SEC 435 Complete Course Week 1 to Week 11
Login
now
Register
now

Friday, 16 October 2015

SEC 435 Complete Course Week 1 to Week 11

Download Answer here
SEC 435 Week 1 Discussion
"Security Analysis  and Protocol Analysis"  Please respond to the following:
·         Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response. 
·         Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response. 


SEC 435 Week 2 Discussion
"DMZ  and Logs"  Please respond to the following:
·         Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller. 
·         It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found ways to make them more meaningful through correlation methods across different log producing platforms (i.e., Security Information Event Management [SIEM]). Determine the fundamental advantages of a company having a SIEM solution over merely having a method to store logs efficiently. Next, discuss the limitations, concerns, and future trends of having a SIEM solution within a company.
SEC 435 Week 3 Discussion
"Penetration Test Methods and Legal Consideration of Penetration Testing"  Please respond to the following:
·         Compare and contrast announced penetration testing and unannounced penetration testing. Speculate on whether or not there are instances where unannounced testing is preferred over announced testing. Justify your response. 
·         Suggest three (3) penetration testing methods that you would use for a small day care business. Provide a rationale to support your response. Note: The day care is located in the heart of downtown, currently uses a Website, databases, file servers, printers, both wireless (802.11x) and Ethernet access to the Internet, and card readers for physical entry for its employees.

SEC 435 Week 3 Assignment 1 Business Security Posture
Due Week 3 and worth 90 points

Company XYZ, a mid-sized corporation, is in the middle of satisfying their regulatory compliance needs.  The manager of security at the company has been tasked by the CIO (Chief Information Officer) to report on the company’s current security posture. You are called upon as a 3rd party penetration tester, based on your industry reputation of being both careful and thorough to report on company XYZ’s security posture. The only information available about the company is the generalized information found on its company Website which includes a contact page, home page, customer login portal, copyright and acceptable use page, and disclaimers page.  
As an experienced penetration tester, you already have a collection of typical tools you use to conduct your tests (at minimum, all the tools available in CEH labs for this course.) The end goal here is to report on company XYZ’s current security posture through performing penetration tests.

Write a four to five (4-5) page paper in which you outline all steps you would take to provide company XYZ’s request. Include but do not limit yourself to the following:
1.      Determine the communications and questions that you need to ask the Manager of Security before beginning your work assignment.
2.      Determine the type of documents you would bring to your first meeting with the Manager of Security (i.e. documents to sign, to review, to consider).
3.      Explain chronologically when things happen.
4.      Predict what results are expected based on tools and techniques you use. For example, if a goal is to collect recon data, one might use the Nmap tool to perform a subnet scan. A similar scan can be conducted in your iLabs environment and the resulting data used as support in the form of screenshots when explaining your theories.  
5.      Evaluate the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. 
6.      Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Provide a rationale to support your proposal.
7.      Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:
·         Discuss the need for security analysis.
·         Discuss the techniques and apply the tools to perform penetration tests.
·         Discuss and design a Demilitarized Zone (DMZ).
·         Use technology and information resources to research issues in penetration testing tools and techniques.
·         Write clearly and concisely about Network Penetration Testing topics, using proper writing mechanics and technical style conventions. 
Click here to view the grading rubric for this assignment.

SEC 435 Week 4 Discussion
"Vulnerability Assessments and Penetration Testing Approaches"  Please respond to the following:
·         Imagine that you work for a financial organization of which the management feels that one of their competitors was always two steps ahead of them in competitive strategies. Recommend the type of vulnerability assessment analysis that you would perform for this organization. In your recommendation, include the main assessment steps. Provide a rationale for your response. 
·         Compare and contrast five (5) differences between conducting an internal versus external penetration test. Suggest the techniques that a penetration tester would use in order to prevent the system administrators or security professionals from knowing the system was illegally accessed. Provide a rationale for your response.

SEC 435 Week 5 Discussion
"Wireless Penetration and Securing Wireless"  Please respond to the following:
·         Specify the main steps involved in cracking WEP encryption. Discuss the implications of relying on such a legacy protocol today and how essential it is for the IT industry to keep current with technology.
·         Compare the key added challenges of securing wirelessly-connected devices versus securing LAN-connected devices. Next, discuss the so-called “cloaking” as it pertains to Wi-Fi networks. Analyze the reasoning behind enabling or disabling this feature.


SEC 435 Week 6 Discussion
"Voice Over IP and VPN Technologies"  Please respond to the following:
·         Give your opinion on the least difficult and most difficult step(s) in VoIP penetration testing. Explain in detail the reasons for your choice. 
·         From the e-Activity, discuss the role that IKE plays in VPNs. Next, determine the main strengths and weaknesses of IKE and provide defensive measures that you would suggest to mitigate the weaknesses.

SEC 435 Week 6 Assignment 2 Security Risk Assessment
Due Week 6 and worth 90 points
In 2006, a small business was created in the financial sector. The main purpose of the business was to provide customers with a close to real-time analysis of their stock portfolios. After months of doing business, several IT Administrators began to notice subtle changes in the corporate network. Shortly after that, the CEO began calling high-level meetings, especially with marketing and finance, to determine why the company’s profits for the last five months (July to December) began to take a downward spiral. This was occurring when industry-wide profit margins were easily expected to be higher and on the rise. The CEO could not understand why his company’s profits were instead decreasing, and hoped to get some insight from the meeting he had called. At this point, the CEO focused on finding the part of his business process that was failing and correcting any issues. During his meeting with Finance and Marketing, the only information presented to the CEO was that all operations and processes remained unchanged for the past year and (from charts shown below) that the number of new customers registering through their customer portal had dropped drastically for the last five months.

Around the same time these meetings were occurring, one network administrator at the company noticed anomalous traffic on port 80 of the Web Server on the DMZ. The edge router’s logs showed that the traffic started six months ago and ended five months later. Additionally, he noticed five months ago that traffic from the Web servers to the internal application servers decreased each day, although the inbound requests on port 80 remained about the same. Finally, he noticed, that for the last four months, his Web server logs contained many http “Post” statements. followed by the Website address of one the company’s main competitors. All of the post statements seemed to appear in the logs after new users would click “submit” to register. As a result, the network administrator escalated the issue.

Write a four to five (4-5) page paper in which you:
Determine your next steps chronologically in investigating this issue.
Describe the parties you would involve and the extent of their involvement.
Explain your hypothesis of what has occurred.
Analyze the software tools you would use for your investigation.
Explain and justify the timelines and sequences of your actions.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
SEC 435 Week 7 Discussion
*"Mobile Technologies and Physical Security"  Please respond to the following:
·         From the e-Activity, compare and contrast the security features of the Google Android and Apple iPhone operating systems with regard to the flexibility, ease of use, scalability, and security.
·         Specify the type of data that a thief / hacker who possesses the technical knowledge may be able to extract from a stolen laptop, PDA, Tablet, or cell phone. Suggest preventative measures that organizations and / or individuals would take in order protect data on these devices from unauthorized access.

SEC 435 Week 8 Discussion
*"DoS Attacks and Password Cracking"  Please respond to the following:
·         Identify three (3) DoS attacks and analyze the way in which each attack takes advantage of the interworking of the transport protocols (e.g.,TCP, IP, and UDP) and exploits the protocol’s  vulnerabilities. Describe the protocols used for each attack and suggest methods that system / security administrators could use in order to detect the attack and mitigate recurring instances. Explain the manner in which a Distributed DoS attack may be more effective than a DoS in bringing down a large network.
·         From the e-Activity, compare and contrast Linux versus Windows password management methods.  Suggest the methodology that you would use in order to make sure that all passwords have different hash values. Provide a rationale to support your response.

SEC 435 Week 9 Discussion
"Application Testing and Database Penetration"  Please respond to the following:
·         Imagine that a systems administrator for a midsized company has recently noticed numerous odd characters in the log servers. Specifically, http “GET” and “POST” log entries within their externally facing IIS version 5 Web server. Discuss the use of the “GET” and “POST” commands and decide whether or not there are concerns with their presence on the externally facing web server. Next, provide your analysis of the most damaging attack (i.e. XSS, SQL Injection, CSS, and Race conditions) against Internet Information Services (IIS). Support your rationale.
·         Describe the most prominent signs that a database attack has occurred. Suggest the main steps that one would take to recover from such an attack. Next, propose one (1) strategy you would use to prevent such attacks.
SEC 435 Week 10 Discussion
"Malware Detection and Prevention and Log Management"  Please respond to the following:
·         Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks.  Present the basic technical knowledge that a layman would need in order to use the methods you identified.
·         Explain the exact steps you would take when securing log data. Contrast log generation / management in Windows (i.e. XP, Windows7, Server2008) versus Linux (i.e. Redhat, Ubuntu, Fedora).

SEC 435 Week 10 Term Paper Penetration Testing
Due Week 10 and worth 120 points

As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.
·         Non-stateful packet firewall separates the business’s internal network from its DMZ.
·         All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.
·         All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.
·         Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.
·         One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.

Write a six to eight (6-8) page paper in which you:
1.      Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan).
2.      Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM)
3.      Analyze the software tools you would use for your investigation and reasons for choosing them.
4.      Describe the legal requirements and ethical issues involved.
5.      Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing. Note: The graphically depicted solution is not included in the required page length.
6.      Propose your final recommendations and reporting.  Explain what risks exist and ways to either eliminate or reduce the risk.
7.      Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:
·         Perform vulnerability analysis as well as external and internal penetration testing.
·         Demonstrate the ability to describe and perform penetration tests on communication media to include wireless networks, VoIPs, VPNs, Bluetooth and handheld devices.
·         Use technology and information resources to research issues in penetration testing tools and techniques.
·         Write clearly and concisely about Network Penetration Testing topics using proper writing mechanics and technical style conventions. 
Click here to view the grading rubric for this assignment.

SEC 435 Week 11 Discussion
"Course Wrap-Up and Course Takeaway"  Please respond to the following:
·         Identify two (2) new insights about network penetration testing you have discovered from this course. 
·         Discuss the manner in which you can apply the learning outcomes of this course to your professional and personal life.

SEC 435 Complete Course Week 1 to Week 11
Download Answer here



 
© Copyright 2015 Work Bank Theme by Workbank