Ashley, Explain what interested you the most about the readings and videos from this week. What interested me most was the genuine care and concern those in the videos had about career planning. I enjoyed reading the specs on my career interest and was pleasantly surprised at the amount of skills I could check off. […]
Students are required to submit one screen shot from the each lab exercise. This will demonstrate thatthe student has actually performed the lab work and hasn’t just clicked Done until the lab completes. The screenshot should include output from the tool that is used in the exercise. The Student will need to do this for […]
Attached,please find the Evading IDS Firewalls and Honeypots assignment Students are required to submit one screen shot from the each lab exercise. This will demonstrate that the student has actually performed the lab work and hasn’t just clicked Done until the lab completes. The screenshot should include output from the tool that is used in […]
reply to discussion post below: Colin, There are numerous types of malware out there that are meant to attack both our mobile devices as well computers/laptop systems. With each piece of malware there have been countermeasures created to defend against them. One of the most common forms of malware that a user sees more frequently […]
Reply to discussion post below: Antonio, The Cybersecurity and Infrastructure Security Agency (CISA), part of the Department of Homeland Security (DHS), acts as the cybersecurity and infrastructure security knowledge base for federal agencies and their network systems. They have published a list of various tools and measures for preventing malware attacks. Installing an antivirus software […]
I need to write a thesis, introduction and methodology. This will be a rough draft. I need to defend my thesis for vernal pools research, including an introduction and methodology. So please make sure you write those 3 things. I attached the document that was used as reference and help, I followed that for my […]
Reply to Thread : Brenda, Critical infrastructure and key resources are the make up of every country. To be more specific, they are the essential elements of comfortable survival. These elements include water treatment facilities, transportation, electricity facilities, water dams, and agriculture. All of these elements are greatly significant for everyone’s lives and for our […]
As with week one, the topic for the week 2 discussions comes directly from the weekly readings, which are found in the Course at a Glance, as well as the readings in the modules. You will be reading about various topics related to CIKR: the Patriot Act, the DHS strategic plan, the executive order regarding […]
Week six Assignment # 1 Review the Week 6 Correlations Exercises SPSS Output provided in this week’s Learning Resources. Review the Learning Resources on how to interpret correlation results to determine the relationship between variables. Consider the results presented in the SPSS output and reflect on how you might interpret the results presented Answer the […]
Hacking Mobile-iLab Screen Shot Example.pdf (1.09 MB) Cloud Computing-iLab Screen Shot Example.pdf (1.09 MB) Cryptography-iLab Screen Shot Example.pdf (1.09 MB) Executive Proposal-321 Executive Proposal_2018.docx (97.3 KB) Hacking Web Applications CMIT 321 Executive Proposal Project The purpose of this project is to evaluate the student’s ability to research and evaluate security testing software and present a […]