Welcome to Premium Paper Help

see attached Project 4 includes two labs, Lab 9 and Lab 10. Lab 9 Assignment: Conducting Forensic Investigations on Network Infrastructure. Locate

see attached

Project 4 includes two labs, Lab 9 and Lab 10.

Lab 9 Assignment: Conducting Forensic Investigations on Network Infrastructure. Locate and complete Lab 9: Conducting Forensic Investigations on Network Infrastructure. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below.

Note: You do not have to complete Section 3 of the lab.

1. Include the Lab Report file with the following screen captures:

· timestamp-sorted traffic,

· IP-filtered traffic,

· port-filtered traffic,

· TCP push flag-filtered traffic,

· http-filtered traffic,

· router’s version output,

· router’s interface details,

· router1 ARP table,

· IP routing table,

· currently running configuration,

· successful transfer of the secureTopo.png file,

· passive port specified by the FTP server in the Packet Details pane,

· Time to live field in the Packet Details pane,

· Follow TCP stream window,

· reconstituted PNG file,

· entries in the firewall log, and

· resolved entries in the firewall log.

When you have completed the lab, click the “Download Lab Report as PDF” icon, located in the top right corner of the lab (as shown below):

2. Save the following file downloaded from the virtual environment:

· yourname_lab9_ network_forensics.pdf

3. Upload the PDF Lab Worksheet in the Blackboard course.

Lab 10 assignment: Conducting Forensic Investigations on System Memory

Locate and complete Lab 10: Conducting Forensic Investigations on System Memory.

Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below.

Note: You do not have to complete Section 3 of the lab.

1. Include the Lab Report file with the following screen captures:

· contents of the /bin directory,

· contents of the /etc directory,

· contents of the /var directory,

· contents of the /proc directory,

· results of the dmesg command,

· results of the fsck command,

· results of the history command,

· running processes,

· results of the file command,

· records in the kern.log file, and

· records in the auth.log file.

When you have completed the lab, click the “Download Lab Report as PDF” icon, located in the top right corner of the lab (as shown below):

2. Save the following file downloaded from the virtual environment:

· yourname_lab10_ memory_forensics.pdf

3. Upload the PDF Lab Worksheet in the Blackboard course.

4. Then, write one page that discusses the elements listed below.

· Describe current trends in digital forensics and investigation.

· Explain the legal implications and new laws that affect evidence gathering.

Remember to include an introduction for the written portion of the paper. APA formatting is required, and citations and references for any paraphrased material should be present. A minimum of one reference is required for your assignment (it can be the textbook).

APA Guidelines

The application of the APA writing style shall be practical, functional, and appropriate to each academic level, with the primary purpose being the documentation (citation) of sources. CSU requires that students use APA style for certain papers and projects. Students should always carefully read and follow assignment directions and review the associated grading rubric when available. The CSU Citation Guide includes examples and sample papers and provides information on how to contact the CSU Writing Center.

TEXTBOOK

Easttom, C. (2022). Digital forensics, investigation, and response (4th ed.). Jones & Bartlett Learning.

image1.png

image2.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

CRJ317 Week 2 Activity Template Student

CRJ317 Week 2 Activity Template Student Name: [Enter text here] Date: [Enter text here] Course: [Enter text here] Instructor: [Enter text here] Week 2 Activity Template: Criminal Justice Technology Survey Chapter one of the textbook explains 8 different categories of technology systems used in the criminal justice system. Complete the below

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your Deadline: Aug 26, 08:00 PM  Assignment Topic: How to Avoid Being a Victim of Cybercrime Subject: Internet Technology (IT) Sources: 10 sources required Citation Style: APA 7th edition

 COMPETENCIES 738.2.1 : Foundations of Inquiry The learner differentiates between quality improvement processes, evidence-based practice, and

 COMPETENCIES 738.2.1 : Foundations of Inquiry The learner differentiates between quality improvement processes, evidence-based practice, and research. 738.2.2 : Literature Review and Analysis The learner demonstrates knowledge of the process and outcomes of conducting a literature review. 738.2.3 : Ethics and Research The learner demonstrates an understanding of the ethics

5-1 Discussion: Going Beyond Conflict by Applying Restorative PracticesEffective conflict management often includes using restorative practices. In this

5-1 Discussion: Going Beyond Conflict by Applying Restorative PracticesEffective conflict management often includes using restorative practices. In this discussion, you will explore how to take conflict management to the next level by applying restorative practices. Discussing challenges that face our world often means investigating opinions and ideas different from your

You are required to deliver a presentation which demonstrates your understanding of perspectives in psychology. Your presentation must include the

You are required to deliver a presentation which demonstrates your understanding of perspectives in psychology. Your presentation must include the following:- • A description of two psychological perspectives. • An evaluation of the key assumptions of the identified psychological perspectives. • An evaluation of the work of key theorists relating