Introduction to Cyber Security - IT Assignment Help

Download Solution Order New Solution
Assignment Task

 

Introduction to cyber security
After completing this week's material you will: Understand the concepts of ethical hacking. Know what you can and cannot do legally in Australia. Have an introduction to risk management. Understand the concepts of TCP/IP and IP addressing.

OVERVIEW: What's in this week...
Guest lecturer: Hear from a professional
1. Ethical hacking overview
2: What you can and can't do legally
3: Introduction to risk management
4: Overview of TCP/IP
5: IP addressing
Splunk - Workshop

Footprinting
After reading this chapter and completing the exercises, the student will be able to: Use web tools for footprinting Conduct competitive intelligence Describe DNS zone transfers

OVERVIEW: What's in this week...
1: What is footprinting
2: Competitive intelligence
3: DNS zone transfer

Social engineering and network attacks
After reading this chapter and completing the exercises, the student will be able to understand : Different aspects of Social engineering. Different network attacks. Malicious software’s and its defence mechanisms.

OVERVIEW: What's in this week...
1: Social engineering
2: Malicious software

Scanning
After working through this week's material and completing the exercises, you will be able to: Describe port scanning and types of port scans. Describe and use port-scanning tools, especially NMAP. Explain what ping sweeps are used for.

OVERVIEW: What's in this week...
1: Port scanning/TCP handshake
2: Port scans
3: Scripting

Scanning and Enumeration
At the end of this week's discussion and after completing the exercises, you will be able to: Describe the enumeration step of security testing, Enumerate Windows OS targets and Enumerate Unix/Linux OS targets.

OVERVIEW: What's in this week...
1: Enumerating Windows
2: Enumerating Unix/Linux

Vulnerabilities and IoT
This week examines how security testing is used to analyze operating system vulnerabilities and correct them. We will review how to discover and fix these vulnerabilities on Windows, as well as Linux operating systems.

OVERVIEW: What's in this week...
1: Vulnerabilities
2: Countermeasures
3: IoT - Internet of Things

 

This IT Assignment has been solved by our IT experts at My Uni Papers. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.