Homework week 5
You can do the exercises online or download the worksheet as pdf.
- Google Classroom
- Microsoft Teams
- Download PDF
Search code, repositories, users, issues, pull requests...
We read every piece of feedback, and take your input very seriously.
Use saved searches to filter your results more quickly.
To see all available qualifiers, see our documentation .
Assignments for cybersecurity class
Name already in use.
Use Git or checkout with SVN using the web URL.
Work fast with our official CLI. Learn more about the CLI .
- Open with GitHub Desktop
- Download ZIP
Sign In Required
Please sign in to use Codespaces.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
If nothing happens, download Xcode and try again.
Launching Visual Studio Code
Your codespace will open once ready.
There was a problem preparing your codespace, please try again.
- 176 commits
Scott Hansen's Cybersecurity Portfolio.
I have engaged in some learning and labs in my own time. Some of these things was creating my own SEIM (security onion), and creating internal networks. I have also worked on vulnhub machines, and hackthebox, ctflearn, and try hackme. A discription of some of these projects can be found on this GitHub.
Cyber Security Bootcamp Homework
Welcome to my portfolio. In here you will find the many projects I worked on during my Cybersecurity Boot Camp put on by the University of Minnesota. This readme will give a brief description of the homework, and what was to be learned, as well as a link to that weeks Readme file, which acts as the submission file for the homework.
Please understand that at the beginning of this class I had no experience with Github, so things may not be as professional as one would hope. Also as I'm still in this class, the list below will continue to expand as I complete additional work.
Below is the list of topic we covered each week.
Week 1 Security 101
Week 2 Governance, Risk, and Compliance
Week 3 Terminal and Bash
Week 4 linux sysadmin fundamentals, week 5 archiving and logging data, week 6 bash scripting and programing, week 7 windows administration and hardening, week 8 networking fundamentals, week 9 networking fundamentals ii and ctf, week 10 cryptography, week 11 network security, week 12 cloud security and virtualization.
Project: Elk Stack
Week 14 Web Development
Week 15 web vulnerabilities and hardening, week 16 penetration testing, week 17 penetration testing 2, week 18 seim 1, week 19 seim 2.
Project Red Vs Blue
Week 21 Forensics
Synopsis of each week as well as homework..
During Week 1 we focused on some definitions such as the CIA triad, cybersecurity. We also looked at possible careers in the cybersecurity field and what certificates they require. There was also some setup of our virtual machines during this week.
For the homework we read 4 Internet security threat reports, and answered some questions on them.
Week 1 Submission File
Week 2 Governance Risk and Compliance
During this week we focused on the Risk and Compliance side of the cybersecurity. What can and can't be done, what rule must be followed. We also covered some regulations such as HIPPA and PCI. We also covered a companies management structure, and what each area deals with when it comes to cybersecurity.
For this weeks homework we wrote up a a brief assessment of a fake companies security culture, and what training could happen to change it, as well as who would need to be involved.
Week 2 Submission File
During this week we worked on the fundamentals of Linux. This including how to navigate the command line. Some of these basic commands are: ls, cd, mkdir, touch, grep, awk, head and tail. We also learned how to use nano to edit files.
For this weeks homework we played the part of an investigator at a casino trying to correlate who was playing at certain tables and the dealer at those tables during that time, and if there was any losses and how much.
Week 3 Submission File
In this week we focused on some of the fundamentals of Linux administration. Some of these things were to manage processes with the command top, ps, and kill, and how to manage and monitor the services. We also went over apt install, file permissions. Other things we learned was to use sudo to elevate privileges, create and mange users and groups.
For this weeks homework we ensured permissions to sensitive Linux files, created new users and groups, and placed the new users in the new group. We also ran a report from Lynis, to audit the system and see what can be done to further harden it from attacks.
Week 4 Submission File
During this week we mainly focused on backup and restoring data with the Tar command. We also expanded on the idea of backup be using cron to schedule backup jobs as well as log size management using logrotate. We also installed and configured audit rules using auditd.
For this weeks homework we created a tarfile that excludes a directory, wrote some bash scripts for system usage report, manged log files, and sizes, and created an auditing system.
Week 5 Submission File
During this week we focused on scripting bash files. We learned about &&, |, creating and saving alias commands, using if statements as well as for loops
During week 6 homework we created a secret user on our Ubuntu virtualbox with no password, opened a port on the victim machine (same vbox), used john the ripper to crack the hashes on the users.
note I did not provide screenshots in the submission file like others as there is a link to a Youtube video of me doing it at the bottom of the file.
Week 6 Submission File
During this week we moved to Windows, and Windows administration. For out machines we used a Microsoft Azure machine. During this week we touched on gpedit, wmic, and how to use it to view system data. We then learned the basics of PowerShell, and finally Active Directory.
During Week 7 homework, we created a GPO in Active directory, set password lockouts, and created a PowerShell script.
note This also has a YouTube video at the bottom of the submission file to supplement the screen shots.
Week 7 Submission File
This week we were introduced to computer Networking. This included concepts such as network topology, the OSI mode, Ports, protocols, Ping, and FPING, SYN, ACK, RST, FIN. We also were introduced to Wireshark and how to analyze TCP traffic with it.
During Week 7 homework we used nmap, and wireshark to analyze the network for a ficticious company called RockStar Corp. We were to find any vulnerabilities, as well as to scan the PCAP for any malicious activity.
Week 8 Submission file )
During this week we focused mainly on Wireshark and Pcap analysis and nslookup. We also used Aircrack-ng to obtain wireless keys and decrypt the data. During day 3, we did some CTFs based off Wireshark pcaps.
During this weeks homework we used nslookup and wireshark to figure out why mail was no longer getting to the servers.
Week 9 Submission File
During this week we focused on the concepts involved with cryptography. These included basic transcription, and substitution ciphers. We were introduced to the Pain model: Privacy, Authentication, Integrity, Non-Repudiation. We used Open SSL to encrypt and decrypt messages, used hashes to validate the integrity of data. We also also used tools such as Hashcat, and Steghide.
For this weeks homework we visited a cryptography webpage and had to solve several riddles. There was no submission file, just the flags, and a picture of the last page. Both of those and an offline version of the webpage can be found at :
Week 10 Submission
This week we focused on network security. We examined the relationship between ports and services, including the role open ports play as the principal attack surface of networked machines. Then, we covered how firewalls are used to control access to a machine's open ports. We also covered intrusion detection systems and network security monitoring, and performed some network forensics.
For week 11 homework I answered several questions about IDS, the cyber kill chain, firewall archtectures, analyzed Snort rules, and worked with FirewallD rules within our Ubuntu Virtual machine.
Week 11 Submission file
This week we focused we were introduced to Cloud computing and Virtualization. We were also introduced to the concept of Docker and Containers, as well Ansible, and the Yaml language. We used a trial version of Microsoft Azure to setup a small network. This network started with a Resource group, then we added a firewall and rules to secure this network, then we setup 4 machines. The first machine was a jumpbox, where we could remote connect into using SSH, and from there connect to the other machines. We then added two more machines, that ran the DVWA website using Ansible and Containers. We then created a load balancing machine, to control the previous two machines hosting the DVWA webpage. What this did was to create redundancy so if machine 1 would fail machine 2 would take over.
For this weeks homework, we simply had to create a drawing in Draw.io of the network layout and how everything connected to eachother.
Week 12 Network Map
Week 13 Elk Stack Project
This week we focused on our first project, the Elk Stack Project. During this week we took our virtual network we created last week a step further, and added an Elk stack server to monitor the network. We again used the concepts of Ansible, and Docker to deploy this server, as well as deploy Filebeat and Metricbeat.
The homework for this week focused on deploying the Elk stack server, as well focusing on creating documents in Github.
Week 13 Project
During this week we learned about HTTP requests and responses. We also learned about Cookies and how to manage them. We then learned the concepts microservices and architecture. We also learned about the LEMP stack, and some basic SQL commands.
During this weeks homework we had to answer questions about HTTP requests and Responses, using Curl, and Sessions and Cookies.
Week 14 Submission File
This week we focused on different types of attacks that can be directed at web applications. This included attacks such as XXS injection, SQL injection, directory traversals, file inclusion attacks, as well as conduct a brute force attack against a web app login with Burp Suite. We also leaned how to use Foxy proxy, and Burp Suites together to analyze HTTP requests, as well as modifying the data using the Burp Suite Repeater.
During this weeks homework we used our virtual machine perform a command injection, a brute force attack as well as Cross site scripting. After I proved the proof of concept, I wrote how to mitigate and protect from the attack.
Week 15 Submission File
** Please note, any malicious activity was done against virtual machines hosted in my virtualbox. No Laws were broken. **
During this week we focused on the concept such as OSINT (open source information intelligence), as well as tools like NMAP used for network enumeration, or finding out what's vulnerable on the network. We then took it further and searched for any exploits using searchsploit.
During this weeks homework we performed some OSINT on demo.testfire.net, which is a fictional company with a real website for use in demonstrations in Cyber Security. We then ran Zenmap (or NMAP) against one of our virtual machines setup for penetration testing.
Week 16 Submission File
During this week we focused on using nmap to scan ports for potential vulnerabilities. We also Focused on Metasploit, and how to load modules, view the modules information, and modify them to focus on a victims computer. We also learned about Meterpreter, and how to deliver the payload that opens an instance of Meterpreter in the victims computer memory, as well as some commands to use in Meterpreter to interact with the victims computer.
During this weeks homework we were tasked to perform a penetration test against a fictional CEO's computer, simulated by using a virtual computer loaded with the Icecast vulnerability. We then had to write a report on what we found and how this vulnerability could be resolved.
Week 17 Report
During this week we learned about SEIMs. This included what SEIM vendors are out there, and how SEIM's work. We also got introduced to Splunk. In Splunk we learned how to upload data, and write SQL queries to analyze the data. We also learned how to create new fields, schedule reports, and schedule alerts if an attack occurs.
During this week's homework we acted as a SOC analyst hired to analyze a DDOS attack, and design alerts to the SOC team in case it happens again.
Week 18 Homework
During this week we continued to focus on SEIM's specifically Splunk. During this time we learned about using the data to create dashboards and ways to visualize the data. We also learned how to create a Heatmap using We also continued to expand on the knowledge of Splunk that was learned in Week 18.
During this week's homework we worked with SPlunk to analyze and attack on a company, by examining the attack logs. This was a little difficult as the data was created long ago, however we overcame this issue by adjusting the time range to narrowly focus the time range into the date when the attack was simulated.
Week 19 Homework
Red vs Blue project
During this week we focused on our second project, working on it during class time. See below for the description of the project.
An Azure machine with 3 computer in Hyper-V, networked together. A virtual network in a virtual machine. One computer was a Kali Linux machine used as an attacker. The second Hyper-V machine was setup to be a web server, that was setup to be the victim. The third Hyper-V machine was an ELK server, used to identify the attack. The first part of this project, the class acted as the Red Team, and analyzed the web server for vulnerabilities, and exploit them. This was done by using Metasploit to create payload which allowed for reverse shell connection that was used to exfiltrate data off that server. The second half, The class acted as the Blue team to analyze the signature of the attack. From there advise was given on what could be done to mitigate this type of attack from happening again.
Red Vs Blue Project
During this week we learned about digital forensics. Things focused on during this week are identifying, extracting, preserving, and reporting on information obtained from computer and network systems. During this week we also learned about smartphone forensic investigations (specifically the Apple IPhone). This included programs used to extract and view the phone data. The structure of the IPhone database. We also learned how to tag and export evidence from the phone, and then examining some of it with sqlitebrowser.
This weeks homework we performed a digital forensic analysis of an Iphone's data. This homework was based on the National Gallery Exercise, however rather than looking at the overall scenario, we focused specifically on Tracy's IPhone, and how it related to the stamp theft.
Week 21 Homework
- Shell 96.1%
- PowerShell 3.9%
weekly math homework grade 5
Resource types, all resource types, weekly math homework grade 5.
- Rating Count
- Price (Ascending)
- Price (Descending)
- Most Recent
Grade 5 Weekly Math Homework
Grade 5 Weekly Math Homework Multiplication and Division
Grade 5 Weekly Math Homework Number Sense
Grade 5 Weekly Math Homework Geometry
2nd Grade Math Weekly Homework Week 5
Grade 5 Weekly Math Homework Grids
5th Grade Weekly Math Homework Year-Long Set
EUREKA MATH 2nd Grade Module 5 Homework & Assessments CC
5th - 8th Grade Math Curriculum Mega Bundle
Weekly Math Homework Multiplication & Division 3rd Grade Common Core
5th Grade Weekly Math Homework *BUNDLE* 24 Weeks ALL Math Standards
3rd Grade Common Core Weekly Math Homework
5th Grade Math Homework | 5th Grade Math Review HW| Weekly Skill Check| NGLS
5th Grade : Math Vocabulary Crossword Puzzle Worksheet 5 .NBT.7
5th Grade : Math Vocabulary Crossword Puzzle Worksheet 5 .NBT.6
5th Grade : Math Vocabulary Crossword Puzzle Worksheet 5 .NBT. 5
5th Grade : Math Vocabulary Crossword Puzzle Worksheet 5 .NBT.3b
5th Grade : Math Vocabulary Crossword Puzzle Worksheet 5 .NBT.4
6th Grade Math Weekly Homework - YEAR ROUND
- Google Slides™
6th Grade Math Weekly Warmups and Homework Sample
5th Grade Weekly Math Homework Place Value Decimals Multiplication and Division
Set 1, English & Math Rules; Weekly Homework Sheets & PowerPoint Lessons.
5th Grade Weekly Math Homework Fractions
Set 4, English & Math Rules; Weekly Homework Sheets & PowerPoint Lessons.
- We're hiring
- Help & FAQ
- Student privacy
- Terms of service
- Tell us what you think
- Written for
- Document information
ISYE 6501 Homework Week 5 complete solution Georgia Institute Of Technology
- Georgia Institute Of Technology
Preview 2 out of 6 pages
- Report Copyright Violation
Preview 2 out of 6 pages
Also available in package deal (1).
ISYE 6501 Homework WEEK 1-WEEK 10 COMBINED SOLUTION 2023-2024 Georgia Institute Of Technology
- 1. Exam (elaborations) - Isye 6501 homework week 10 complete solution update georgia institute of technology
- 2. Exam (elaborations) - Isye 6501 homework week 9 complete solution 2023-2024 georgia institute of technology
- 3. Exam (elaborations) - Isye 6501 homework week 8 2023-2024 complete solution georgia institute of technology
- 4. Exam (elaborations) - Isye 6501 homework week 7 full questions and answers 2023-2024 georgia institute of t...
- 5. Exam (elaborations) - Isye 6501 homework week 6 complete solution 2023-2024 georgia institute of technology
- 6. Exam (elaborations) - Isye 6501 homework week 5 complete solution 2023-2024 georgia institute of technology
- 7. Exam (elaborations) - Isye 6501 homework week 4 complete update 2023-2024 georgia institute of technology
- 8. Exam (elaborations) - Isye 6501 homework week 3 complete test solution 2024 georgia institute of technology
- 9. Exam (elaborations) - Isye 6501 homework week 2 complete solution 2024 georgia institute of technology
- 10. Exam (elaborations) - Isye 6501 homework week 1 2023-2024 complete solution georgia institute of technology
sponsored message by our partner
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do i get when i buy this document.
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller smartzone. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.
Can Stuvia be trusted?
4.6 stars on Google & Trustpilot (+1000 reviews)
56384 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now