2 Lab: Use pftop to Analyze Network Traffic

 2-3 Lab: Use pftop to Analyze Network Traffic Students will use pftop, a network-traffic monitoring and statistics plugin in pfSense, to analyze and monitor network traffic. They will walk through the steps of performing a detailed investigation to determine what type of traffic is occurring across the exercise network. Finally, with the use of visualization […]


  Securing IoT Devices: What are the Challenges? Security practitioners suggest that key IoT security steps include: Make people aware that there is a threat to security; Design a technical solution to reduce security vulnerabilities; Align the legal and regulatory frameworks; and Develop a workforce with the skills to handle IoT security. Assignment – Project […]

Research project (Report) Information Security

 Task In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects: Overview of the technology involved Relevant technologies and applications of those technologies Highlighting the challenges/problems in your chosen research area Identification of any gaps in […]

Assignment : PKI and Encryption at Work

Assignment 1: Assignment Requirements In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry. QMC is expanding its arena of work through an increase in the number of clients and products. The senior management […]

Case study for the below questions in 3 to 4 pages

1.What are the preconditions for conducting constructive dialogue in an organization? 2. Is effective risk management possible without constructive dialogue? 3.What are the forces that tend to undermine effective risk management in an organization? 4.Given its obvious value in helping an organization to understand the major risks that Could prevent it from accomplishing its mission […]

Operations security

 In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

PCI compliance

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.  Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should […]

powerpoint presentation help

  Instructions Choose two countries (excluding the United States), and prepare a presentation that explains their basic Internet infrastructure. Discuss the origins and key technologies behind the Internet for your chosen countries. Include their public and commercial infrastructures and their backbone connectivity to the Internet. Create a graphic illustrating a common or best practices Internet […]


1.      Identify and describe the file-sharing protocols supported by Windows Server 2012/R2 File and Storage Services role. (In other words, tell me what the protocol means and does)   2.      You’re the administrator of a file server. A user, Anthony, who is on vacation has created a file that Matt (another user) needs access to, […]