Malware analyser to perform deep analysis

Assignment Help Computer Engineering
Reference no: EM133998357 , Length: Word Count:750

Assessment 1:

Introduction
You will submit work in tutorial activities during the study period. This is an individual assessment.
The following are laboratory activities (tutorial) that you are to perform and submit weekly.

Tutorial 1:
Analyze and explain the malware reports on the following website:
Explain deep inspection analysis.
Tutorial 2:
Analyze and explain the malware reports on the following website:
Cuckoo.cert.ee
Explain deep inspection analysis.

Tutorial 3:
Watch and following an introduction video on Microsoft Defender.

Explore and explain Microsoft Defender features and activities as per the youtube videos and features.

Tutorial 4-5
Create Intune Free Account intune.microsoft.com (may need to signup via the MS Evaluation Software)
Create a Device Policy
Create an App Policy
Create a Provisioning Policy
Create a Managed Device - Compliance Policy
Note: You will need an Outlook account (create one for free). Free account cannot enroll a device (e.g. Win 11 virtual machine). Hence, just go
through the setup configurations.

Tutorial 6
Create Entra Free Account entra.microsoft.com
Create Users
Go through the Identity, Identity Governance, and Protection Tabs and explain how they can be used.

Assessment 2:

Introduction
Assignment 1 is an individual video assessment. You will use Malware Analyser to perform deep analysis on a suspected file (e.g. a file from virus
vault) and determine if the file is malicious.
Your video will be 6-8 minutes long. You may be required to perform a face-to-face questions and answers.
Warning: Only do this in a virtual environment. See the laboratories for details.
In a Windows Machine with Cuckoo.cert.ee or joesandboxcloud.com or any.run (need to sign up) download a malware file from one of the following
links. Perform a security deep inspection analysis or deep-dive. In a Sandbox (only in a sandbox in a virtual machine) on malware and determine how the machine is detected.
Explain your steps in the video. No AI shortcuts — Only authentic assignment help from real expert tutors.
Explain what you have achieved and how detection was measured.
Explain how a malware would not be detected with regards to your analysis.
Explain how you determined it was a malicious file (e.g. explain the processes or network packets it tried to execute)

Assessment 3:

Introduction
This is an individual assessment. You will deploy a Software Deployment Server (e.g. Microsoft System Centre Configuration Manager (SCCM) or the
new End Point Manager or Open Source,
You will set up a virtual environment (see laboratories for details).
You will deploy the Software Deployment Software and demonstrate and explain software deployment, configurations and end-point health and
security posture. In addition to adding a client (e.g. Ubuntu/Windows) to OSPI and pushing out an agent and deploying software.
You will submit a video with your face(s) (compulsory) and your voice(s) explaining the steps, and justification and show the Software Deployment
Software pushes out applications updates, patches, code, etc.

Reference no: EM133998357

Questions Cloud

Descriptive statistics relative to the sample population : Descriptive statistics relative to the sample population or survey findings (mean, median, mode, standard deviation)
What is the prevalence ratio of tb infection for july : What is the prevalence ratio of TB infection for July (per 100 residents)? What is the incidence rate of TB infection for that year (per 100 residents)?
Significant area of liability for nurse practitioners : Diagnosis-related allegations represent a significant area of liability for nurse practitioners (NPs). Diagnosis-related allegations can stem from factors
List at least one healthy fat and give one example of a food : What types of fats (fatty acids) are the most healthy? List at least one healthy fat and give one example of a food Bob should add to his diet.
Malware analyser to perform deep analysis : ITSC2003 Security Threat Management, VIT Australia - Malware Analyser to perform deep analysis on a suspected file
How many grams of fat should bob consume : Bob's recommended calorie intake is 2000 calories a day and his goal is to consume 30% of his calories from fat. How many grams of fat should Bob consume?
How you would ensure their consent and cultural safety needs : Discuss your approach to preparing a client for a nursing procedure, including how you would ensure their consent, cultural safety needs, privacy, and dignity.
How can you transform past experience into new opportunities : How can you transform past experiences into new opportunities for facilitating a caring environment and relationships?
What is the best response by the nurse : A child has been diagnosed with Type 1 Diabetes Mellitus (DM) and the parent asks the nurse what this means. What is the best response by the nurse?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd