The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 253 Weeks Ago |
| Questions Answered: | 542 |
| Tutorials Posted: | 539 |
Electronics Engineering
New york Institute of Technology
Jan-2015 - Dec-2016
Tutor
NYIT
Jan-2015 - Present
Tutor
NYIT
Jan-2015 - Present
SEC 435 Complete Labs
SEC 435 Week 1 Pre-Assessment submission
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Certification Readiness Assessment 1
|
Week Due |
Title |
Points |
|
1 |
Certification Readiness Assessment 1: Pre-assessment |
25 |
Each assessment uses the same Web-based EC-Council Certified Security Analyst (ECSA) assessment and consists of two (2) parts:
· A screenshot of the ECSA assessment results
· A written self-assessment response
Pre-assessment / Post-assessment Completion Requirements
· Complete the ECSA assessment located at http://www.eccouncil.org/Training/ecsa-assessment.
Note: Grading is based on participation and is not influenced by the objective score students receive on the online assessment.
· Take a screenshot of the results page upon completion of the ECSA assessment.
Note: This screenshot serves as confirmation of the completed assessment. The screenshot should at a minimum display your score and general on-screen items. It is not necessary to include each of the itemized question results. Go to http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.
· Review the interactive results that are displayed with each question. Focus your efforts to gain an understanding of your strengths and weaknesses with respect to the assessment topics, as well as the overall concepts that require additional focus.
Pre-assessment / Post-assessment Submission Requirements
Submit one (1) Microsoft Word document which contains:
· A screenshot of the completed ECSA assessment results.
· A (one to two [1-2] paragraph) written self-assessment based on the ECSA assessment results in which you:
·
o Summarize both your strengths and weaknesses with respect to the topics you covered in the assessment.
o Determine the concepts that you believe challenged you the most and / or those that require additional focus.
Your assignment must follow these formatting requirements:
· Combine both elements (screenshot and written self-assessment) into one (1) Microsoft Word document, or an open source equivalent.
· Documentation must be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.
Click here to view the grading rubric for this assignment.
SEC 435 Week 2 Lab 1 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience.
Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 1: Foot Printing and Reconnaissance
Due Week 2 and worth 15 points
Complete the following EC-Council Labs.
|
Lab |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Foot Printing and Reconnaissance |
iLab |
Lab 1 (Exercise III): “Extracting Company’s Data Using Web Data Extractor” |
1. Screenshots after Steps 14 and 15 |
|
Lab 2 (Exercise II): “Mirroring Website Using HTTrack Web Site Copier Tool” |
1. Screenshot after Step 13 |
Click here to view the grading rubric for this assignment.
SEC 435 Week 2 Lab 2 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 2: Scanning Networks
Due Week 2 and worth 40 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Scanning Networks |
iLab |
Lab 1 (Exercise I): ”Scanning System and Network Resources Using Advanced IP Scanner” |
1. Screenshot after Step 8 |
|
Lab 2 (Exercise III): ”Fingerprinting Open Ports Using the Amap Tool” |
1. Screenshot after Step 6 |
|||
|
Lab 3 (Exercise IV): ”Monitoring TCP/IP Connections Using the CurrPorts Tool” |
1. Screenshots after Steps 5 and 10 |
|||
|
Lab 4 (Exercise V): ”Exploring and Auditing a Network Using Nmap” |
1. Screenshots after Steps 10 and 26 |
|||
|
Lab 5 (Exercise IX): ”Auditing Scanning by using Global Network Inventory” |
1. Screenshots after Steps 6, 15 and 23 |
|||
|
Lab 6 (Exercise VIII): ”Mapping a Network Using the Friendly Pinger” |
1. Screenshots after Steps 12,15 and 18 |
|||
|
Lab 7 (Exercise XII): ”Basic Network Troubleshooting Using the MegaPing” |
1. Screenshots after Steps 5, 9 and 13 |
SEC 435 Week 2 Lab 3 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 3: Sniffers
Due Week 2 and worth 45 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Sniffers |
iLab |
Lab 1 (Exercise I): “Sniffing the Network Using the OmniPeek Network Analyzer” |
1. Screenshots after Steps 8 and 17 |
|
Lab 2 (Exercise II): “Spoofing MAC addresses Using SMAC |
1. Screenshots after Steps 8 and 20 |
|||
|
Lab 3 (Exercise III): ”Sniffing a Network Using the WinArpAttacker Tool” |
1. Screenshots after Steps 4 and 9 |
|||
|
Lab 4 (Exercise IV): ”Sniffing Passwords using Wireshark” |
1. Screenshots after Steps 5 and 15 |
|||
|
Lab 5 (Exercise V): ”Performing Man-In-The-Middle Attack using Cain & Abel” |
1. Screenshots after Steps 9, 29, 34, 38 and 46 |
|||
|
Lab 6 (Exercise VI): “Detecting ARP attacks with XArp tool” |
1. Screenshots after Steps 6 and 13 |
|||
|
Lab 7 (Exercise VII): “Detecting Systems Running in Promiscuous Mode in a Network Using PromqryUI” |
1. Screenshots after Steps16 and 20 |
|||
|
Lab 8 (Exercise VIII): “ Sniffing Passwords from Captured Packets using Sniff-0-Matic” |
1. Screenshots after Steps 8, 19 and 22 |
SEC 435 Week 3 Lab 4 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 4: System Hacking
Due Week 3 and worth 55 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
System Hacking |
iLab |
Lab 1 (Exercise I): “Extracting Administrator Passwords Using LCP” |
1. Screenshots after Steps 5 and 18 |
|
Lab 2 (Exercise II): “Hiding Files Using NTFS Streams” |
1. Screenshots after Steps 9 |
|||
|
Lab 3 (Exercise III): “Seraching for the Hidden Files Using ADS Spy” |
1. Screenshots after Steps 4 and 6 |
|||
|
Lab 4 (Exercise IV): “Hiding Files Using Stealth Files Tool” |
1. Screenshots after Steps 6 and 17 |
|||
|
Lab 5 (Exercise V): “Extracting SAM Hashes Using PWdump7 Tool” |
1. Screenshot after Step 7 |
|||
|
Lab 6 (Exercise VII): “Hiding Data Using Snow Steganography” |
1. Screenshots after Steps13 and 15 |
|||
|
Lab 7 (Exercise VIII): “Viewing, Enabling, and Clearing the Auditi Policy Using Auditpol” |
1. Screenshot after Step 6 |
|||
|
Lab 8 (Exercise IX): “User System Monitoring and Surveillance needs Using Spytech SpyAgent” |
1. Screenshots after Steps19, 24, 32 and 35 |
|||
|
Lab 9 (Exercise XI): “Image Steganography using QuickStego” |
1. Screenshots after Steps 7, 12 and 17 |
|||
|
Lab 10 (Exercise XIV): “Extracting Administrator Passwords Using L0phtCrack” |
1. Screenshots after Steps 3 and 14 |
SEC 435 Week 3 Lab 5 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 5: Network Forensics, Investigating Logs and Investigating Network Traffic
Due Week 3 and worth 15 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CHFI v8) |
Network Forensics, Investigating Logs and Investigating Network Traffic |
iLab |
Lab 1 (Exercise I): “Capturing and Analyzing Data Packets Using Wireshark Tool” |
1. Screenshots after Steps 5 and 15 |
|
Lab 2 (Exercise II): “Analyzing a Network Using the Colasoft Capsa Network Analyzer Tool” |
1. Screenshots after Steps 6 and 21 |
SEC 435 Week 4 Lab 6 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 6: Evading IDS, Firewalls, and Honeypots
Due Week 4 and worth 10 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Evading IDS, Firewalls and Honeypots |
iLab |
Lab 1 (Exercise I): “Detecting Intrusions using Snort” |
1. Screenshots after Steps27, 30 and 36 |
SEC 435 Week 6 Lab 7 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 7: Enumeration
Due Week 6 and worth 20 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Enumeration |
iLab Module |
Lab 1 (Exercise I): “Enumerating NetBIOS Using the SuperScan Tool” |
1. Screenshot after Step 7 |
|
Lab 2 (Exercise IV): “Enumerating a Network Using SoftPerfect Network Scanner” |
1. Screenshot after Step 6 |
|||
|
Lab 3 (Exercise V): “Enumerating a Network Using SolarWinds Toolset” |
1. Screenshots after Steps 5 and 12 |
SEC 435 Week 6 Lab 8 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 8: Hacking Wireless Networks
Due Week 6 and worth 15 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Hacking Wireless Networks |
iLab |
Lab 1 (Exercise I): “Cracking a WEP Network with Aircrack-ng for Windows” |
1. Screenshot after Step 9 |
|
Lab 2 (Exercise II): “Sniffing the Network Using the OmniPeek Network Analyzer” |
1. Screenshots after Steps 5 and 14 |
SEC 435 Week 7 Lab 9 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 9: Trojans and Backdoors
Due Week 7 and worth 35 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Trojans and Backdoors |
iLab |
Lab 1 (Exercise I): “Creating a Trojan Server Using ProRat Tool” |
1. Screenshots after Steps 5 and 21 |
|
Lab 2 (Exercise II): “Wrapping a Trojan using One File EXE Maker” |
1. Screenshots after Steps 4 and 15 |
|||
|
Lab 3 (Exercise III): “Proxy Server Trojan” |
1. Screenshots after Steps10 and 14 |
|||
|
Lab 4 (Exercise IV): “HTTP Trojan” |
1. Screenshots after Steps 8 and 19 |
|||
|
Lab 5 (Exercise V): “Remote Access Trojans Using Atelier Web Remote Commander” |
1. Screenshots after Steps 6 and 14 |
|||
|
Lab 6 (Exercise IX): “Hack Windos 7 Using MEtasploit |
1. Screenshots after Steps 3, 6, 12, 18, 24 and 26 |
SEC 435 Week 7 Lab 10 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 10: Viruses and Worms
Due Week 7 and worth 10 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Viruses and Worms |
iLab |
Lab 1 (Exercise I): “Creating a Virus Using the JPS Virus Maker Tool” |
1. Screenshots after Steps 4 and 14 |
SEC 435 Week 8 Lab 11 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 11: Cryptography
Due Week 8 and worth 30 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Cryptography |
iLab |
Lab 1 (Exercise I): “Basic Data Encryption Using HashCalc” |
1. Screenshots after Steps 6 and 10 |
|
Lab 2 (Exercise II): “Basic Data Encryption Using MD5 Calculator” |
1. Screenshot after Step 6 |
|||
|
Lab 3 (Exercise III): “Basic Data Encryption Using Advanced Encryption Package” |
1. Screenshots after Steps 7 and 12 |
|||
|
Lab 4 (Exercise IV): “Basic Data Encryption Using TrueCrypt” |
1. Screenshots after Steps 5 and 22 |
|||
|
Lab 5 (Exercise V): “Basic Data Encryption Using CrypTool” |
1. Screenshots after Steps 4 and 14 |
SEC 435 Week 9 Lab 12 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 12: Denial of Service
Due Week 9 and worth 10 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Denial of Service |
iLab |
Lab 1 (Exercise I): “SYN Flooding a Target Host using hping3” |
1. Screenshots after Steps 7, 11 and 14 |
SEC 435 Week 9 Lab 13 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 13: Buffer Overflow
Due Week 9 and worth 10 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
|
Strayer (CEH v8) |
Buffer Overflow |
iLab |
Lab 1 (Exercise I): “Buffer Overflow Example” |
1. Screenshots after Steps 3 and 14 |
|
SEC 435 Week 10 Lab 14 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 14: Hacking Web Servers
Due Week 10 and worth 15 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Hacking Webservers |
iLab |
Lab 1 (Exercise I): “Footprinting Webserver Using the httprecon Tool” |
1. Screenshots after Steps 4 and 13 |
|
Lab 2 (Exercise II): “Footprinting a Webserver Using ID Serve” |
1. Screenshot after Step 6 |
SEC 435 Week 10 Lab 15 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 15: Hacking Web Applications
Due Week 10 and worth 15 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
Hacking Web Applications |
iLab |
Lab 1 (Exercise I): “Hacking Web Applications” |
1. Screenshots after Steps 6, 10 and 13 |
|
Lab 2 (Exercise II): “Website Vulnerability Scanning Using Acunetix WVS” |
1. Screenshots after Steps 5 and 16 |
SEC 435 Week 10 Lab 16 Assignment
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer (four to five (4-5) sentences) in the comment text box located with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 16: SQL Injection
Due Week 10 and worth 10 points
Complete the following EC-Council Labs.
|
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
|
Strayer (CEH v8) |
SQL Injection |
iLab |
Lab 1 (Exercise I): “SQL Injection Attacks on MS SQL Database” |
1. Screenshots after Steps 9, 14 and 20 |
SEC 435 Week 10 Post Assesment
Certification Readiness Assessment 2
|
Week Due |
Title |
Points |
|
10 |
Certification Readiness Assessment 2: Post-assessment |
25 |
Each assessment uses the same Web-based EC-Council Certified Security Analyst (ECSA) assessment and consists of two (2) parts:
· A screenshot of the ECSA assessment results
· A written self-assessment response
Pre-assessment / Post-assessment Completion Requirements
· Complete the ECSA assessment located at http://www.eccouncil.org/Training/ecsa-assessment.
Note: Grading is based on participation and is not influenced by the objective score students receive on the online assessment.
· Take a screenshot of the results page upon completion of the ECSA assessment.
Note: This screenshot serves as confirmation of the completed assessment. The screenshot should at a minimum display your score and general on-screen items. It is not necessary to include each of the itemized question results. Go to http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.
· Review the interactive results that are displayed with each question. Focus your efforts to gain an understanding of your strengths and weaknesses with respect to the assessment topics, as well as the overall concepts that require additional focus.
Pre-assessment / Post-assessment Submission Requirements
Submit one (1) Microsoft Word document which contains:
· A screenshot of the completed ECSA assessment results.
· A (one to two [1-2] paragraph) written self-assessment based on the ECSA assessment results in which you:
·
o Summarize both your strengths and weaknesses with respect to the topics you covered in the assessment.
o Determine the concepts that you believe challenged you the most and / or those that require additional focus.
Your assignment must follow these formatting requirements:
· Combine both elements (screenshot and written self-assessment) into one (1) Microsoft Word document, or an open source equivalent.
· Documentation must be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.
Click here to view the grading rubric for this assignment.
-----------