Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.
Reading:
Textbook –
Chapter 13, pp. 321–346 Quiz
Assignments:
Review Questions (RQ):
Chapter 13, pp. 347–349
Hard Drives Required for LAB.
Project Part 2
Use Internet resources to footprint fazzle.com.
Due Week 10.
Lab(s):
LAB 1: CREATING STANDARD AND EXTENDED IP ACCESS LISTS
Complete Activity 13-2, Chapter 13, pp.329 from your textbook Hands-On Ethical Hacking and
Network Defense.
Deliverables:
Submit your work in a Word document via hardcopy and email to your instructor.
LAB 2: EXAMINING AN OPEN-SOURCE HONEYPOT
Complete Activity 13-4, Chapter 13, pp.345 from your textbook Hands-On Ethical Hacking and Network Defense.
Document you activity via screenshots inserted into a Word document.
Visit http://www.securityfocus.com/infocus/1659
Answer the following questions:
1. What is a Honeypot?
2. What do the following commands do:arpd 192.168.1.0/24
honeyd -p nmap.prints -f honeyd.conf 192.168.1.0/24
Submit your work in a Word document via hardcopy and email to your instructor.
Deliverables and format: Assignment due at the end of class.
Submit your answers in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double
Submit each assignment type as a separate attachment (CA1, LABs, RQ)
Refer to General Course Information for Email and Assignment Instructions.