Footprinting gathers any information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls. This process usually takes place in the form of open-source footprinting, and the information is often garnered from a public website that is accessed legally.For this activity, complete the following lab:Data Gathering and Footprinting Protection Plan.Submit your completed lab in Blackboard.To complete this assignment, review theLab Guidelines and Rubric document.
Port scanning uses network tools to identify any open security risks by utilizing ethical hacking to understand the risks. Various equipment is used to hack the system in a nonintrusive manner in order to identify these risks.For this activity, complete the following lab:Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation.Submit your completed lab in Blackboard.To complete this assignment, review theLab Guidelines and Rubricdocument.
ISE 620 Lab Guidelines and Rubric Overview: Each lab will be a valuable real-world experience utilizing network security tools to evaluate the security posture of an organization. You will use network security tools to identify security risks and vulnerabilities within an organization’s network. Your analysis will be instrumental in helping you identify remediation strategies to mitigate the security vulnerabilities identified. These labs and the problems in them are not directly related to your final project. Your focus will be on accurately completing and submitting all aspects of the lab so that your instructor can coach you on the skills you need to develop in this course. The feedback you receive from your instructor on these labs is important for you to hone these skills prior to beginning work on the various milestones for your final project. Prompt: Your lab assignments are set up for you to analyze network security tools and document the results within a virtual environment. Your evaluation of the network tools will require you to launch specific software applications, enter commands, and take screenshots of your results to submit as part of your lab. You will be required to configure network hardware and software components in order to mitigate security risks and vulnerabilities. You will export the documents from the lab environment, combine them into a single document, and submit the document via Blackboard for grading. Each lab has specific instructions within the lab itself. Each of your lab submissions will be scored according to the following critical elements: A. Accuracy in Use of Tool The elements of the exported lab should have minimal or no functional issues in accuracy. B. Completion of Lab Elements All aspects of your lab should be completed. C. Conclusions Your documentation, including all post-lab questions for the data collected, has minimal or no functional issues in accuracy. Guidelines for...
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here