{"id":367,"date":"2019-08-29T20:25:30","date_gmt":"2019-08-30T00:25:30","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/?page_id=367"},"modified":"2023-08-20T16:29:43","modified_gmt":"2023-08-20T20:29:43","slug":"labs","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/labs\/","title":{"rendered":"Labs"},"content":{"rendered":"<p><a href=\"https:\/\/security-assignments.com\/tutorials\/intro-to-gcp.html\">Lab 1: Google Cloud Platform<\/a> and <a href=\"https:\/\/security-assignments.com\/tutorials\/intro-to-linux.html\">Linux Tutorial<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_hashing_and_symmetric_encryption.html\">Lab 2: Symmetric Encryption and Hashing<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_asymmetric_encryption.html\">Lab 3: Asymmetric Cryptography<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_digital_certificates.html\">Lab 4: Digital Certificates<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_password_cracking.html\">Lab 5: Password Cracking<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_vulnerability_scanning.html\">Lab 6: Vulnerability Scanning<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_exploitation.html\">Lab 7: Vulnerability Exploitation<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_web_privacy_and_anonymity.html\">Lab 8: Web Privacy and Anonymity<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_social_engineering.html\">Lab 9: Social Engineering<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_malware.html\">(Optional &#8211; Not Graded) Lab: Malware Analysis<\/a><\/p>\n<p><a href=\"https:\/\/security-assignments.com\/labs\/lab_security_onion.html\">(Optional &#8211; Not Graded) Lab: Network Security Monitoring<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lab 1: Google Cloud Platform and Linux Tutorial Lab 2: Symmetric Encryption and Hashing Lab 3: Asymmetric Cryptography Lab 4: Digital Certificates Lab 5: Password Cracking Lab 6: Vulnerability Scanning Lab 7: Vulnerability Exploitation Lab 8: Web Privacy and Anonymity Lab 9: Social Engineering (Optional &#8211; Not Graded) Lab: Malware Analysis (Optional &#8211; Not Graded) [&hellip;]<\/p>\n","protected":false},"author":3172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-367","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/pages\/367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/users\/3172"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/comments?post=367"}],"version-history":[{"count":17,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/pages\/367\/revisions"}],"predecessor-version":[{"id":1032,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/pages\/367\/revisions\/1032"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002fall2025\/wp-json\/wp\/v2\/media?parent=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}