Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 6 Weeks Ago, 4 Days Ago |
Questions Answered: | 7559 |
Tutorials Posted: | 7341 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Lab Assignments
Submit each lab based on the following:
1. Log into the EC-Council iLab environment.
2. Complete the weekly lab assignment described below using EC-Council iLab.
3. Submit the screenshots for the steps specified in each lab assignment.
4. Write a short answer in Word format and include with the assignment submission link the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience.
Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Complete the following EC-Council Labs.
Note: Lab 7 contains deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Secure Network Operating Systems and Infrastructures. (2nd ed.). Cengage Learning.
Lab Version |
Module Title |
Location |
Lab #: Title |
Deliverable(s) for Submission |
Strayer (CEH v9) |
Evading IDS, Firewalls and Honeypots |
iLab Module 16 |
Lab 1 (Exercise I): “Detecting Intrusions using Snort” |
1. Screenshots after Steps 15, 36 and 46 |
Click here to view the grading rubric for this assignment.
SEC----------- 43-----------5 W-----------eek----------- 8 -----------Lab----------- 1 -----------Ass-----------ign-----------men-----------t 7-----------