Tutorials

$8.00 x 1
CYB-525-0500: Topic 4 DQ 1: How Network-Connected Devices can be used in a Network Forensics Investigation
$8.00 x 1
CYB-525-0500: Topic 4 DQ 1: Zero-day Attack in Relation to Cybersecurity
$6.00 x 1
CYB-525-0500: Topic 3 DQ 2: Challenges in Securing Networks
$7.00 x 1
CYB-525-0500: Topic 3 DQ 1: Software Firewalls, their Advantages and Disadvantages
$8.00 x 1
CYB-525-0500: Topic 2 DQ 2: Voice over IP (VoIP)
$7.00 x 1
CYB-525-0500: Topic 2 DQ 1: Equipment Required for Network and Security Architectures
$6.00 x 1
CYB-525-0500: Topic 1 DQ 2: Compare and Contrast Type 1 and Type 2 Virtualization Architecture
$5.00 x 1
CYB-525-0500: Topic 1 DQ 1: Benefits of Virtualizing this Environment Vs using actual Hardware
$22.00 x 1
CTCH 690 9040: Unit 8 Assignment: Project 4 Part B: Grey Box Approach Hands-on Exercises
$60.00 x 1
CTCH 690 9040: Unit 7 Assignment Directions: Project 4 Part A – Planning a Grey Box Approach
$25.00 x 1
CTCH 690 9040: Unit 6 Assignment Directions: Project 3 Part B: Building an Indicator of Attack/Compromise Investigation
$20.00 x 1
CTCH 690 9040: Unit 5 Assignment Directions: Project 3 Part A: Planning an Indicator of Attack/Compromise Investigation
$45.00 x 1
CTCH 690 9040: Unit 4 Assignment: Project 2 Part B: Performing a Penetration Test
$40.00 x 1
CTCH 690 9040: Unit 3 Assignment: Project 2 Part A: Planning a Penetration Test
$25.00 x 1
CTCH 690 9040: Unit 2 Assignment: Project 1 Part B: Conducting a Security Assessment
$20.00 x 1
CTCH 690 9040: Unit 1 Assignment: Project 1 Part A: Planning a Security Assessment
$5.00 x 1
CTCH 690 9040: Unit 8 Discussion: Reflecting on Career Goals
$5.00 x 1
CTCH 690 9040: Unit 7 Discussion 1: Current Cybersecurity Trends and Techniques
$5.00 x 1
CTCH 690 9040: Unit 6 Discussion: Recommending Remedial Action
$5.00 x 1
CTCH 690 9040: Unit 5 Discussion 1: Goal Setting
$5.00 x 1
CTCH 690 9040: Unit 4 Discussion: Composing Effective Strategies for Network Security
$5.00 x 1
CTCH 690 9040: Unit 3 Discussion 1: Experiential Learning Strategy
$5.00 x 1
CTCH 690 9040: Unit 2 Discussion: Justifying Vulnerabilities
$5.00 x 1
CTCH 690 9040: Unit 1 Discussion 1: Projects and Goals
$36.00 x 1
CTCH 685 9040: Unit 8 Assignment: Software Security Lab
$30.00 x 1
CTCH 685 9040: Unit 7 Assignment: Encryption with GPG for Software Security
$170.00 x 1
CTCH 685 9040: Unit 6 Assignment: Space Layout Randomization (ASLR) in C Programs
$30.00 x 1
CTCH 685 9040: Unit 5 Assignment: Program Analysis for Software Vulnerability Discovery
$43.00 x 1
CTCH 685 9040: Unit 4 Assignment: Identify and Patch a Vulnerability
$45.00 x 1
CTCH 685 9040: Unit 3 Assignment: Penetration Testing for Software Threats