Wednesday, February 18, 2009

UNIT 10 – Protecting Networks with Security Devices

Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.

Reading:
Textbook –
Chapter 13, pp. 321–346 Quiz

Assignments:
Review Questions (RQ):
Chapter 13, pp. 347–349

Hard Drives Required for LAB.

Project Part 2
Use Internet resources to footprint fazzle.com.
Due Week 10.

Lab(s):
LAB 1:
CREATING STANDARD AND EXTENDED IP ACCESS LISTS
Complete Activity 13-2, Chapter 13, pp.329 from your textbook Hands-On Ethical Hacking and
Network Defense.

Deliverables:
Submit your work in a Word document via hardcopy and email to your instructor.

LAB 2: EXAMINING AN OPEN-SOURCE HONEYPOT
Complete Activity 13-4, Chapter 13, pp.345 from your textbook Hands-On Ethical Hacking and Network Defense.

Document you activity via screenshots inserted into a Word document.
Visit http://www.securityfocus.com/infocus/1659
Answer the following questions:
1. What is a Honeypot?
2. What do the following commands do:arpd 192.168.1.0/24
honeyd -p nmap.prints -f honeyd.conf 192.168.1.0/24

Submit your work in a Word document via hardcopy and email to your instructor.

Deliverables and format: Assignment due at the end of class.
Submit your answers in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double

Submit each assignment type as a separate attachment (CA1, LABs, RQ)


Refer to General Course Information for Email and Assignment Instructions.