Discipline: Computer Science

What are the key features and specifications of the Seasonic 1000-Watts ATX12V/ EPS12V 80 Plus Titanium Power Supply?What are the key features and specifications of the Seasonic 1000-Watts ATX12V/ EPS12V 80 Plus Titanium Power Supply?

Sure, here is a summary of the key features and specifications of the Seasonic 1000-Watts ATX12V/ EPS12V 80 Plus Titanium Power Supply.   Key Features: 80 PLUS Titanium certified for up to 94% efficiency Micro Tolerance Load Regulation for stable voltage output Full modular design for easy cable management Hybrid fan control for quiet operation […]

project backgroundproject background

  Tasks to complete Goal: This project will be used to integrate concepts developed from all the assignments in the second half of this class, specifically. You will identify a data driven business problem that requires preparation of the data. This preparation involves Extracting data (from 3 or more sources), Transforming (or cleaning) the data […]

Paper reviewPaper review

  Problem statement: what kind of problem is presented by the authors and why this problem is important? Approach & Design: briefly describe the approach designed by the authors Strengths and Weaknesses: list the strengths and weaknesses, in your opinion Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of […]

8-4 Draft of Training Manual Section Six: Auditing and Log Collection8-4 Draft of Training Manual Section Six: Auditing and Log Collection

Overview The final installment of your training manual will focus on auditing and log collection. An audit should use a variety of tools and utilities, not just a single packet scanner. Tools can include utilities and power tools, both open source and commercial. Continue the development of your training manual with an overview of the […]

8-3 Lab: IPS, SYSLOG, and NTP: Pen-Testing and Understanding Vulnerabilities8-3 Lab: IPS, SYSLOG, and NTP: Pen-Testing and Understanding Vulnerabilities

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Disabling Default Ruleset – Step 4 – Output Enabling IPS – Step 9 – Configuration Verification Configuring the Syslog Server – Step 13 – Verify Log Creation Synchronized Logging – Step 9 – Verify Time Source To complete […]

8-2 Lab: Log Analysis of Linux Systems with GREP and GAWK: Linux Based Security+8-2 Lab: Log Analysis of Linux Systems with GREP and GAWK: Linux Based Security+

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Nmap Analysis Using Grep – Parsing Nmap Reports With CLI – Step 10 – grep with Open ports NMAP ANALYSIS USING GREP – Parsing Nmap Reports With Scripts – Step 7- Parsing Report Log Analysis Using Grep – Step […]