UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
SEC 420 Entire Course NEW
1. STRAYER SEC 420 Week 1 Discussion Ethical
Hacking NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-1-discussion-ethical-
hacking-recent
For more classes visit
http://www.uopassignments.com/
"Ethical Hacking" Select one of the following and
discuss in no less than three paragraphs, and have
at least one response to another student of at least
one paragraph:
• Suppose a coworker approaches you and asks
what an ethical hacker does. She does not
understand the role that an ethical hacker plays in
the security industry and assumes that such a
hacker intentionally causes damage. Explain to
your hypothetical coworker what an ethical
hacker is and the fundamental manner in which
2. such a hacker differs from a black hat hacker.
Justify your response with an example of each type
of hacker, and indicate the role each hacker plays
in your given example.
• Explain the main differences between white hat
and grey hat hackers. Provide a brief example of a
grey hat hacker. Describe the role that you believe
grey hat hackers play in the security industry, and
indicate whether or not you believe grey hat
hacking is equivalent to ethical hacking. Provide a
rationale for your response.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
3. STRAYER SEC 420 Week 2 Discussion Scanning For
Exploits NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-2-discussion-scanning-
for-exploits-recent
For more classes visit
http://www.uopassignments.com/
"Scanning for Exploits" Select one of the following
and discuss in no less than three paragraphs, and
have at least one response to another student of at
least one paragraph:
• Suppose you work as a security analyst and
during a weekly meeting your supervisor asks for
your opinion about the ways in which the
department could best identify vulnerabilities that
a hacker could potentially exploit on a network.
4. Analyze the potential security concerns, and
identify what you believe to be the greatest
concerns in terms of vulnerabilities. Describe the
method(s) you would use to identify the related
exploit(s). Explain your desired method(s) to
perform this vulnerability analysis.
• Suggest the tool(s) that you would use to perform
all or a portion of the analysis mentioned in Part 1
of this discussion. Justify the manner in which such
tools could assist with these efforts.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
5. STRAYER SEC 420 Week 2 Lab Assignment 1
Footprinting And Reconnaissance NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-2-lab-assignment-1-
footprinting-and-reconnaissance-recent
For more classes visit
http://www.uopassignments.com/
Lab 1 (Exercise I): “Collecting Information on
Target Website Using Firebug.”
Lab Assignment 1
Due Week 2 and worth 38 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
Hacking and Countermeasures: Attack Phases
(2nd ed.). Cengage Learning.
6. STRAYER SEC 420 Week 3 Discussion Viruses And
Antivirus Utilities NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-3-discussion-viruses-
and-antivirus-utilities-recent
For more classes visit
http://www.uopassignments.com/
"Viruses and Antivirus Utilities" Select one of the
following and discuss in no less than three
paragraphs, and have at least one response to
another student of at least one paragraph:
• Go to the web, research new worms or viruses.
Analyze the primary manner in which one
particular virus or worm was successful.
Summarize the one way in which the virus or
worm avoided defense mechanisms. Suggest at
7. least two ways in which the infected parties could
have protected themselves from the threat.
• Identify the antivirus software that you currently
use or would prefer to use in order to protect your
organization or personal system(s). Indicate the
key features that this application utilizes to assist
in preventing infection from viruses and worms.
Provide a rationale for your chosen antivirus
software.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
8. STRAYER SEC 420 Week 3 Lab Assignment 2
Scanning Networks NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-3-lab-assignment-2-
scanning-networks-recent
For more classes visit
http://www.uopassignments.com/
Lab 1 (Exercise IV): “Understanding Network
Scanning Using Nmap”
Lab Assignment 2
Due Week 3 and worth 59 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
10. STRAYER SEC 420 Week 4 Discussion What If NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-4-discussion-what-if-
recent
For more classes visit
http://www.uopassignments.com/
"What If?" Select one of the following and discuss
in no less than three paragraphs, and have at least
one response to another student of at least one
paragraph:
• Review the “What if” case in Chapter 4 from the
Book: Attack Phases. Discuss the ethical concerns
of Doug’s actions. What might the ramifications or
consequences of his actions be? Why?
• If you were Doug in the case above, what would
you do to practice the new skills, and why?
11. • Any current topic or article related to
penetration techniques.
• The instructor insight.
12. STRAYER SEC 420 Week 4 Lab Assignment 3
Enumeration NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-4-lab-assignment-3-
enumeration-recent
For more classes visit
http://www.uopassignments.com/
Lab 2 (Exercise V): "Performing Network
Enumeration Using NetBIOS Enumerator.”
Lab 3 (Exercise VI): “Enumerating a Network Using
SoftPerfect Network Scanner.”
Lab Assignment 3
Due Week 4 and worth 59 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
Hacking and Countermeasures: Attack Phases
(2nd ed.). Cengage Learning.
13. STRAYER SEC 420 Week 5 Discussion What If NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-5-discussion-what-if-
recent
For more classes visit
http://www.uopassignments.com/
"What If?" Select one of the following and discuss
in no less than three paragraphs, and have at least
one response to another student of at least one
paragraph:
• Review the “What if” case in Chapter 5 from
Attack Phases. Discuss the ethical and legal
concerns of Brian’s actions. What might the
ramifications or consequences of his actions be?
Why?
• Discuss the ethics of revenge and its relationship
to ethical hacking. Is revenge ever justified in
situations where one may have issues with bosses
and/or co-workers? Explain your rationale.
14. • Any current topic or article related to
penetration techniques.
• The instructor insight.
15. STRAYER SEC 420 Week 5 Lab Assignment 4
System Hacking NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-5-lab-assignment-4-
system-hacking-recent
For more classes visit
http://www.uopassignments.com/
Lab 5 (Exercise V): “Dumping and Cracking SAM
Hashes to Extract Plaintext Passwords.”
Lab 6 (Exercise III): “Auditing System Passwords
Using L0phtCrack.”
Lab 7 (Exercise XV): “Viewing, Enabling, and
Clearing the Auditing Policy Using Auditpol.”
Lab Assignment 4
16. Due Week 5 and worth 59 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
Hacking and Countermeasures: Attack Phases
(2nd ed.). Cengage Learning.
17. STRAYER SEC 420 Week 6 Discussion Internet
Security NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-6-discussion-internet-
security-recent
For more classes visit
http://www.uopassignments.com/
"Internet Security" Select one of the following and
discuss in no less than three paragraphs, and have
at least one response to another student of at least
one paragraph:
• Review the source below. Pay particular
attention to the viruses and worms mentioned and
the details surrounding its attack. Provide a brief
summary, and discuss your thoughts on the
severity of the threat, and how you would have
dealt with the problem.
o Original Source: Rowen, Beth. (2015) Cyberwar
Timeline: The roots of this increasingly menacing
challenge facing nations and businesses. Retrieved
19. STRAYER SEC 420 Week 6 Lab Assignment 5
Malware Threats NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-6-lab-assignment-5-
malware-threats-recent
For more classes visit
http://www.uopassignments.com/
Lab Assignment 5
Due Week 6 and worth 59 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
20. Hacking and Countermeasures: Threats and
Defense Mechanisms (2nd ed.).
Lab 1 (Exercise I): “Creating HTTP Trojan.”
Lab 2 (Exercise IV): “Creating a Trojan Server
Using ProRat Tool.”
Lab 3 (Exercise I): “Creating a Virus Using the JPS
Virus Maker Tool.”
21. STRAYER SEC 420 Week 7 Discussion System
Upgrade NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-7-discussion-system-
upgrade-recent
For more classes visit
http://www.uopassignments.com/
"System Upgrade" Select one of the following and
discuss in no less than three paragraphs, and have
at least one response to another student of at least
one paragraph:
• Imagine a scenario where Jane, an administrative
employee of a company, receives a call from James,
the company’s security administrator. He
announces that he is calling everyone to inform
them about this coming weekend’s upgrade to the
accounting system. James adds that he does not
22. need anyone’s password to the system, which Jane
believes is a secure option. Instead, James will
provide a batch file to complete the update. As an
outsider looking into this scenario, explain the
social engineering concerns that Jane should
consider. Include the major signs that would
indicate James’s request is either a valid one or
one that represents a potential attack on Jane’s
system.
• Suggest one strategy that a security department
could use in order to raise awareness of social
engineering concerns in an organization. Describe
an original scenario similar to the one in the first
portion of this question that brings to light a social
engineering attack or concern and the manner in
which the user(s) should react to such an attack.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
23. STRAYER SEC 420 Week 7 Lab Assignment 6
Sniffing NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-7-lab-assignment-6-
sniffing-recent
For more classes visit
http://www.uopassignments.com/
Lab Assignment 6
Due Week 7 and worth 38 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
24. Hacking and Countermeasures: Threats and
Defense Mechanisms (2nd ed.).
Lab 2 (Exercise II): “Spoofing MAC Address Using
SMAC.”
25. STRAYER SEC 420 Week 8 Discussion Phishing
NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-8-discussion-phishing-
recent
For more classes visit
http://www.uopassignments.com/
"Phishing" Select one of the following and discuss
in no less than three paragraphs, and have at least
one response to another student of at least one
paragraph:
• Research phishing schemes on the web. Find a
recent scheme and summarize and discuss why it
may have been successful. What are the red flags
that one should look out for to avoid becoming a
victim, and what should one do if one encounters
such schemes?
26. • As a security manager what actions might you
take to assure your company does not fall victim to
phishing? Include any training or
simulation/white hat hacking you might consider.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
27. STRAYER SEC 420 Week 8 Lab Assignment 7 Social
Engineering NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-8-lab-assignment-7-
social-engineering-recent
For more classes visit
http://www.uopassignments.com/
Lab Assignment 7
Due Week 8 and worth 59 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially
derived from the following course required
textbook: EC-Council Press. (2017). Ethical
Hacking and Countermeasures: Threats and
Defense Mechanisms (2nd ed.).
28. Lab 1 (Exercise I): "Sniffing Website Credentials
using Social Engineering Toolkit (SET)”
29. STRAYER SEC 420 Week 9 Discussion What If NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-9-discussion-what-if-
recent
For more classes visit
http://www.uopassignments.com/
"What If?" Select one of the following and discuss
in no less than three paragraphs, and have at least
one response to another student of at least one
paragraph:
• Consider the “what if” case in Chapter 6 of
Threats and Defense Mechanisms. Why was the
Distributed Denial of Service (DDOS) attack
successful? What could have been done to protect
one’s company from the attack?
30. • Discuss any DDOS countermeasure, and why you
would employ it.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
31. STRAYER SEC 420 Week 9 Web Application Attack
Scenario NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-9-web-application-
attack-scenario-recent
For more classes visit
http://www.uopassignments.com/
Assignment: Web Application Attack Scenario
Due Week 9 and worth 220 points
Suppose that you are currently employed as an
Information Security Manager for a medium-sized
software development and outsourcing services
company. The Software Development Director has
asked you to provide a detailed analytical report
for her department regarding the most common
web application threats and the manner in which
32. their products could compromise customer
financial data.
She wants your recommendations on which
threats and/or vulnerabilities the company should
focus on and your recommendation for
mitigation. The products in question use Microsoft
SQL Server databases and IIS Web servers.
Write a paper with no less than four pages in
which you:
1. Analyze the common threats/vulnerabilities to
data systems such as web applications and data
servers. Speculate on the greatest area of
vulnerability and potential for damage and/or
data loss of such data systems.
2. Devise at least one attack scenario, as an
example, where a hacker could use the area of
vulnerability that you chose above in order to gain
access to a network or sensitive data. Examine the
primary ways in which the hacker could execute
such an attack, and suggest the strategic manner in
which a security professional could prevent the
33. attack.
3. Explore the primary role that the human
element could play in adding to the attack
scenario, if appropriate. You may wish to decide if
the human component is critical in protection
from that type of attack.
4. Draw specific lessons and recommendations as
part of the conclusion, and have a strong
concluding paragraph. Be sure to revise your
introduction to reflect what the paper
accomplished once you finish your first draft.
5. Use no less than five quality resources in this
assignment. Note: Wikipedia and similar websites
do not qualify as quality resources.
Your assignment must follow these formatting
requirements:
• Be typed, double-spaced, using Times New
Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or
school-specific format. Check with your professor
34. for any additional instructions.
• Include a cover page containing the title of the
assignment, your name, the professor’s name, the
course title, and the date. The cover page and the
reference page are not included in the required
assignment page length.
Grading for this assignment will be based on
answer quality, logic / organization of the paper,
and language and writing skills, using the
following rubric.
Click here to view the grading rubric for this case
study.
35. STRAYER SEC 420 Week 10 Discussion Buffer
Overflow NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-10-discussion-buffer-
overflow-recent
For more classes visit
http://www.uopassignments.com/
"Buffer Overflow" Select one of the following and
discuss in no less than three paragraphs, and have
at least one response to another student of at least
one paragraph:
• Explain one of the challenges that a hacker faces
when attempting to cause a segmentation fault by
overflowing a buffer. Further, discuss the main
ways in which an attacker can avoid detection of
No Operations (NOPs) by an intrusion detection
system, and examine the primary reasons why
avoiding such detection is beneficial for executing
36. the attack.
• Any current topic or article related to
penetration techniques.
• The instructor insight.
37. STRAYER SEC 420 Week 11 Security In The Future
NEW
Check this A+ tutorial guideline at
http://www.uopassignments.com/sec-420-
strayer/sec-420-week-11-security-in-the-
future-recent
For more classes visit
http://www.uopassignments.com/
"Security in the Future" Discuss in no less than
three paragraphs, and have at least one response
to another student of at least one paragraph:
• Based on what you've learned in this course, give
your opinion on the current state of the security
industry. Take a position on whether you believe
that hackers or security personnel have the
greater advantage in the real world. Provide a
rationale for your response.