{"id":37697,"date":"2024-11-12T23:46:07","date_gmt":"2024-11-12T23:46:07","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/u09a1-week-9-assignment-lab-ethical-hacking-performing-post-exploitation-activities-and-evasive-maneuvers\/"},"modified":"2024-11-12T23:46:07","modified_gmt":"2024-11-12T23:46:07","slug":"u09a1-week-9-assignment-lab-ethical-hacking-performing-post-exploitation-activities-and-evasive-maneuvers","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/u09a1-week-9-assignment-lab-ethical-hacking-performing-post-exploitation-activities-and-evasive-maneuvers\/","title":{"rendered":"[u09a1] Week 9 Assignment: Lab: Ethical Hacking: Performing Post-exploitation Activities and Evasive Maneuvers"},"content":{"rendered":"<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">Perform research on the Internet to understand security threats and attack vectors in a wireless network scenario. How could post-exploitation activities and evasive maneuvers be done in this type of environment? What security controls would you recommend implementing to avoid these post-exploitation activities and evasive maneuvers from being effective?<\/p>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Submit<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/strong>your&nbsp;essay including the lab report for this assignment by 11:59 pm on Sunday of this week.<\/p>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Additional Requirements<\/h2>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Written communication:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/strong>Ensure written communication is free of errors that detract from the overall message.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Length of paper:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>1-2 typed, double-spaced essay pages, lab report pages, title page, and reference page.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Format<\/strong>: Format resources and citations according to APA guidelines for style and format.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Font and font-size:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Use Times New Roman 12-point font.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Sources:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Cite at least two sources.<\/li>\n<\/ul>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Competencies Measured<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria.<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 1:<\/strong>&nbsp;<strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Describe the core concepts, technologies, components, and security issues related to mobile and wireless networks.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Apply internet research findings to analyze core concepts and applied technologies regarding security threats and attack vectors in a network context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 2:&nbsp;Compare and contrast different approaches to digital communication.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Describe performing post-exploitation activities and evasive maneuvers to avoid detection in a network in a lab context.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Recommend security controls to implement to prevent post-exploitation activities and evasive maneuvers to avoid detection in a network context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 5:&nbsp;Apply network defense tools to identify and mitigate wireless security concerns.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Complete the lab tasks as described in the lab learning objectives.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Describe how performing post-exploitation activities and evasive maneuvers to avoid detection can be applied in a network context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 6:&nbsp;Exhibit proficiency in writing, critical thinking, and research topic areas in real-life data communication networks.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Organize content so ideas flow logically with smooth transitions.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Convey clear meaning through appropriate word choice and usage.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Perform research on the Internet to understand security threats and attack vectors in a wireless network scenario. How could post-exploitation activities and evasive maneuvers be done in this type of environment? What security controls would you recommend implementing to avoid these post-exploitation activities and evasive maneuvers from being effective? Submit&nbsp;your&nbsp;essay including the lab report for [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/37697"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=37697"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/37697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=37697"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=37697"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=37697"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=37697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}