Click the link above to submit your assignment.
Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Submit each lab based on the following:
Log into the EC-Council iLab environment. http://ilabs.eccouncil.org/
Complete the weekly lab assignment described below using EC-Council iLab.
Submit the screenshots for the steps specified in each lab assignment. Go to http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.
Write a short answer response in good paragraphs in Word along with the assignment submission link to the following:
a. Summarize the technical experiences in completing the lab assignment.
b. Identify the commands that were of greatest benefit to you.
c. Provide general comments on the overall lab assignment experience. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.
Lab Assignment 3
Due Week 4 and worth 59 points
Complete the following EC-Council Labs.
Note: Labs contain deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Attack Phases (2nd ed.). Cengage Learning.
Lab Version
Module Title
Location
Lab #: Title
Deliverable(s) for Submission
Strayer
SEC 420
(CEH v9)
Enumeration
iLab
Module
4
Lab 2 (Exercise V): “Performing Network Enumeration Using NetBIOS Enumerator.”
1. Screenshot after Step 10
2. Textbook: Attack Phases -Chapter 4: Questions 1-6
Lab 3 (Exercise VI): “Enumerating a Network Using SoftPerfect Network Scanner.”
1. Screenshots after Steps 8 and 11
Grading for this lab assignment will be based on the following rubric.
Click here to view the grading rubric
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more