Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Assessment Description Part I Creating a virtual environment allows students to learn ethical hacking in a safe and secure environment without the costly infrastructure often associated with technical

Assessment Description

Part I

Creating a virtual environment allows students to learn ethical hacking in a safe and secure environment without the costly infrastructure often associated with technical labs. Within this lab, students will create an environment, that provides a legal and ethical platform in which to practice ethical hacking.  View the "Overview and Lab 1 Build a Virtual Lab" video within the "Video Playlist: Penetration Testing and Risk Management," located in the topic Resources.

Utilizing the Student Success Center, create a virtual lab to include the following VMs:

- Kali

- Kioptrix 1

- Kioptrix 2

- Metasploitable 2

Part II

The utilization of VMs to understand the principles of ethical hacking has become common within cybersecurity. In this assignment, we will walk through the basics of vulnerability analysis and show the ease with which a vulnerability can be exploited to gain root access to a system.

View the "Lab 3 Your First Hack Part 1 Lab" video within the "Video Playlist: Penetration Testing and Risk Management," located in the topic Resources.Utilizing the Kioptrix 1 VM, conduct a scan of the system from your Kali box to examine vulnerabilities within the system. After identifying and categorizing the vulnerabilities, conduct an analysis and mapping of the vulnerabilities.

  • Perform an NMAP scan of the system.
  • Create a slide presentation (8-10 slides) of your findings (screenshots) with an embedded video detailing the following:- Conduct the enumeration/footprinting of the Kioptrix 1 machine.- Provide at least 3 additional NMAP commands and screenshots not utilized in the lab video.- Explain flaw hypothesis methodology and provide a hypothesis based on your findings.- Create and apply a vulnerability map of a system.- Explain the flaws found, research at least two, and detail possible root causes of the flaws.- Include commands.

Refer to "CYB-610-RS-Build A Virtual Lab Scoring Guide" prior to beginning the assignment to become familiar with the expectations for successful completion.

APA style is not required, but solid academic writing is expected. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. You are not required to submit this assignment to LopesWrite.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question