Free Essay

Networking Week 1 Lab Report

In:

Submitted By h22angel
Words 1280
Pages 6
iLab Grading Rubric Category | Points | Description | Section 1ElementK Tutorial, How to use vLabs Lab - 10 Points | 10 | After reading the reading the ElementK iLab Tutorial, answer the related questions. | Section 2Using Windows Applications as Network Tools - 15 Points * Task 1, Step 3 * Related explanation or response * Task 1, Step 7 * Related explanation or response * Task 1, Step 19 * Related explanation or response * Task 1, Step 22 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned concerning network commands available within the Windows operating system. | Section 3Troubleshooting TCP/IP Problems Lab - 15 Points * Task 1, Step 1 * Related explanation or response * Task 2, Step 2 * Related explanation or response * Task 2, Step 3 * Related explanation or response * Task 3, Step 1 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned about the Network Monitor. | Total | 40 | |

------------------------------------------------- Name:
Date:
Professor:
-------------------------------------------------

ElementK Tutorial, How to use vLabs Lab (10 points)
-------------------------------------------------
After reading the ElementK iLab Tutorial, answer the following fill-in-the-blank questions on how to access the labs.
Question 1:
Cisco vLabs
Client Options (Enabled): ______Active______ _X_, ___Sun___ ____Java____, ______Native______ ______Telnet______ (2 points)

Question 2:
________Personal________ __________firewalls________ (i.e. client based) must allow access to ports specified for specific vLab type, allow use of our tunneling software if specified ports are blocked, or be disabled to gain access to the vLab. (2 points)

Question 3: Click the “______Access______ ___Lab___” link on ‘Lab Content’ tab to launch the vLab. (2 points)

Question 4:
Select _____START_____ ___LAB___ ___NOW___ on left frame of resulting lab console window to take a vLab instantly (2 points)

Question 5:
Select ________SCHEDULE________ ___LAB___ on the left frame of the lab console window to schedule vLab for a future day/time.
(2 points)

Using Windows Applications as Network Tools vLab (15 points)
Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points) In this lab I learned how to utilize windows applications as network tools. I was able to use command prompts in order to view network details. This relates to the TCO by showing you how to use some methods on how to properly access network tools. I feel more confident now when it comes to understanding the data displayed in the command prompt. This will help me in the future if I ever have to troubleshoot or view certain information about my network.

-------------------------------------------------
Copy and Paste the following screenshots from your Using Windows Applications as Network Tools lab below.
Task 1, Step 3: Paste a screenshot of the “ipconfig” command showing your network addressing. (.625 points) After reading the explanation for this command in the “Sample Solution,” explain why the output of this command is so important to the operation of this particular host within the network. (.625 points)
IPCONFIG is important because it is the command line tool used to control the network connections. With the information given with this command you can view what is actually going on in the network and if any problem persist, where it is happening.
Task 1, Step 7: Paste a screenshot of the ping command showing a successful ping. (.625 points)

After reading the explanation for this command in the “Sample Solution,” explain what it means if a “ping” command is successful? (.625 points)
If a ping command is successful it is confirming that the internet is up and running. The domain or ip address used to send out the ping is accessible if the ping is returned back successful.

Task 1, Step 19: Paste a screenshot of the output of the “ipconfig /all” command. (.625 points)

What are some of the additional parameters that are listed here that weren’t displayed in the previous use of the command? (.625 points)
IPCONFIG displays the details of only your computer while on the other hand IPCONFIG/ALL displays the details of everything on the network. It is basically the same information just broken down into more detail.
Task 1, Step 22: Paste a screenshot of the trace route command showing a successful trace to IP address 4.2.2.1. (.625 points)

After reading the explanation for this command in the “Sample Solution,” in your own words, explain what the output of the “tracert” command indicates? (.625 points)
The TRACERT command indicates the path that an ip packet took in order to reach its destination.

End Lab

Troubleshooting TCP/IP Problems Lab (15 points)

Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points)
In this lab I learned how to troubleshoot tcp/ip problems by using certain operating system applications and features. By performing this lab I learned the various steps that are useful when using troubleshooting techniques on the tcp/ip. This relates to our weeks TCO by teaching us how to use the certain procedures to ensure the proper way to troubleshoot. This is something I can greatly benefit from after learning the correct steps to take when needing to complete a task as similar as this one. This is always a useful technique to properly know how to utilize in case you ever run into problems either in your house or in a professional setting.

-------------------------------------------------
Copy and Paste the following screenshots from your Troubleshooting TCP/IP Problems lab below.
Task 1: Step 1, Paste a screenshot of your successful logon to the Vancouver server as the Vancouver User. (.625 points)

Briefly describe the process used to login to the server. (.625 points)
After clicking on the Vancouver computer system I was prompted to login to the system. I then typed in the username and password that was given to me which at that point logged me into the Vancouver server.
Task 2: Step 2, Generate and view network traffic, Action f. Paste the screenshot of the “ping” command output of IP address 192.168.1.200. (.625 points)

What is significant about receiving a “reply” from the host you are pinging? (.625 points)
The significance about receiving a reply from the host you are pinging is that it confirms that your connection is good. The more replies received from the ping, the stronger the connection is.
Task 2: Step 3, Paste a screenshot of the results from your network data capture. (.625 points)

At this point in your education, you probably won’t understand the details of the information that you just captured, but in general, what do you think is pictured in the data capture? (.625 points)
My guess as to what is being displayed in the data capture is information on everything running in the system. I would say it is like peeking under the hood of a computers system.
Task 3: Step 1, Paste the screenshot of the Microsoft Network Monitor capture summary window showing the ICMP frames displayed in red. (.625 points)

What command do you think caused the generation of the ICMP packets? (.625 points)
The ping command which then generated them and allowed me to view them.
End Lab

Similar Documents

Premium Essay

Module 3 Essay

...Syllabus NT1210 Introduction to Networking SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances...

Words: 4795 - Pages: 20

Free Essay

Cis 175 Complete Course Cis175 Complete Course

...CIS 175 Complete Course CIS175 Complete Course Click below link for Answer http://workbank247.com/q/cis-175-complete-course-cis175-complete-course/12262 Discussions CIS 175 Week 1 Discussion "Topologies"  Please respond to the following: Per the text, network topologies are defined both physically and logically. Suppose you had to implement either a full-mesh topology or start topology network on a university campus that has ten (10) buildings. Determine the topology that would you select. Provide two (2) reasons for your choice.    Imagine that you work for a small company with one hundred (100) computers that are not on a network. Your boss comes to you for advice on whether he should implement either a peer-to-peer or client / server network. Recommend one (1) solution for your boss. Justify your recommendation with at least three (3) advantages that your choice would afford over the network that you did not choose. Click below link for Answer http://workbank247.com/q/cis-175-complete-course-cis175-complete-course/12262 CIS 175 Week 2 Discussion "Working with the OSI Model"  Please respond to the following: Industry professionals use mnemonics in order to remember the layers of the OSI model. The most popular mnemonic is "Please Do Not Throw Sausage Pizza Away," with each capital letter representing the word of the OSI, i.e., Please (Physical), Do (Data Link) and so on. Create your own unique sentence that would help you to remember the OSI model. Provide a rationale...

Words: 6200 - Pages: 25

Premium Essay

English 310

...Business and Public Administration CIS375-01: Data Communications Spring 2015 Section 01: Monday/Wednesday, 1:00-2:15 PM; Classroom: SAC-2103 Instructor Name: Christian Ogwo Office: SAC 2103 Phone: 213-446-8172     Email: cogwo@csudh.edu     Website: Office Hours Mon. 2:15 – 3:15 p.m., Wed. 6:00 – 7:00 p.m. Course Description and Prerequisites Course Description: History and trends of hardware/software for telecommunications; asynchronous and synchronous protocols; codes; case studies of current commercial applications; distributed processing; carriers, services and regulatory agencies; standards; error management; reliability; design and tuning of networks; security. Prerequisites: CIS 370 Textbooks and Other Materials Required: Business Data Communications and Networking, Eleventh Edition, by J. FitzGerald and A. Dennis (ISBN: 978-1118-086834) Recommended: Network Fundamentals, CCNA Exploration Companion Guide, 1st edition, by Mark Dye, Rick McDonald, Antoon Rufi, Publisher: Cisco Press. ISBN-10: 1-58713-208-7; ISBN-13: 978-1-58713-208-7; Published: Oct 29, 2007. Network Fundamentals, CCNA Exploration Labs and Study Guide, 1st edition, by Antoon Rufi, Priscilla Oppenheimer, Belle Woodward, Gerlinde Brady. Publisher: Cisco Press. ISBN-10: 1-58713-203-6; ISBN-13: 978-1-58713-203-2; Published: Jan 18, 2008 Supplemental Materials: CCNA Exploration Course Materials, provided...

Words: 1655 - Pages: 7

Free Essay

Nt 1210

...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5 Analyze...

Words: 799 - Pages: 4

Premium Essay

Sss Bn Nwteotk

...UNIT DESCRIPTION Bachelor of Networking (BNet) Bachelor of Engineering Technology (Telecommunications) BEng(Tel) BN106-Networking Fundamentals Trimester 1, 2016 1. ENTRY REQUIREMENTS AND SUBJECT WEIGHTING Prerequisites: N/A Co-requisites: BN103 Platform Technologies Credit Points: 15 credit points Level: Year 1, Core Workload: Timetabled hours/week: 4 (Lecture = 2 hours, Tute/Lab = 2 hours) Personal study hours/week: 5 2. STAFF Moderator: Unit Coordinator: Lecturer (Melb): Lecturer (Syd): 3. BRIEF DESCRIPTION This is a second trimester core unit out of a total of 24 units in the Bachelor of Networking (BNet) and Bachelor of Engineering Technology (Telecommunications) BEngTech(Tel). This unit addresses the BNet and BEngTech(Tel) course learning outcomes and complements other courses in a related field by developing students’ knowledge and skills in networks. For further course information refer to: http://www.mit.edu.au/courses/bachelor-networking and http://www.mit.edu.au/courses/bachelor-engineering-technology-telecommunications Computer Networks are built with a combination of computer hardware and computer software. Networks can be categorized in different ways such as according to the geographic area (LAN, WAN, MAN etc) or based on topology or on the types of protocols they support. This unit covers design, networking equipments, protocols and technologies essential to build computer networks. You will also learn principles, benefits...

Words: 2135 - Pages: 9

Free Essay

Netw410 Week 1 Lab

...NETW410 Week 1 Lab Report Your Name NETW410 Professor Douglas Romans Current Date 1/10/2016 Lab #1, Introduction to Visio Lab Report: (70 points) Place the answers below the questions using a red-colored font. Answer in college-level sentences with proper grammar and spelling. Answer each part of the question for full credit. Question 1 (3 points) What is your experience with the Visio software? Have you used it before or is it your first experience with Visio? I do have some experience with Visio but it is extremely limited. At my internship my boss instructed me to make modifications of a Visio document that mapped out our entire building. That’s the extent of my Visio experience outside of installation. Question 2 (3 points) How did you access Visio? How do you feel about the different access methods? Luckily I already had Visio installed on my computer so I used the desktop application. Question 3 (3 points) What version of Visio did you use for this lab? As previously stated I have Visio installed on my computer, it’s Visio Professional 2013. Question 4 (3 points) What file extension does your version of Visio use? Does Visio support other extensions? My version of Visio saves in .vsdx file format. Question 5 (6 points: 3 points for each screenshot and comment) Use this website (http://www.ratemynetworkdiagram.com/index.php?z=1) to find a diagram that you think has good points. Paste a screen shot of the diagram in your lab report...

Words: 826 - Pages: 4

Premium Essay

Ceis100 Entire Course

...CEIS100 ENTIRE COURSE TO purchase this tutorial visit following link: http://wiseamerican.us/product/ceis100-entire-course/ Contact us at: SUPPORT@WISEAMERICAN.US CEIS 100 All Weeks Discussions CEIS 100 Week 1 Course Project Problem Solving • Describe a scenario where you were unable to solve a problem. What stopped you, and what could you have done instead? Did you use the five steps in problem-solving discussed in the lecture? CEIS 100 Week 2 Course Project Networking • How would you define a network? What is bandwidth? What is a NIC? List three types of media used for network connections. • Describe a situation in which you needed to access a network and had difficulty. What steps did you take to access the network? If you have not run across this, give an explanation of a network you used and some benefits of using the network. • How will networking impact you in your professional life? CEIS 100 Week 2 iLab Report Laboratory Title: Determining what will make the Raspberry PI computer a functioning piece of equipment and obtain the necessary components. • Objectives: (What was the purpose of this lab? What did you expect to find?) • Results: (What did you find?) • Conclusions: (What does this mean? How can this be used? What implications can I draw from this?) CEIS 100 Week 3 Course Project Excel uses and Gaming • Give an example of a situation for which would need a spreadsheet. How would functions be useful in your spreadsheet? • Describe your favorite...

Words: 569 - Pages: 3

Premium Essay

Project

...type University of Houston • College of Technology DIGM 3353: Visual Communications Technology SPRING 2013 SYLLABUS Lecture Section 30963 On-line, Lab Section 30965: Mon. 1:00-4:00; 31356: 5:30-8:30 Course: 3 credits. Use of technological systems in visual communications including design principles, typography, use of color, photography, pixel- and vector-based graphics, print and electronic delivery, and ethical considerations Instructors: Lloyd.Schuh, Lecture, Mike Dawson, Lab Email: leschuh@central.uh.edu and miked@mikedgraphics.com. Please use “Student Cafe” option on Blackboard for general questions and comments, use instructor’s email for private questions. Office Hours: In-person (by appointment) and virtual (through Blackboard Learn) schedule To Be Announced. Department Website: www.digitalmedia.tech.uh.edu Lecture: Section 18662, on BLACKBOARD LEARN, go to: https://accessuh.uh.edu/login.php Lab: Section: 18663, Thursday, 8:30-11:30, Sugar Land Campus, George Bldg Room 320. Prerequisites: ENGL 1303/1304 or equivalent and working knowledge of Microsoft Office. Course Goals: This course provides students with an understanding of the technological systems that extend the range of human communications, with an emphasis on the visual communications processes. The course is an overview, which only begins to scrape the surface of the field of graphic communication/digital media. You will walk away from this course knowing a little...

Words: 1967 - Pages: 8

Free Essay

Securing Linux Lab Assignment

...Week 3 Lab This lab consists of two parts. Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Harden Linux server services when enabling and installing them, and keep a security perspective during configuration * Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened before hosting a web site * Configure and perform basic security for a MySQL database, understanding the ramifications of a default installation and recommending hardening steps for the database instance * Install, setup and perform basic security configuration for Sendmail to be able to leverage the built-in messaging capabilities of the Linux System * Enable and implement secure SSH for encrypted remote access over the network or across the Internet of a Linux server system Overview This lab is an extension of the previous hands-on labs, and it incorporates security hardening for Linux services and applications loaded in the physical server. This demonstration will configure security and hardened services...

Words: 2020 - Pages: 9

Free Essay

Lab 2

...| Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos...

Words: 1139 - Pages: 5

Free Essay

Netw360 Week 1 Ilab

...NETW410 Week 1 Lab Report NETW410, Professor Current Date: 1/11/14 Lab 1: OPNET LAN Modeling Tutorial ------------------------------------------------- ------------------------------------------------- Week 1 iLab Report The first objective in the LAN Modeling tutorial is Setting Up the Scenario. The final step in setting up your scenario appears below. 1. (30 points) Once your project is created (after Step 6 above), your workspace will contain a map of the United States. Your project and scenario name can be seen in ITGuru’s top window border in the form of Project: <project name> Scenario: <scenario name>. Capture a screenshot of your new project workspace that clearly shows your project and scenario name, and paste it below. 2. (40 points) In college-level paragraph(s), describe how background traffic affects both e-mail data and VoIP data. In this week’s lab exercise, we had the opportunity to create a network simulation from the ground up using OpNet IT Guru. The purpose of the exercise was to gain familiarity with OpNet functions along with network objects and associated behavior based on the configuration of network variables. Some of these objects include Application Definitions, Profile Definitions, Subnets, and the various means of connecting these components in a topology. The lab exercise itself provided a foundation for creating a simulated environment that was focused on evaluating the impact of background link load...

Words: 681 - Pages: 3

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Premium Essay

Police Abuse Essay

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65