Category: Cyber Security

  • CYBR 520 Phishing Campaign Draft

    Requirements

    Develop the actual materials you’ll use in your phishing campaign:

    1. Phishing Communication(s) (25 points)
      • The actual phishing message(s) you’ll send (email, text, etc.)
      • Include all elements (subject lines, sender information, body text, links, etc.)
      • Clearly indicate the “tells” that a savvy recipient might notice
    2. Educational Follow-up (25 points)
      • The message recipients will see if they “fall for” the phish
      • Educational content explaining what they missed and how to spot similar attempts
      • Positive reinforcement for those who report the phish
    3. Implementation Timeline (15 points)
      • Detailed schedule for campaign deployment
      • Any preliminary communications or preparations
      • Follow-up activities and reporting
    4. Technical Specifications (10 points)
      • Technical details of how the phishing test would be conducted
      • Security measures to protect actual user data
      • Tracking mechanisms for measuring results

    Deliverable Format: Complete set of campaign materials (formats may vary)

    Requirements: see above

  • ITCC121: Intro to Computer Science

    For this assignment, you will research a well-known cybersecurity attack. Your task is to create a presentation (WITH SPEAKER NOTES) that explains the following:

    • What happened during the attack?
    • The impact of the attack on individuals, organizations, or society.
    • How similar attacks can be prevented in the future?
      1. Choose a cybersecurity attack: Select a notable attack, such as the WannaCry ransomware attack, the Equifax data breach, the SolarWinds hack, or another well-documented incident.
      2. Research thoroughly: Use credible sources to understand the details of the attack, including how it was executed, the vulnerabilities exploited, and its consequences.
      3. Prepare your presentation: Create slides that clearly explain the attack and its significance. Use visuals to enhance your message, and organize your content logically.

        Power Point mus include all information above and include speaker notes to present. Include a title and reference page APA 7th edition.

    Requirements: Required amount

  • Digital Forensics

    Focous on these please

    Learning Outcomes

    • : Explain techniques and procedures for incident detection, containment and isolation, and analysis and attribution.
    • : Demonstrate the collection, analysis and correlation of cyber-threat intelligence for detecting and remediation of future attacks.
    • : Investigate simulated high-tech crimes using an appropriate selection of commonly used digital

    Requirements: Attached

  • Attack & Defense in Cyberspace

    Simple assignment, just needs some screenshots making sure everything is working great.

    Requirements: Attached

  • Attack & Defense in Cyberspace

    This assignment is about building a secure network for a company with three offices (New York, Abu Dhabi, and London). You must create the network in Packet Tracer, configure static routing, and then set up Site-to-Site IPsec VPN tunnels between all offices. After that, you must test and verify that the VPN works and that traffic is encrypted. Finally, you write a report explaining your work and what you learned.

    Requirements: 0000

  • Cyber Security Question

    Assignment due Friday, February 20, 2026 by 11:59pm

    Assignment 1: Cyber ThreatRiskAttack Landscape Survey

    Weight: 20%

    Assessment Type: Survey

    Format: Individual Assignment

    Description:

    In this assignment, you are required to research and analyze and conduct in-depth survey of the current cyber threatriskattack landscape, exploring the evolving nature of cybersecurity challenges faced by organizations today. You need to focus on cyber threat landscape from a global, GCC and UAE perspective that

    changes both over time and has significant impact on the organization and the internetworked users (IU).

    The objective is to examine and critically assess how risks, threats, and attacks interrelate, and how they shape business vulnerabilities in various industries and what organizations are doing to protect themselves.

    You are expected to:

    Part A: Identify at least 10 real-world examples of cyber incidents from recent years, analyze their causes and impacts, and evaluate the broader trends these cases reveal. The analysis should include specific discussion of:

    Risk: The potential for loss or damage to assets, systems, or data.

    Threat: The actors, vectors, and conditions that could exploit vulnerabilities.

    Attack: Specific incidents or actions taken to compromise confidentiality, integrity, or availability.

    Identify and analyze the emergence and discovery of threats and the associated vulnerabilities that

    provide cybercriminals with new attack opportunities (pre covid and post covid).

    Part B: Review and comment on current best practices and strategies organizations employ for risk mitigation, including frameworks, technologies, and governance approaches. Identify the global events such as the COVID-19 pandemic compelling organizations to make major changes to their IT infrastructure.

    Deliverable:

    A comprehensive written report (~2,000 words) that:

    1. Explains the relationship between risk, threat, and attack in the cybersecurity context.
    2. Provides at least three detailed case studies from recent real-world incidents.
    3. Identifies patterns and trends in the current cyber landscape.
    4. Discusses the effectiveness of current industry/business best practices for risk mitigation.

    Assignment Evaluation Criteria:

    Depth and clarity of analysis.

    Relevance and credibility of cited examples.

    Integration of theory with real-world evidence.

    Critical evaluation of mitigation strategies.

    Report structure, writing quality, and citation of sources (APA format).

    Assignment Information

    Length:

    2000

    Weight:

    20%

    Learning Outcomes Added

    • : Assess information security vulnerabilities, threats, and risks, for developing an appropriate risk management strategy.

    Requirements: 2000 words

  • Configuring and Verifying Site-to-Site IPsec VPNs

    Objective:

    The main objective of this assignment is to make efficient use of VPNs as means of secure connections between different locations of an international company. The student will build the company network and then configure Site-to-Site IPsec VPNs between multiple office locations of a fictitious company called Future Tech Enterprises, verify the VPN tunnels, and ensure secure communication between these sites.

    Scenario: Global Tech Enterprises

    Future Tech Enterprises is a multinational corporation with headquarters in New York and

    branch offices in Abu Dhabi and London. The company needs to ensure secure

    communication between its offices over the internet. Each site has its own local network, and

    the organization wants to establish secure Site-to-Site IPsec VPN tunnels between these

    locations to protect sensitive data during transmission.

    Network Overview:

    New York Office:

    Network: 10.11.1.0/24

    Router: NY-R1

    External IP: 203.0.113.1

    Abu Dhabi Office:

    Network: 10.22.2.0/24

    Router: AD-R1

    External IP: 198.51.100.1

    London Office:

    Network: 10.33.3.0/24

    Router: LDN-R1

    External IP: 192.0.2.1

    Your task is to configure and verify Site-to-Site IPsec VPNs between these three offices to

    ensure that all communication over the public internet is encrypted and secure.

    Part 1: Understanding Site-to-Site IPsec VPNs (20 points)

    Conduct your own research and explain the following questions (Make sure to add the necessary citations):

    • List two advantage and two disadvantages of the use of VPNs to connect different sites of this company
    • Define what a Site-to-Site IPsec VPN is and explain its relevance to Future Tech Enterprises.
    • Describe the different phases of IPsec (IKE Phase 1 and IKE Phase 2) and how they secure communication between the New York, Abu Dhabi and London offices.
    • Discuss the encryption and authentication algorithms that would be appropriate for a multinational corporation like Future Tech Enterprises.
    • Compare IPSEC Site-to-Site VPNs with any other alternative. List a scenario where IPSEC remains the preferred choice and another scenario where an alternative might be better suited for Future Tech Enterprises.

    Part 2: Configuring the Site-to-Site IPsec VPNs (50 points)

    Network Topology Setup (10 points)

    Using network simulation software (e.g., Cisco Packet Tracer) design a network topology that

    includes the New York, Abu Dhabi, and London offices.

    Include network address assignments, routing configurations (static routing), and firewall settings as

    necessary.

    Provide a diagram of the network topology showing how each office connects to the other two.

    After configuring static routing test your routing configuration by pinging between office networks. Include screenshots showing successful pings.

    IPsec VPN Configuration (30 points)

    Configure the IPsec VPN on the routers at each office (NY-R1, AD-R1, LDN-R1). Ensure the

    configurations include:

    • ISAKMP Policy
    • IPsec Transform Set
    • Crypto Map
    • Access Control Lists (ACLs) for interesting traffic between the sites
    • Applying the Crypto Map to the appropriate interfaces
    • Document the configuration commands used on each router, explaining the purpose of each
    • command.

    Verification (10 points)

    Verify that the IPsec VPN tunnels are established successfully between all three offices. Provide

    output from relevant verification commands (e.g., show crypto isakmp sa, show crypto ipsec

    sa).

    Demonstrate secure communication between the offices by pinging between devices on

    different networks (e.g., from a device in the New York office to a device in the London office)

    and observing encrypted traffic. Make sure to add screenshots in the report

    Part 3: Testing and Troubleshooting (20 points)

    _Testing the VPN Tunnels _(10 points)

    Test the VPN tunnels by initiating traffic that matches the ACLs defined in the configuration,

    ensuring that communication between New York, Abu Dhabi, and London is secure.

    Provide evidence (screenshots or command outputs) showing successful data transmission over

    the VPNs.

    Part 4: Reflection and Documentation (10 points)

    Write a reflection on what you learned during this assignment. Highlight any challenges you

    faced, particularly in managing multiple VPN tunnels, and how you overcame them.

    ** Add references and also sign the Academic Integrity Disclaimer in the report template.

    Submission

    Each student must submit 2 files in the given order:

    1. Primary file submission: Full report in a single PDF containing answers to all the Parts along with the screenshots wherever applicable. Name the report firstname_lastname_A1.pdf. Use the following to compile your report.
    2. Secondary file submission: A packet tracer file. Make sure the user account details under packet tracer file must have username a s your firstname_lastname and email must match your ZU email.

    Assignment Information

    Length:

    > 2000 words

    Weight:

    15%

    Learning Outcomes Added

    • : Describe information, network and computer attacks and defenses fundamentals, standards, and security challenges.
    • : Evaluate system and network authentication, access control schemes, and components of virtual private networks (VPNs).

    HOW TO GET FULL MARK COMPLETE INSTRUCTIONS


    PART 1 (20 Marks) THEORY SECTION

    What Your Professor Expects

    Not just definitions.

    He wants:

    • Clear explanations
    • Correct terminology
    • Diagrams (optional but gives bonus impression)
    • Proper references (APA style)
    • Connection to the scenario

    What You MUST Do

    1? Write 2 Advantages + 2 Disadvantages

    BUT:

    • Connect each point to Future Tech Enterprises
    • Explain WHY it matters

    Example:
    Wrong: “VPN is secure.”
    Correct: “VPN ensures encrypted communication between New York and London, protecting sensitive financial data from interception.”


    2? Define Site-to-Site IPsec VPN

    • Clear definition
    • Difference from remote access VPN
    • Mention IPsec operates at Layer 3
    • Explain relevance to multinational company

    3? Explain IKE Phase 1 & Phase 2

    You must mention:

    • ISAKMP SA
    • IPsec SA
    • Diffie-Hellman
    • Encryption negotiation
    • Authentication
    • Interesting traffic

    If you miss these marks deducted.


    4? Encryption Algorithms

    Mention:

    • AES-256
    • SHA-256
    • DH Group 14
    • Pre-Shared Key

    Explain WHY enterprise needs strong encryption.


    5? Comparison Section

    Compare IPsec vs SSL VPN:

    Make table:

    | Feature | IPsec | SSL VPN |

    Professors love comparison tables.


    6? References (VERY IMPORTANT)

    Minimum 3 academic references:

    • Cisco documentation
    • NIST
    • Stallings textbook

    If you skip references automatic mark deduction.


    PART 2 (50 Marks) PACKET TRACER (MOST IMPORTANT)

    This is where most students lose marks.

    You must be organized.


    STEP 1: BUILD CLEAN TOPOLOGY (10 Marks)

    You need:

    • 3 Routers (2811 or 2911)
    • 3 Switches
    • 3 PCs
    • Internet cloud (or serial connections between routers)

    IP Addressing (DO NOT GUESS)

    Use exactly:

    NY LAN:
    Router: 10.11.1.1
    PC: 10.11.1.10
    Gateway: 10.11.1.1

    AD LAN:
    Router: 10.22.2.1
    PC: 10.22.2.10

    LDN LAN:
    Router: 10.33.3.1
    PC: 10.33.3.10

    External interfaces:

    • NY: 203.0.113.1
    • AD: 198.51.100.1
    • LDN: 192.0.2.1

    REQUIRED SCREENSHOTS

    You must include:

    1. Full topology diagram
    2. IP configuration of each PC
    3. Router show ip route
    4. Successful ping BEFORE VPN

    If you skip routing test screenshot marks lost.


    STEP 2: STATIC ROUTING

    Configure static routes on ALL routers.

    Then test:

    ping 10.22.2.10ping 10.33.3.10

    Take screenshot of successful ping.


    STEP 3: CONFIGURE IPSEC VPN (30 Marks MOST CRITICAL)

    You must configure:

    ISAKMP policy
    Pre-shared keys
    Transform set
    ACL for interesting traffic
    Crypto map
    Apply crypto map


    IMPORTANT: You Need 3 Tunnels

    NY AD
    NY LDN
    AD LDN

    If you only configure NY as hub YOU LOSE MARKS.

    Your assignment says:

    Configure between these three offices

    That means FULL MESH.


    Common Mistakes That Lose Marks

    Forgetting to mirror ACL on other router
    Applying crypto map on wrong interface
    Wrong peer IP
    Using wrong wildcard mask
    Not testing traffic

    Avoid these.


    STEP 4: VERIFICATION (10 Marks)

    You MUST include screenshots of:

    show crypto isakmp sashow crypto ipsec sa

    Expected:

    • State = QM_IDLE
    • Encrypted packet counter increasing

    Then:

    Ping from:

    • NY PC LDN PC
    • AD PC NY PC

    Then run:

    show crypto ipsec sa

    Take screenshot showing encrypted packets.

    If you do not show packet counters increasing marks deducted.


    PART 3 (20 Marks) TESTING & TROUBLESHOOTING

    You must:

    1. Show traffic triggering VPN
    2. Explain how tunnel forms
    3. Mention at least 3 troubleshooting techniques

    Example:

    • Check ACL match
    • Verify PSK
    • Verify routing
    • Check interface crypto map

    If you only say it worked low mark.


    PART 4 (10 Marks) REFLECTION

    Professor wants:

    • What you learned
    • Challenges
    • How you solved them
    • Connection to learning outcomes

    Mention:

    • SecFundamental
    • AuthAccessVPN

    That gives strong impression.


    SUBMISSION RULES (DON’T LOSE EASY MARKS)

    You must submit:

    1? PDF Report

    Name:

    firstname_lastname_A1.pdf

    Contains:

    • All answers
    • All screenshots
    • References
    • Academic integrity signed

    2? Packet Tracer File

    VERY IMPORTANT:

    Inside Packet Tracer:

    Go to:
    Options User Profile

    Set:
    Username: firstname_lastname
    Email: your ZU email

    If you forget this mark deduction.


    HOW TO GET 100%

    Here is checklist:

    Clear theory
    References
    Clean topology
    Static routing verified
    Full mesh VPN
    Correct crypto configuration
    Tunnel verification screenshots
    Packet counters increasing
    Troubleshooting explanation
    Reflection written properly
    File names correct
    Packet Tracer user profile correct


    FINAL ADVICE (From Experience)

    Most students lose marks because:

    • They configure only 1 tunnel
    • They forget verification screenshots
    • They dont explain commands
    • They skip references

    You will not make these mistakes.

    Requirements: 2000 | Python

  • Professional memo (PowerPoint slide)

    To complete this assignment, you will need the attached files and the the documentation (click link to download) from the Payment Card Industry Data Security Standards (PCI DSS) organization.

    Please read the instructions carefully and ask questions if anything is unclear. You must use the attached template to complete this assignment. The PowerPoint presentation (PDF) Effective Professional Memo Writing provides other essential information to help guide your work on this assignment.

    The ability to communicate effectively is a critical skill for all students and is required for success in the workplace. has a variety of resources to help students. The Effective Writing Center is available through the “Resources” link on the Navigation bar. You are strongly encouraged to avail yourself of these resources. Your writing abilities will be graded as part of the assignment.

    Requirements: 3 pages

  • Kali Linux Lab Report -EASY

    Lab Exercise: Reconnaissance and Fingerprinting with Kali Linux

    Objective

    You will use Kali Linux to perform passive and active reconnaissance and fingerprinting on a designated domain, leveraging various tools to gather information ethically and safely.

    Lab Scenario

    You are a penetration tester tasked with gathering information about a target domain. The domain for this lab is hackthissite.org, a legal and ethical platform for cybersecurity training.

    Lab Setup

    1. Environment: Ensure students have access to a Kali Linux virtual machine.
    2. Internet Connection: Verify internet connectivity on the Kali machine.
    3. Tools: Pre-installed tools in Kali Linux (Nmap, Netcat, whois, Wappalyzer, etc.).
    4. Target Domain: Use hackthissite.org for all fingerprinting activities (confirmed as ethical and legal for cybersecurity training purposes).

    Kali Linux Installation as a Virtual Machine

    Step 1: Download Virtualization Software

    1. Install a hypervisor such as VirtualBox or VMware Workstation Player (both are free).
      • VirtualBox Download:
      • VMware Player Download:

    Step 2: Download Kali Linux ISO or Virtual Image

    1. Go to the official Kali Linux website:
    2. Navigate to the Downloads section.
    3. Choose one of the following:
      • ISO file for manual installation.
      • Pre-configured VirtualBox or VMware image for a quicker setup.

    Step 3: Set Up the Virtual Machine

    1. Open your hypervisor (VirtualBox or VMware).
    2. Create a new virtual machine:
      • Name: Kali Linux.
      • Type: Linux.
      • Version: Debian-based (64-bit).
    3. Allocate resources:
      • Memory (RAM): Minimum 2 GB (Recommended: 4 GB).
      • Disk Space: At least 20 GB.
    4. Attach the downloaded ISO file or select the pre-configured virtual image.

    Step 4: Install Kali Linux (if using ISO)

    1. Start the virtual machine and boot from the ISO file.
    2. Follow the installation prompts:
      • Select Graphical Install.
      • Configure language, location, and keyboard layout.
      • Set up a username and password.
      • Partition the disk (choose guided setup for simplicity).
    3. Complete the installation and reboot.

    Step 5: Update Kali Linux

    1. Log in to your new Kali Linux VM.
    2. Open the terminal and run:

    sudo apt update && sudo apt upgrade -y

    1. Install any additional tools needed for the lab:

    sudo apt install nmap netcat whois

    Step 6: Test the Setup

    1. Verify network connectivity by running:

    ping google.com

    1. Ensure tools like Nmap and Netcat are functioning:
    1. nmap –version

    nc -h


    Lab Instructions

    Part 1: Passive Reconnaissance

    1. Google Dorks for Information Gathering:
      • site:hackthissite.org filetype:pdf
      • inurl:admin site:hackthissite.org
      • Open the Firefox browser in Kali Linux.
      • Use the following Google Dorks to identify publicly available information:
      • Document any relevant results.
    2. WHOIS Lookup:
      • Open the terminal in Kali Linux.
      • Run the following command:

    whois hackthissite.org

      • Note the domain registration details (registrant, creation date, expiration date, etc.).
    1. Shodan Search:
      • Open the Firefox browser and navigate to https://www.shodan.io/.
      • Search for hackthissite.org.
      • Document any exposed services, open ports, or technologies.

    Part 2: Active Reconnaissance

    1. Nmap Scanning:
      • Run a basic TCP scan:

    nmap -sS hackthissite.org

      • Perform service and version detection:

    nmap -sV -O hackthissite.org

      • Document the results, including open ports, running services, and potential vulnerabilities.
    1. Netcat for Banner Grabbing:
      • Open a terminal and use Netcat to connect to an open port (e.g., port 80):

    nc -v hackthissite.org 80

      • Type HEAD / HTTP/1.0 and press Enter twice to grab the HTTP banner.
      • Record the server type and version.
    1. Wappalyzer for Web Application Fingerprinting:
      • Open the Firefox browser and install the Wappalyzer extension.
      • Visit hackthissite.org and analyze the technologies used (e.g., CMS, JavaScript libraries).
      • Take a screenshot of the Wappalyzer output.

    Deliverables

    1. A report containing:
      • Results of passive reconnaissance (Google Dorks, WHOIS, Shodan).
      • Outputs of active reconnaissance (Nmap scans, Netcat results, Wappalyzer findings).
      • Screenshots of tool outputs (include the entire screen with the clock/time).
    2. Reflection on the ethical considerations and importance of proper permissions in penetration testing.

      {{{if possible give me a setup for macOS apple silicon m2 in a seperate file aside from this assignment}}}

    Requirements: as long | Typescript

  • Cyber Security Question

    M5.1: Project Assignment

    Name:

    Instructions:

    Please follow this on how to use ChatGPT in the classroom to learn SQL coding responsibly.

    For each problem:

    • Write and execute an SQL query in Oracle Live SQL.
    • Execute the following command: SELECT sysdate, ‘your name’ FROM dual; where your_name is substituted with your name.
    • Take a screenshot that includes both SQL statements and all results.
    • Copy and paste the screenshot into a Word file containing your solutions.

    In addition, after completing this assignment, include a short overall reflection on your experience using ChatGPT (or another generative AI tool) to support your SQL learning. Answer the following questions:

    • When was AI most useful or effective, and when did you find it less helpful or potentially misleading?
    • How did you decide whether to trust, revise, or reject AI-generated SQL?
    • What would you do differently the next time you use AI to support your SQL work?

    Assignment Problems:

    Continuing from the final version of your work in M2.2: Assignment Advanced Relational Database Design, this assignment requires you to write SQL queries to create all tables, including appropriate data types, relationships, and constraints (e.g., PRIMARY KEY, FOREIGN KEY, NOT NULL, CHECK, DEFAULT).

    You are encouraged to use generative AI tools (such as ChatGPT) to support your work, for example, to draft initial CREATE TABLE statements, review constraint definitions, or identify potential issues. However, you are responsible for evaluating, revising, and finalizing all SQL to ensure it accurately reflects your design and follows best practices.

    In addition, you may use ERD tools (such as Lucid) that offer ERD-to-SQL conversion features. Any automatically generated SQL must be carefully reviewed and refined; the final submission should reflect your informed design decisions, not unexamined tool output.

    Make sure to name all PRIMARY KEY and FOREIGN KEY constraints using Oracle naming conventions. For each table, display its structure after creation. Finally, include your ERD/EERD from the previous assignment as part of your submission.

    Requirements: NA