Overview

Here is an overview of all of the different types of assignments in the course. You can find the detailed directions for the assignments in the module where they are assigned.

Course Format

Students will read the chapter(s) in advance of coming to class. Additionally, each week there may be assignments and discussion questions posted which the student must complete during that week.

Assignments

Lab Assignments have been selected in Canvas for the student to perform independently. Students will post the results of the labs in the Assignments section of Canvas each week. An "open" lab is maintained at the college if the student is not able to do the labs at home.

Quizzes and Proctored Assessments

There will be quizzes and closed proctored assessments. Quizzes MUST be taken the week that they are assigned.


Project: Threat and Vulnerability Analysis, Incident Response, and Security Design - 20%.

Students will be required to install VirtualBox (or VM Player) onto either a classroom PC or their own PC (note: no support is provided if students are using their own PCs, and students are encouraged to work out their own problems anyway even if using the classroom PC).

Students will then work either independently or as a team of no more than 2 individuals to select standing up 2 operating systems as prescribed by the instructor, including Metaspolitable (a vulnerable server you will scan to find vulnerabilities). At the end of the semester, you or your team will complete network discovery (NMAP), complete vulnerability scan (Nessus), and prove penetration of 1 of your virtual machines (Metasploit). Your project will be graded as follows:



Scanning Project Scoring Criteria

Percentage

Downloaded VirtualBox or VM Player
Installed Server OS
Installed Client OS (Windows or Linux)
Setup Environment for internal network

1 - 4%

Identified target system through network discovery using NMAP and/or other tools (e.g. Angry IP Scanner).
Illustrated method for profiling.

1 - 4%

Installed and successfully ran Nessus
Identify vulnerabilities

1 - 4%

Installed and successfully ran Metasploit (or equivalent)
Demonstrating penetration into machine.

1 - 4%

3 to 4 page Project Report (Lessons-learned and identify how you can maintain access).

1 - 4%