-18%

NEW SOLUTION-CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

$325.99$395.99

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Assignment Week 1: Discussion – Final Project Ideas Assignment

CYBR-260 Week 1: Assignment – Project Proposal Assignment

 

Description

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

>>>>>>>You can get help with this course from scratch by everything done for you afresh @150 per week

CYBR-260 Assignment Week 1: Discussion – Final Project Ideas Assignment,

CYBR-260 Week 1: Assignment – Project Proposal Assignment,

CYBR-260 Week 1: Programming Assignment Assignment,

CYBR-260 Week 2: Discussion – Program Design Assignment,

CYBR-260 Week 2: Programming Assignment Assignment,

CYBR-260 Week 3: Discussion – Data and Manipulations Assignment,

CYBR-260 Week 3: Assignment – Design Documentation Next Stage Assignment,

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 3: Programming Assignment Assignment,

CYBR-260 Week 4: Discussion – Network Functionality Assignment Midpoint,

Course CYBR-260 Feedback Survey Assignment,

CYBR-260 Week 4: Programming Assignment Assignment,

CYBR-260 Week 5: Discussion – System Interaction and Exceptions Assignment,

CYBR-260 Week 5: Assignment – Update Design Document Assignment,

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 5: Programming Assignment Assignment,

CYBR-260 Week 6: Discussion – Persistent Storage Assignment,

CYBR-260 Week 6: Programming Assignment Assignment,

CYBR-260 Week 7: Discussion – Project Retrospective Assignment,

CYBR-260 Week 7: Assignment – Final Design Document Assignment,

CYBR-260 Week 7: Final Project Submission Assignment,

CYBR-260 Week 7: Programming Assignment

 

NEW SOLUTION-CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 1: Discussion – Final Project Ideas

For this class you will have a final project that you will start thinking about in week 1 and as the class goes you will slowly design and implement it.  For your final project you are to think about a security-oriented problem you might like to solve using Python.  Use this discussion to clearly describe the problem here and why you think Python may be the right way to solve it. What different Python modules, data and data types would you be using? What type of networking would your project entail?  Use suggestions from others — either in their proposals or comments on yours — to evolve your idea during this week.

See more information on the final project in the Final Project Submission assignment under the assignments tab.  As described there, your assignment will be graded on the following:

  • Completeness: Does it do what you designed it to do according your FINAL design document.  In other words, if you change things throughout the course, update your Final Design Document to incorporate your changes.
  • It would ideally solve some security related problem but if you have some purpose that a Python program can help you solve that is not entirely security related, as long as you pertain to at least the next requirements you should be fine.
  • Your program contains some networking element.  This includes but is not limited to:
    • Client/Host communication
    • Port scanning
    • Network tracing
    • Emailing some content through external email server
    • Logging into some remote system view telnet/ssh
  • Your program should have some file interaction, which should include EITHER input from a file (e.g., database), or output to a file (e.g., database, xml, text file, etc).

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Sunday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 1: Assignment – Project Proposal

Begin to document the project that you want to do over the course of this term. You will have a chance to evolve the project over the term so don’t feel as though you are going to have your feet nailed to the floor based on this proposal. Include the following sections in your proposal.

  • Introduction (Problem description)
  • Major Features and Solution Overview (how might you go about solving the problem at a high level?)
  • Data Needs (data you will need to capture, manipulate, etc and the data types that may be associated with it)
  • Conclusion

Things to keep in mind is your project needs to also include some networking functionality as well as some input/output, ideally to a file for persistent storage.  You don’t have to include design for them this week; we will cover them later in the class and you will design for them then.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 1: Programming Assignment

Write a Python program requesting a name and three numbers from the user. The program will need to calculate the following:

  • the sum of the three numbers
  • the result of multiplying the three numbers
  • divide the first by the second then multiply by the third

Print a message greeting the user by name and the results of each of the mathematical operations.

You must provide a comment block at the top indicating your name, the course, the section, and the date as well as a description of the program. Also, comment as necessary to clearly explain what it is you are doing where you are doing it in the program.

Provide your .py file and a screen capture or just plain text output demonstrating the successful running of the program.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 2: Discussion – Program Design

Hopefully you have focused in on a project you want to write at this point. Provide a brief overview of your project. Then, provide a list of functions you think you may need to write and what those functions would do. How do they fit into the overall project?

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Sunday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 2: Programming Assignment

This week, you will write another program. This time, you will do the same thing twice.

First, take a set of 6 grades from a user and average them. Provide the average to the user. You need to check to make sure the grades are within the normal range. If the grade is less than 0 or more than 100, issue a warning to the user. You don’t need to take the grade again, just let the user know.

Second, ask the user how many grades they have. Ask for all the grades and again provide an average. Make sure to check that the grades are within the normal range as above and issue a warning to the user.

For any function you use, use the following comment block as before the function to document it.

# function: name

# purpose:

# inputs:

# returns:

Fill in the sections as necessary for what you are doing. Document your code as in your previous programming assignment, including the attribution block indicating your name, class, etc. Include text or screen captures indicating your program works.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 3: Discussion – Data and Manipulations

As you think about your program, provide a brief overview of what you are trying to accomplish as well as any data and relevant data types you expect to use. In what ways do you think you will need to transform this data? How might you accomplish that?

Provide feedback and ideas to other students.

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Sunday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 3: Assignment – Design Documentation Next Stage

Take your existing proposal, which you are building into design documentation, and add a section on data, data types and transformations you expect to be using. Add in a list of functions that you expect to be using and what they would do. Include inputs and outputs (what do you pass in, what do you return, if anything in either case). Refine and alter anything in your original proposal based on what you have been thinking about from the last couple of weeks. You will keep iterating on this as you learn more about Python and its capabilities through the term.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 3: Programming Assignment

Take the master boot record from this week’s module and use it as a file input for your program. It will be named block.dd and you can assume that it’s in your current directory so you don’t have to provide a path to it. Make sure that you copy it into the directory where your Python file is located or your program will fail.

Use the information in the Wikipedia entry for Master Boot Record (Links to an external site.) to write a program that will parse a portion of the partition table. The first partition entry is located at the address 1BE (hex). Print out the status byte (1 byte located at the starting address), the partition type (1 byte located at the address 1BE + 4) and the address of the first sector in the partition (1BE + 8).

All the same rules about the attribution of name, course, etc at the top of your program, documenting your code and including a documentation block before all of your functions.

Submit your program and text or screen capture indicating that it worked.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 4: Discussion – Network Functionality

What network functionality will you be using in your project? What networking functionality could you be using and why might you not use that? What Python libraries and functions would you be using to accomplish the networking piece of your program?

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Sunday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 4: Programming Assignment

This week, you are going to build on the program from last week. Use the same file from last week. You will be extracting the first partition entry from the master boot record that is contained in the file. The first partition entry starts at offset 0x1BE and ends at 0x1CD. Pull that chunk of bytes out of the file provided and send it to the server software that you will write. The server will listen for the chunk of data and print out the status of the drive, the partition type and the starting address of the partition as an integer.

You can refer to Wikipedia (Links to an external site.) for additional details about offsets within the master boot record and partition table for the pieces of information you are looking for.

As with previous weeks, include an attribution block at the top of the programs you are writing. Document what you are doing in comments, use variable names that help with your documentation and provide a comment preamble before any function that you write.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 5: Discussion – System Interaction and Exceptions

What system interaction will your program need? What about exceptions? Are there places that you think you may need to handle exceptions? Describe the circumstances for both possibilities. If you didn’t originally conceive of system interaction or even registry interaction, how might you add that into your program (even if you don’t eventually end up doing it)? What could you do there and how would you do it?

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Sunday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 5: Assignment – Update Design Document

Take your existing design document and add in descriptions of your network functionality. What data will you be sending, how will you handle it, what parsing and mangling will you need to do? Will you be doing any system interaction? Document any functions you believe you will need to handle your network and system interaction.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 5: Programming Assignment

Write a program that takes a value from a user and stores it in the registry. You can use any key name that you like but also store the current time as another value inside of your new key. Finally, get a directory listing of your current working directory and store that value. You may need to use REG_MULTI_SZ for that value.

Include your attribution block at the top of the program. Make sure you are documenting your program and including preamble comments before any functions that you create. Use self-documenting variable names.

Submit the Python script and a screen capture indicating that the registry entry was created.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 6: Discussion – Persistent Storage.

How would you use persistent storage like a database in your project? What sorts of tables might you use? Would this be more efficient for what you are doing than just using flat files? Would XML be a better approach for you? Why or why not? If you don’t currently have persistent storage planned into your project, how might you extend your project to include it (even if you don’t actually implement)? Then answer all the above questions assuming that you would use it.

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Sunday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 6: Programming Assignment

In this week’s module, you will find a History database  Download History database that was taken from Google Chrome. You will be using this History file to get the list of Web addresses that the user has visited.

You will write a program that will take this database file and extract the Web addresses that the user visited, the number of times the page was visited and the last time it was visited. The last time will not be readable by humans but you don’t have to worry about converting it for the purposes of this program. The schema from the database is below. Find the correct table that you need to query and the correct columns from that table.

Include the attribution block and document your code. Use self-documenting variable names. Make your output look presentable and also make sure that it can be understood by someone who doesn’t know what the purpose of the program is (in other words, don’t just dump the output to the screen without some description of it somewhere in the output).

CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY, value LONGVARCHAR);

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CREATE TABLE urls(id INTEGER PRIMARY KEY,url LONGVARCHAR,title LONGVARCHAR,visit_count INTEGER DEFAULT 0 NOT NULL,typed_count INTEGER DEFAULT 0 NOT NULL,last_visit_time INTEGER NOT NULL,hidden INTEGER DEFAULT 0 NOT NULL,favicon_id INTEGER DEFAULT 0 NOT NULL);

CREATE TABLE visits(id INTEGER PRIMARY KEY,url INTEGER NOT NULL,visit_time INTEGER NOT NULL,from_visit INTEGER,transition INTEGER DEFAULT 0 NOT NULL,segment_id INTEGER,visit_duration INTEGER DEFAULT 0 NOT NULL);

CREATE TABLE visit_source(id INTEGER PRIMARY KEY,source INTEGER NOT NULL);

CREATE INDEX visits_url_index ON visits (url);

CREATE INDEX visits_from_index ON visits (from_visit);

CREATE INDEX visits_time_index ON visits (visit_time);

CREATE TABLE keyword_search_terms (keyword_id INTEGER NOT NULL,url_id INTEGER NOT NULL,lower_term LONGVARCHAR NOT NULL,term LONGVARCHAR NOT NULL);

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CREATE TABLE downloads (id INTEGER PRIMARY KEY,current_path LONGVARCHAR NOT NULL,target_path LONGVARCHAR NOT NULL,start_time INTEGER NOT NULL,received_bytes INTEGER NOT NULL,total_bytes INTEGER NOT NULL,state INTEGER NOT NULL,danger_type INTEGER NOT NULL, interrupt_reason INTEGER NOT NULL,end_time INTEGER NOT NULL,opened INTEGER NOT NULL,referrer VARCHAR NOT NULL,by_ext_id VARCHAR NOT NULL,by_ext_name VARCHAR NOT NULL,etag VARCHAR NOT NULL,last_modified VARCHAR NOT NULL, mime_type VARCHAR(255) NOT NULL DEFAULT “”, original_mime_type VARCHAR(255) NOT NULL DEFAULT “”);

CREATE TABLE downloads_url_chains (id INTEGER NOT NULL,chain_index INTEGER NOT NULL,url LONGVARCHAR NOT NULL, PRIMARY KEY (id, chain_index) );

CREATE TABLE segments (id INTEGER PRIMARY KEY,name VARCHAR,url_id INTEGER NON NULL);

CREATE INDEX segments_name ON segments(name);

CREATE INDEX segments_url_id ON segments(url_id);

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 7: Discussion – Project Retrospective

Reflect back on the process of creating your project. How did your plans change through the course of the term? What did you learn along the way that may have altered the way you viewed your project? Did you run into any significant road blocks? What were they and how did you handle them? How might you have done things differently now that you are at an end (ie, lessons learned)?

Please submit your initial post by Wednesday at 11:59 pm and all follow-up posts by Friday at 11:59 pm. The discussions grading rubric is used for this assignment.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 7: Assignment – Final Design Document

Add any design details for persistent storage and any application layer network communications to your ongoing design document. How do you use them, what functions and variables are you going to use? Clean up anything from past submissions. Submit your final design document here.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 7: Final Project Submission

Submit your final project here. You will be working on designing and developing this program through the entire course. The program you turn in needs to match the final design document you submit and have been working on during the term. Functionality in the final design document needs to be in your final project. All of the documentation standards will be in play here, just as they have been in the weekly programming assignments.

Your assignment will be graded on the following:

  • Completeness: Does it do what you designed it to do according to your FINAL design document.  In other words, if you change things throughout the course, update your Final Design Document to incorporate your changes.
  • It would ideally solve some security related problem but if you have some purpose that a Python program can help you solve that is not entirely security related, as long as you pertain to at least the next requirements you should be fine.
  • Your program contains some networking element.  This includes but is not limited to:
    • Client/Host communication
    • Port scanning
    • Network tracing
    • Some form of Web Site Spidering/connecting
    • Emailing some content through external email server
    • Logging into some remote system view telnet/ssh
  • Your program should have some file interaction, which should include EITHER input from a file (e.g., database), or output to a file (e.g., database, XML, text file, etc).
  • The rubric for grading this assignment is below.

CYBR-260: SECURITY SCRIPTING WITH PYTHON-ENTIRE COURSE HELP-CHAMPLAIN COLLEGE

CYBR-260 Week 7: Programming Assignment

Write a program that gets the root document (“/”) from catalog.champlain.edu (Links to an external site.) and extracts every line that has an anchor tag, indicating that it’s a hyperlink to another page. The anchor tag will start with <a so you can search for that. Ideally, include a space after the a so you only get the anchor tags.

Create a Sqlite database sending in the following query at the beginning of your program if the database doesn’t exist (use the os module to check to see if a file exists).

CREATE TABLE storage(curtime TEXT, line TEXT)

You can use the following query to insert values into the database:

INSERT INTO storage (curtime, line) values (”, line);

With appropriate values for your values. You will need to create a string by concatenating your values before you pass the INSERT statement into the execute method. There are a number of ways to do this, so be sure to look up examples online.. You should be getting the current time each time you enter a value into the database and pass that in for the value of curtime. The following will get you the current time with high precision.

import datetime

current_time = datetime.datetime.now().time()

Use all the same documentation requirements you have been using and submit your program here.