Fictional corporate network comprising servers

Assignment Help Other Subject
Reference no: EM133796149

Penetration Testing

Assessment - Penetration Testing Simulation Video Entry

Recording Demonstrating a Simulated Penetration Testing Activity

Learning outcome 1: Evaluate appropriate countermeasures to mitigate the risk of unauthorised access, hacks and exploits to systems, networks, and applications.

Learning outcome 2: Investigate cyber-attack techniques on computer systems, networks, and web applications.

Learning outcome 3: Evaluate existing defensive security measures.

Your Task

This assessment is to be completed individually. In this assessment, you are tasked with conducting penetration testing of an organisation's IT environment. The objective is to identify and exploit cybersecurity vulnerabilities using a simulated network for the organisation, replicating a real-world scenario. This assessment will cover the fundamental concepts learned in the initial weeks of the subject, focusing on reconnaissance, vulnerability assessments, and footprinting.

Assessment Description

The objective of this assessment is to assess your practical skills in identifying, analysing, exploiting, documenting, and reporting cyber-attack vulnerabilities, focusing on the content covered in Weeks 1 to 3. This will include the following:
Reconnaissance and Information Gathering
Footprinting and Enumeration
Vulnerability Assessment
Demonstration of Exploitation

In this assessment:
You will simulate a penetration testing exercise using tools and systems relevant to penetration testing in a controlled lab environment that simulates a computer system, network, or web application. Book your online assignment help today
Submit a video recording of the simulated penetration testing exercise.
The simulated exercise will include tasks related to:
Utilising Kali Linux and penetration testing tools to perform the simulated penetration testing scenario.
Conducting Reconnaissance and vulnerability assessments using Kali Linux tools.
Pick only ONE vulnerability based on your vulnerability assessment, exploit the vulnerability, and show the methods and strategies used.
Provide recommended Mitigation measures based on concepts.

Target System

The simulation will involve a fictional corporate network comprising servers, databases, and web applications. The network is structured with various departments interconnected through a centralised server architecture.

Assessment Practical Business Purpose
This assessment is designed to equip you with basic practical penetration testing skills which are essential for securing organisations' digital assets and infrastructure.
The assessment aligns with real-world scenarios where penetration testers are tasked with identifying and exploiting vulnerabilities to strengthen an organisation's security posture.
This assessment therefore prepares you for cybersecurity roles that require you to proactively identify, exploit and mitigate security vulnerabilities in different organisations.
Assessment Targeted Audience
This assessment is useful for any aspiring penetration tester, cybersecurity professionals, and organisations looking to strengthen their security teams by hiring individuals with hands- on penetration testing experience.
Doing this assessment will equip you with the necessary hands-on penetration testing experience needed for you to contribute positively to different roles in different organisations.

Reference no: EM133796149

Questions Cloud

Which level is the student currently performing : Which level is the student currently performing? Is your student below the appropriate level of moral or psychosocial development as well?
Role of a leader should assume more human connection : We need less technology and more human interaction. The role of a leader should assume more human connection.
Application of one analytics method : Students are required to investigate the application of one analytics method to an industry and document their findings as a report
Role of women in conflict resolution and peacebuilding : The Role of Women in Conflict Resolution and Peacebuilding: How women contribute to resolving tribal conflicts and the challenges they face in these roles.
Fictional corporate network comprising servers : TECH5100 Penetration Testing - Evaluate appropriate countermeasures to mitigate the risk of unauthorised access, hacks and exploits to systems, networks
How it correlates the topic with the varable human rigths : Give an overview of the tropic and how it correlates the topic with the varable human rigths, social justice and mental health.
Discuss existing tension between development and environment : Discuss the existing tension between development and the environment. Development brings economic growth as well as social and environmental changes.
How does social media impact our education : How does social media impact our education and understanding of domestic violence? What are two new take-aways you have after taking this class?
How is multiculturalism defined : How is multiculturalism defined? How do the terms integration and assimilation fit into a multicultural society?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd