Discipline: Computer Science

Computer Science Week 8 Assignment Home Office Renovation – Project Proposal: WBS and Project Schedule (Use my Week 5 assignment)Computer Science Week 8 Assignment Home Office Renovation – Project Proposal: WBS and Project Schedule (Use my Week 5 assignment)

Overview In the assignment due in Week 5, you defined key portions of your Home Office Renovation project. Now, it is time to develop a work breakdown structure (WBS) and project schedule for your project. Note: Please use your project from the Week 5 assignment to complete this assignment. For this assignment, you will create […]

A Systematic Review of the Role of Distributed Computing in Enhancing Adolescent Online Safety: Current Trends and Future DirectionsA Systematic Review of the Role of Distributed Computing in Enhancing Adolescent Online Safety: Current Trends and Future Directions

   A Systematic Review of the Role of Distributed Computing in Enhancing Adolescent Online Safety: Current Trends and Future Directions Instructions: Your research paper should have sections that we usually see in IEEE/ACM papers. Here are some examples: abstract, introduction, background, methods, results, conclusions, and references. Your paper should be written in English with a […]

What are the key features and specifications of the Seasonic 1000-Watts ATX12V/ EPS12V 80 Plus Titanium Power Supply?What are the key features and specifications of the Seasonic 1000-Watts ATX12V/ EPS12V 80 Plus Titanium Power Supply?

Sure, here is a summary of the key features and specifications of the Seasonic 1000-Watts ATX12V/ EPS12V 80 Plus Titanium Power Supply.   Key Features: 80 PLUS Titanium certified for up to 94% efficiency Micro Tolerance Load Regulation for stable voltage output Full modular design for easy cable management Hybrid fan control for quiet operation […]

8-2 Lab: Log Analysis of Linux Systems with GREP and GAWK: Linux Based Security+8-2 Lab: Log Analysis of Linux Systems with GREP and GAWK: Linux Based Security+

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Nmap Analysis Using Grep – Parsing Nmap Reports With CLI – Step 10 – grep with Open ports NMAP ANALYSIS USING GREP – Parsing Nmap Reports With Scripts – Step 7- Parsing Report Log Analysis Using Grep – Step […]

7-2 Lab: Signature Detection and Alerting an Admin: Pen-Testing and Understanding Vulnerabilities7-2 Lab: Signature Detection and Alerting an Admin: Pen-Testing and Understanding Vulnerabilities

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Verifying It Works – Step 8 – Alert Log Output Alerting an Admin – Step 8 – Alert E-Mail Alerting an Admin – Step 11 – Alert Log Output To complete this assignment, review the prompt and grading rubric in […]

6-3 Lab: Perform Reconnaissance from the WAN: Ethical Hacking and System Defense6-3 Lab: Perform Reconnaissance from the WAN: Ethical Hacking and System Defense

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Banner Grabbing – Step 19 – Challenge #2 Complete Banner Grabbing – Step 20 – Challenge #3 Complete Advanced Scanning With Nmap – Step 9 NMAP Output Advanced Scanning With Nmap – Step 23 NMAP Output Analysis And Exploitation […]

Computer Science Week 5 Assignment – Project Proposal: Initiating and Planning for Home Office Renovation No PLAGARISMComputer Science Week 5 Assignment – Project Proposal: Initiating and Planning for Home Office Renovation No PLAGARISM

 Overview This is the first of three assignments that, as a whole, will cover all aspects of the project life cycle relevant to your selected project. You will select your project to use throughout the remaining assessments allowing you to build on your project plan from beginning to end. Scenario You have been selected to […]

Computer Science 5-2 Lab: Intrusion Detection Using Snort: Network Security Fundamentals AssignmentComputer Science 5-2 Lab: Intrusion Detection Using Snort: Network Security Fundamentals Assignment

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Setting Up The Sniffer – Step 27 – Wireshark Showing TCPDump Capture Detecting Unwanted Incoming Attacks – Step 14 – Output from Alert.IDS Detecting Unwanted Outgoing Traffic – Step 32 – Wireshark TCP Stream of Traffic Between Victim and […]

Computer Science 4-3 Lab: Securing the pfSense Firewall: Information Security Fundamentals AssignmentComputer Science 4-3 Lab: Securing the pfSense Firewall: Information Security Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Testing The Firewall From The External Network – Step 6 – Output from Zenmap Closing Unnecessary Ports On The Pfsense Firewall – Step 6 – Challenge #3 Complete Closing Unnecessary Ports On The Pfsense Firewall – Step 8 – Challenge […]

Computer Science 4-2 Lab: Configuring a Linux-Based Firewall to Allow Ingoing and Outgoing Traffic: Information Security Fundamentals AssignmentComputer Science 4-2 Lab: Configuring a Linux-Based Firewall to Allow Ingoing and Outgoing Traffic: Information Security Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Configuring and Testing the Linux-Based Firewall – Step 22 – Checking Outbound FTP Configuring and Testing the Linux-Based Firewall – Step 33 – Display of Current Rules Configuring and Testing the Linux-Based Firewall – Step 34 – Results of NMAP […]