Performing a Security Assessment

Performing a Security Assessment  

A security assessment of a network infrastructure provides an organization a way to identify vulnerabilities before they can become a security threat.

1. Use your Kali Linux virtual machine (VM) environment as your security assessment platform.

2. Using Nmap, perform a network scan of your virtual network (a minimum of two targets will be added). Ensure that you fingerprint both the OS and services for each of the target

3. Using OpenVAS, perform a vulnerability scan on both of the targets in your virtual network. Recommend to your organization methods to eliminate the vulnerabilities.

4. As you go, take instructional notes and screenshots that will help to reproduce your process. Refer to the “Report Template,” located within the course materials.

In a 200- to 250-word essay, explain the difference between vulnerability scanning and penetration testing.

APA style is not required, but solid academic writing is expected.


Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Title Page
Place an Order

Calculate your paper price
Pages (550 words)
Approximate price: -