Download presentation
Presentation is loading. Please wait.
Published byOxley Billy Modified over 6 years ago
1
CCSI 460 Education for Service-- tutorialrank.com
2
CCSI 460 Week 1 Homework For more course tutorials visit www.tutorialrank.com Analyze the wireshark packet capture file called week1.pcap in doc sharing. view the packet and produce a short report including the following date and time of transactions protocol used to communicate with the server
3
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 1 Lab Survey of Forensic Toolkits For more course tutorials visit www.tutorialrank.com CCSI 460 Week 1 Lab Survey of Forensic Toolkits
4
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 2 Current Issues in Digital Forensics For more course tutorials visit www.tutorialrank.com CCSI 460 Week 2 Current Issues in Digital Forensics
5
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 2 Homework For more course tutorials visit www.tutorialrank.com CCSI 460 Week 2 Homework
6
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 2 MD5SUM Hash Value Image Report For more course tutorials visit www.tutorialrank.com CCSI 460 Week 2 MD5SUM Hash Value Image Report
7
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 3 Homework For more course tutorials visit www.tutorialrank.com Week 3 homework Download the picture Doc Sharing called hidden.jpg. Use md5um to get the hash value of the file and size. Download the program steghide.zip from Doc Sharing. You will use this program to hide another picture inside the hidden.jpg image (it’s a command line program so you will need some time working with it).
8
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 3 Lab Report Internet Research For more course tutorials visit www.tutorialrank.com CCSI 460 Week 3 Lab Report Internet Research
9
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 4 Homework For more course tutorials visit www.tutorialrank.com Week 4 homework Analyze the Wireshark packet capture fils called ftp.pcap in Doc Sharing.View the packets and produce a short report including the following.ftp.pcap Date and time of transactions
10
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 4 Lab Report Hard Drive Image Analysis For more course tutorials visit www.tutorialrank.com Lab Number and Title: Lab4 – Hard Drive Image Analysis Summary of Findings: The source code was exposed by means of criminal activity that Denny Vette was involved in through 1/2/02. There were many items found through the analysis of the hard drive that indicate hacking, steganographic, and cryptographic activities.
11
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 5 Homework For more course tutorials visit www.tutorialrank.com Week 5 homework Stalk yourself or a family member. Pretend that you a cyber stalker and you are going to stalk yourself. Provide a summary on the information that you found about yourself. Are there things you found that surprised you? Do you feel you have control o
12
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 5 Lab Report Bid ridding and Cyber Stalking For more course tutorials visit www.tutorialrank.com CCSI 460 Week 5 Lab Report Bid ridding and Cyber-Stalking
13
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 6 Homework For more course tutorials visit www.tutorialrank.com Week 6 homework Mobile Phone Photo Analysis Your client has been accused of a crime. You have take the client’s phone and acquired the image called client.jpg. The hash for the files is: 059B138917504F80599E556F3017B246.
14
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 7 Course Project Forensic System Image Investigation For more course tutorials visit www.tutorialrank.com CCSI 460 Week 7 Course Project Forensic System Image Investigation
15
CCSI 460 Education for Service-- tutorialrank.com CCSI 460 Week 7 Homework Honeypot Research For more course tutorials visit www.tutorialrank.com Research two different honeypots that are available to use free or open source. List the sites and honeypots that you selected. Discuss the benefits of utilizing a virtual machine for the implementation of the honeypots that you selected (one paragraph).
16
CCSI 460 Education for Service-- tutorialrank.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.