Category: Cyber Security
-
CYBR 520 Security Awareness Draft
Initial Plan Re-read the Security Awareness Campaign overview in the Term Projects project. Requirements Develop an initial draft of your security awareness campaign that includes: Theme Selection and Justification (15 points) Choose a security awareness theme/event from the provided security awareness calendar Explain why you selected this particular theme for your target organization Discuss its…
-
CYBR 520 Phishing Campaign Draft
Requirements Develop the actual materials you’ll use in your phishing campaign: Phishing Communication(s) (25 points) The actual phishing message(s) you’ll send (email, text, etc.) Include all elements (subject lines, sender information, body text, links, etc.) Clearly indicate the “tells” that a savvy recipient might notice Educational Follow-up (25 points) The message recipients will see if…
-
ITCC121: Intro to Computer Science
For this assignment, you will research a well-known cybersecurity attack. Your task is to create a presentation (WITH SPEAKER NOTES) that explains the following: What happened during the attack? The impact of the attack on individuals, organizations, or society. How similar attacks can be prevented in the future? Choose a cybersecurity attack: Select a notable…
-
Digital Forensics
Focous on these please Learning Outcomes : Explain techniques and procedures for incident detection, containment and isolation, and analysis and attribution. : Demonstrate the collection, analysis and correlation of cyber-threat intelligence for detecting and remediation of future attacks. : Investigate simulated high-tech crimes using an appropriate selection of commonly used digital Requirements: Attached
-
Attack & Defense in Cyberspace
Simple assignment, just needs some screenshots making sure everything is working great. Requirements: Attached
-
Attack & Defense in Cyberspace
This assignment is about building a secure network for a company with three offices (New York, Abu Dhabi, and London). You must create the network in Packet Tracer, configure static routing, and then set up Site-to-Site IPsec VPN tunnels between all offices. After that, you must test and verify that the VPN works and that…
-
Cyber Security Question
Assignment due Friday, February 20, 2026 by 11:59pm Assignment 1: Cyber ThreatRiskAttack Landscape Survey Weight: 20% Assessment Type: Survey Format: Individual Assignment Description: In this assignment, you are required to research and analyze and conduct in-depth survey of the current cyber threatriskattack landscape, exploring the evolving nature of cybersecurity challenges faced by organizations today. You…
-
Configuring and Verifying Site-to-Site IPsec VPNs
Objective: The main objective of this assignment is to make efficient use of VPNs as means of secure connections between different locations of an international company. The student will build the company network and then configure Site-to-Site IPsec VPNs between multiple office locations of a fictitious company called Future Tech Enterprises, verify the VPN tunnels,…
-
Professional memo (PowerPoint slide)
To complete this assignment, you will need the attached files and the the documentation (click link to download) from the Payment Card Industry Data Security Standards (PCI DSS) organization. Please read the instructions carefully and ask questions if anything is unclear. You must use the attached template to complete this assignment. The PowerPoint presentation (PDF)…
-
Kali Linux Lab Report -EASY
Lab Exercise: Reconnaissance and Fingerprinting with Kali Linux Objective You will use Kali Linux to perform passive and active reconnaissance and fingerprinting on a designated domain, leveraging various tools to gather information ethically and safely. Lab Scenario You are a penetration tester tasked with gathering information about a target domain. The domain for this lab…
