Penetration testing provides valuable insight into how a system or network performs from the outside in. In this assignment, students will take the lead on a basic penetration test to gain valuable in

Get perfect grades by consistently using www.customizedassignments.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Penetration testing provides valuable insight into how a system or network performs from the outside in. In this assignment, students will take the lead on a basic penetration test to gain valuable information in order to provide a defensive strategy to mitigate vulnerabilities. View the “Lab 5 Challenge Your Hacking Skills” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.

Create an 8- to 10-minute PowerPoint presentation with an embedded video. Show professionalism in your speech and appearance. Use an online video platform such as Loom, YouTube, or Vimeo to upload your completed video. Ensure that others can access and view your linked video prior to submitting it to the LMS. In the video, be sure to detail the following, using screenshots:

Part A

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now
  • Explain how you would plan, organize, and perform penetration testing on your Metasploitable 2 VM.
  • Provide a brief summary of why a penetration test is valuable to an organization.
  • Describe how you would handle failures in following procedures.

Part B

Utilizing your Kali VM, conduct the following scans against your Metasploitable 2 VM and provide screenshots in your video:

  • NMAP Scan
  • Nikto Scan
  • OWASP – Zap scan
  • Nessus

Part C

  • Perform a risk assessment and gap analysis based upon your findings from the second scan and current trends in cybersecurity.
  • Propose and analyze countermeasures to mitigate vulnerabilities.
  • Describe your expected results.
  • Explain how your strategy to establish mitigation of the vulnerabilities identified in your scans.
  • Explain how strategy reduces risk and hardens your system.

Part D

  • Login locally to your Metasploitable 2 VM ( msfadmin: msfadmin) and implement at least three of the changes described in Part C and rerun your Nessus vulnerability scan.

Part E

  • Explain why you chose to implement the changes you did (cost, expedience, criticality).
  • How were your expected results different from your actual results?
  • What are some lessons learned from hardening your system?

Note: Retain a copy of this assignment for the “Business Continuity Plan,” which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.

APA style is not required, but solid academic writing is expected. This assignment uses a rubric. Please review the rubric before beginning the assignment to familiarize yourself with the expectations for successful completion. You are not required to submit this assignment to LopesWrite.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

1.3: Conduct risk assessments and evaluate vulnerabilities, threats, and gaps in an organization’s infrastructure to identify appropriate security measures to reduce risks’ impact to business processes.

Writerbay.net

Hi, student! You are probably looking for a free essay here, right? The most obvious decision is to order an essay from one of our writers. It won’t be free, but we have an affordable pricing policy. In such a manner, you can get a well-written essay on any topic, and then can use it for citing, paraphrasing, or as a template for your paper. Let us cover any of your writing needs!


Order a Similar Paper Order a Different Paper