Assessment Description Part I Creating a virtual environment allows students to learn ethical hacking in a safe and secure environment without the costly infrastructure often associated with technic
Our academic writers are ready and waiting to assist with any assignment you may have. From simple essays to full dissertations, you're guaranteed we've got a writing expert to perfectly match your needs.
Order a Similar Paper
Order a Different Paper
Creating a virtual environment allows students to learn ethical hacking in a safe and secure environment without the costly infrastructure often associated with technical labs. Within this lab, students will create an environment, that provides a legal and ethical platform in which to practice ethical hacking. View the “Overview and Lab 1 Build a Virtual Lab” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.
Utilizing the Student Success Center, create a virtual lab to include the following VMs:KaliKioptrix 1Kioptrix 2Metasploitable 2
The utilization of VMs to understand the principles of ethical hacking has become common within cybersecurity. In this assignment, we will walk through the basics of vulnerability analysis and show how a vulnerability can be exploited to gain root access to a system.
View the “Lab 3 Your First Hack Part 1 Lab” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.Utilizing the Kioptrix 1 VM, conduct a scan of the system from your Kali box to examine vulnerabilities within the system. After identifying and categorizing the vulnerabilities, conduct an analysis and mapping of the vulnerabilities.
- Perform an NMAP scan of the system.
- Create a slide presentation (8-10 slides) of your findings (screenshots) with an embedded video detailing the following:- Conduct the enumeration/footprinting of the Kioptrix 1 machine.- Provide at least 3 additional NMAP commands and screenshots not utilized in the lab video.- Explain flaw hypothesis methodology and provide a hypothesis based on your findings.- Create and apply a vulnerability map of a system.- Explain the flaws found, research at least two, and detail possible root causes of the flaws.- Include commands.
Refer to “CYB-610-RS-Build A Virtual Lab Scoring Guide” prior to beginning the assignment to become familiar with the expectations for successful completion.
APA style is not required, but solid academic writing is expected. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. You are not required to submit this assignment to LopesWrite.
Do you need help with this or a different assignment? In a world where academic success does not come without efforts, we do our best to provide the most proficient and capable essay writing service. After all, impressing professors shouldn’t be hard, we make that possible. If you decide to make your order on our website, you will get 15 % off your first order. You only need to indicate the discount code GET15.
Order a Similar Paper Order a Different Paper