5-3 Lab: Writing Custom Rules: Network Security Fundamentals

 

Log in to InfoSec to complete the labs below and take screenshots at the steps below:

  1. The Hacker Enters The Network – Step 36 – Telnet Alerts from Alert.ids File
  2. Writing Custom Rules – Step 5 – Third Custom Rule Change
  3. The Hacker Triggers Alerts – Step 13 – Hash Dump
  4. The Hacker Triggers Alerts – Step 17 – Output From alert.ids Showing fgdump Alert

To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!