and worth 15 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

Hacking Web Applications

iLab
Module
13

Lab 1 (Exercise I): “Hacking Web Applications”

1.      Screenshots after Steps 6, 10 and 13

Lab 2 (Exercise II): “Website Vulnerability Scanning Using Acunetix WVS”

1.      Screenshots after Steps 5 and 16

 

SEC 435 Week 10 Lab 16 Assignment

Submit each lab based on the following: 

1.      Log into the EC-Council iLab environment.

2.      Complete the weekly lab assignment described below using EC-Council iLab.

3.      Submit the screenshots for the steps specified in each lab assignment. 

4.      Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following: 

a.       Summarize the technical experiences in completing the lab assignment. 

b.      Identify the commands that were of greatest benefit to you. 

c.       Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing. 

Lab Assignment 16: SQL Injection

Due Week 10 and worth 10 points

Complete the following EC-Council Labs.

Lab Version

Module Title

Location

Lab #: Title

Deliverable(s) for Submission

Strayer
SEC 435

(CEH v8)

SQL Injection

iLab
Module
14

Lab 1 (Exercise I): “SQL Injection Attacks on MS SQL Database”

1.      Screenshots after Steps 9, 14 and 20

 

SEC 435 Week 10 Post Assesment

Certification Readiness Assessment 2



Week Due



Title



Points



10



Certification Readiness Assessment 2: Post-assessment



25

Each assessment uses the same Web-based EC-Council Certified Security Analyst (ECSA) assessment and consists of two (2) parts:

·         A screenshot of the ECSA assessment results

·         A written self-assessment response

Pre-assessment / Post-assessment Completion Requirements

·         Complete the ECSA assessment located at http://www.eccouncil.org/Training/ecsa-assessment.    
Note: Grading is based on participation and is not influenced by the objective score students receive on the online assessment.

·         Take a screenshot of the results page upon completion of the ECSA assessment.
Note: This screenshot serves as confirmation of the completed assessment. The screenshot should at a minimum display your score and general on-screen items. It is not necessary to include each of the itemized question results. Go to 
http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.

·         Review the interactive results that are displayed with each question. Focus your efforts to gain an understanding of your strengths and weaknesses with respect to the assessment topics, as well as the overall concepts that require additional focus.     

Pre-assessment / Post-assessment Submission Requirements
Submit one (1) Microsoft Word document which contains:

·         A screenshot of the completed ECSA assessment results.

·         A (one to two [1-2] paragraph) written self-assessment based on the ECSA assessment results in which you:

·          

o    Summarize both your strengths and weaknesses with respect to the topics you covered in the assessment.

o    Determine the concepts that you believe challenged you the most and / or those that require additional focus.

Your assignment must follow these formatting requirements:

·         Combine both elements (screenshot and written self-assessment) into one (1) Microsoft Word document, or an open source equivalent.

·         Documentation must be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.

Click here to view the grading rubric for this assignment.

 

 

Answers

(3)
Status NEW Posted 10 May 2017 09:05 PM My Price 100.00

-----------

Attachments

1494453679-Labs.zip
Not Rated(0)