Quick view Add to Cart IT 320 IT320 Lab 1 and Configuring a Linux-Based Firewall to Allow Incoming and Outgoing Traffic $12.99
Quick view Add to Cart IT 320 IT320 Lab 2 and Patching, Securing Systems, and Configuring Antivirus $12.99
Quick view IT 320 IT320 Lab 1 and Configuring a Linux-Based Firewall to Allow Incoming and Outgoing Traffic IT 320 IT320 Lab 1 and Configuring a Linux-Based Firewall to Allow Incoming and Outgoing Traffic Lab 1 and Configuring a Linux-Based Firewall to Allow Incoming and Outgoing Traffic: Prompt: In your worksheet, use one to two sentences to... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 2 and Patching, Securing Systems, and Configuring Antivirus IT 320 IT320 Lab 2 and Patching, Securing Systems, and Configuring Antivirus Lab 2 and Patching, Securing Systems, and Configuring Antivirus: Prompt: In your worksheet, use one to two sentences to describe each of the three key tasks... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 3 Vulnerability Scanners and Penetration Testing IT 320 IT320 Lab 3 Vulnerability Scanners and Penetration Testing Lab 3: Vulnerability Scanners and Penetration Testing Prompt: In your worksheet, use one to two sentences to describe each of the three key tasks and include a screenshot that... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 4 Deep Dive Packet IT 320 IT320 Lab 4 Deep Dive Packet Prompt: In your worksheet, use one to two sentences to describe each of the three key tasks and include a screenshot that illustrates each as identified below. You MUST include a screenshot for each... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 5 Social Engineering IT 320 IT320 Lab 5 Social Engineering IT 320 Lab 5: Social Engineering: 1. Section: Launching an Attack: Successfully configure social engineering tools and include a brief description of the task and a screenshot that... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 6 Crafting and Deploying Malware IT 320 IT320 Lab 6 Crafting and Deploying Malware 1. Section: Launching an Attack: Successfully brute force a password on a vulnerable service to gain access to a PC and include a brief description and a screenshot that illustrates Step 12 in... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 7 Intrusion Detection Using Snort IT 320 IT320 Lab 7 Intrusion Detection Using Snort Lab 7: Intrusion Detection Using Snort: 1. Section: Setting up the Sniffer: Successfully capture network traffic using packet analyzer and include a brief description of the task and... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 8 Securing the pfSense Firewall IT 320 IT320 Lab 8 Securing the pfSense Firewall Lab 8: Securing the pfSense Firewall 1. Section: Testing the Firewall from the External Network: Successfully use Zenmap to scan the firewall externally and include a brief description of... $12.99 Add to Cart
Quick view IT 320 IT320 Lab 9 Closing Security Holes IT 320 IT320 Lab 9 Closing Security Holes 1. Section: Join a Domain: Successfully use Armitage to exploit the Windows Server SMB vulnerability and include a brief description of the task and a screenshot that illustrates Step 18 in this section... $12.99 Add to Cart
Quick view IT 320 IT320 Milestone One IT 320 IT320 Milestone One Network Assessment – Gathering Evidence of the Vulnerabilities Firewall: ➢ Denial of services attack(provide the denying services to the unauthorized or the legitimate user) ➢ Provides the administrator access to the... $13.99 Add to Cart
Quick view IT 320 IT320 Milestone Two IT 320 IT320 Milestone Two Preview: Network security posture recommendation: a) key aspects of the network to address the network security posture Firewall related issues: Firewall is not blocking the traffic that it is supposed to block. For... $13.99 Add to Cart