|Performing a Security Assessment|
A security assessment of a network infrastructure provides an organization a way to identify vulnerabilities before they can become a security threat.
1. Use your Kali Linux virtual machine (VM) environment as your security assessment platform.
2. Using Nmap, perform a network scan of your virtual network (a minimum of two targets will be added). Ensure that you fingerprint both the OS and services for each of the target
3. Using OpenVAS, perform a vulnerability scan on both of the targets in your virtual network. Recommend to your organization methods to eliminate the vulnerabilities.
4. As you go, take instructional notes and screenshots that will help to reproduce your process. Refer to the “Report Template,” located within the course materials.
In a 200- to 250-word essay, explain the difference between vulnerability scanning and penetration testing.
APA style is not required, but solid academic writing is expected.