Reference no: EM132590405 , Length: word count:500
MN623 Cyber Security and Analytics - Melbourne Institute of Technology
Assessment - Implementation and evaluation of penetration testing tools
Learning Outcome 1: Implement and evaluate security testing tools in a realistic computing environment
Purpose of the Assignment:
The Assignment 1 focuses on implementing and evaluating security testing tools in a realistic computing environment. It helps the students to learn how to perform hacking/penetration testing. The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.
By doing this assignment, students will learn to evaluate and applies contemporary intelligent cyber security solutions for enterprise use which will definitely act as a stimulus for work integrating learning. By the end of the assignment, the students will have a strong base and a good understanding of hacking/penetration testing, so they can be able to combine the techniques learnt and tailor them to suit different scenarios. This assignment will be a stepping stone for the students to be work force ready for the booming cyber security industry.
Assignment 1 b Specifications and Submission Guidelines
Length of Video: The total length of the video presentation should not be more than 9 minutes (marks would be deducted for over-length presentation).
You may use any of the available open source software for making video presentation.
Submission Guidelines:
1. Name your video with your student number and name.
2. Upload Video on your Youtube account
3. Copy the Video Link to a file (worddocument) and
4. Upload the word document with only the video link in the Assignment 1b into the MOODLE
To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), you already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the 'upload' button located at the top right-hand corner of your youtube.com webpage. To keep your uploaded video unsearchable by people so that random people cannot view your video(s), you have to select the privacy mode from the drop-down menu on the upload screen to be ‘Unlisted'. This way, your video is viewable by only those who have got the URL of your video. Make sure you copy and paste your video URL in the file submitted on MOODLE for your marker to be able to watch and mark it.
Assignment 1a
1) Describe the 7 penetration testing phases in detail?
2) What are the industry leading tools used for penetration testing?
3) Demonstrate building a Software Test platform to implement and evaluate security testing tools.
Assignment 1b
1) Addressing the feedback provided in Part 1 (Assignment 1a) of the assignment
2) There are several security scanners available in the market. Justify why you choose to explore the 3 security scanners you will be evaluating after reviewing a minimum of 5 security scanners?
3) The students will implement and demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system using the 3 security scanners you choose, and how to secure the system from the discussed weaknesses.
4) Demo and Viva will be conducted in week 6 and week 7 lab classes.
Note: only assignment part 1 a question 1 and question 2 with ieee references.
Attachment:- Cyber Security and Analytics.rar