2.4 | Lab | Application Protocols

In this lab, you will apply what you have learned about Wireshark use as well as Application Layer standards and protocols to analyze files of captured web and email traffic. The packet capture files for analysis are provided. Download the attached instructions. When...

PowerPoint Modules 1-2

First upload: When you open it, it will show a PowerPoint with slides already made. It is your start file. Follow Project steps 1-27 on this PowerPoint. Second upload: It has all the instructions and 1-27 project steps you must follow. Upload 3,4,5,6, and 7: These are...

Portfolio Project

   Required total 8 pages. Scenario: You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on...

google 3

  You will develop a short 1300 word document. Task: Describe how OSINT can be used to supplement your organizational collection plan, identify 10 sites that can be used to research sites/domains for: legitimacy sender verification list of domains (country...

google 4

  Visit the website Google Hacking Database (https://www.exploit-db.com/google-hacking-database). You will develop a short 1300 word document. Task: Identify 15 dork strings:         1. What syntax will be necessary to gain the information?...