Highlights
Introduction to cyber security
After completing this week's material you will: Understand the concepts of ethical hacking. Know what you can and cannot do legally in Australia. Have an introduction to risk management. Understand the concepts of TCP/IP and IP addressing.
OVERVIEW: What's in this week...
Guest lecturer: Hear from a professional
1. Ethical hacking overview
2: What you can and can't do legally
3: Introduction to risk management
4: Overview of TCP/IP
5: IP addressing
Splunk - Workshop
Footprinting
After reading this chapter and completing the exercises, the student will be able to: Use web tools for footprinting Conduct competitive intelligence Describe DNS zone transfers
OVERVIEW: What's in this week...
1: What is footprinting
2: Competitive intelligence
3: DNS zone transfer
Social engineering and network attacks
After reading this chapter and completing the exercises, the student will be able to understand : Different aspects of Social engineering. Different network attacks. Malicious software’s and its defence mechanisms.
OVERVIEW: What's in this week...
1: Social engineering
2: Malicious software
Scanning
After working through this week's material and completing the exercises, you will be able to: Describe port scanning and types of port scans. Describe and use port-scanning tools, especially NMAP. Explain what ping sweeps are used for.
OVERVIEW: What's in this week...
1: Port scanning/TCP handshake
2: Port scans
3: Scripting
Scanning and Enumeration
At the end of this week's discussion and after completing the exercises, you will be able to: Describe the enumeration step of security testing, Enumerate Windows OS targets and Enumerate Unix/Linux OS targets.
OVERVIEW: What's in this week...
1: Enumerating Windows
2: Enumerating Unix/Linux
Vulnerabilities and IoT
This week examines how security testing is used to analyze operating system vulnerabilities and correct them. We will review how to discover and fix these vulnerabilities on Windows, as well as Linux operating systems.
OVERVIEW: What's in this week...
1: Vulnerabilities
2: Countermeasures
3: IoT - Internet of Things
This IT Assignment has been solved by our IT experts at My Uni Papers. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.