Assignment 2
Reading Assignment:Read about brute force, phishing, malware behavior, and lateral movement using MITRE ATT&CK or Microsoft Security documentation, then write one paragraph explaining how each attack appears in logs. Research Assignment:Research one real-world breach where phishing, brute force, malware, or lateral movement was involved, then summarize the attacker’s steps in simple timeline format. Hands-On Practice […]
Class Activity 2
You are given a mixed attack scenario log containing authentication logs, email logs, endpoint logs, and network logs. Tasks: Identify the attack type or attack types present in the logs. Trace the attacker’s steps in the correct order. Identify the affected user accounts. Identify the affected systems. Highlight at least five pieces of evidence from […]
Assignment 2
Reading Assignment Read about dashboard design principles and how dashboards are used in business intelligence. Research Assignment Research how companies use dashboards for executive decision-making and performance tracking. Hands-On Practice Task A retail company wants a dashboard to monitor its nationwide sales performance. The dataset includes product category, region, monthly sales, and transaction count. Using […]
Class Activity 2
A company provides a dataset containing sales, product categories, regions, and dates. Students should: Create KPI metrics Build Pivot Tables Insert interactive charts Add slicers Design a professional dashboard layout
Assignment 1
Reading Assignment Study how data visualization is used in business dashboards and executive reports. Research Assignment Research the differences between bar charts and column charts and explain when each should be used. Hands-On Practice Task A growing e-commerce company wants to present its quarterly sales performance to investors. The dataset includes product categories, monthly sales, […]
Class Activity 1
A retail company provides sales data across products and months. Students should: Create a column chart for product comparison Create a line chart for monthly trends Create a pie chart for sales distribution Create a bar chart for ranking products Apply best practices to improve clarity
Assignment 1
Reading Assignment:Read about common network ports (22, 80, 443, 3389) and explain their real-world use cases in cybersecurity. Research Assignment:Research how attackers perform port scanning and list 3 tools commonly used (e.g., Nmap) and how they appear in logs. Hands-On Practice Task:Analyze a provided network log dataset and identify at least one port scan and […]
