Discipline: Computer Science

intrusion detectionintrusion detection

  Briefly Explain IPS/IDS/Nmap/Reconnaissance/Foot Printing Wireshark Basics, Bash Scripting, Firewalls Operations & SIEM, SOC-as-a-Service, and Snort IPS Please answer the Above questions in the below format Formatting Requirements: Standard font (e.g., Arial, Times Roman, Calibri, Tahoma, etc.) 12-pt font size Double-spaced No cover page – use a simple heading at the top of the first […]

Information TechnologyInformation Technology

 Read Chapter 4 of the class textbook in its entirety and write a 2,000-words paper with emphasis on risk management Chapter 4. Explain why policies, attacks, threats, and vulnerabilities are relevant to cybersecurity. Please be sure to include information on other chapters that you discover during your readings for this class. Lastly, write a 500-words summary of Chapters 1-4. Book  […]

Movie & NotesMovie & Notes

 Movie Title: Invictus  take notes on points in the movie that show:  What important problem did Mandela face, and who was impacted by it? What might have been the causes of that problem? What did he try in order to solve it or mitigate it (make it better) What was the ultimate solution he came […]

lab 1 google dorkinglab 1 google dorking

 Lab 01 (Google Hack)Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find  security holes in the configuration and computer code that websites use.Google hacking involves using advanced operators/keywords in the Google search engine to locate/filter out desired results from the Google database.Google Hacking Database (GHDB) – collections of google dorks that we can use to gather/get interesting information from […]