Evaluate security testing tools in a computing environment


Assignment Title: Implementation and Evaluation of Penetration Testing Tools

Purpose: This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a. Implement and evaluate security testing tools in a realistic computing environment.

Purpose of the Assignment: The A ssignment1 focuses on implementing and evaluating security testing tools in a realistic computing environment. It helps the students to learn how to perform hacking/penetration testing. The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.

By doing this assignment, students will learn to evaluate and applies contemporary intelligent cyber security solutions for enterprise use which will definitely act as a stimulus for work integrating learning. By the end of the assignment, the students will have a strong base and a good understanding of hacking/penetration testing, so they can be able to combine the techniques learnt and tailor them to suit different scenarios. This assignment will be a stepping stone for the students to be work force ready for the booming cyber security industry.

Assignment Structure and submission guidelines: Assignment 1 being formative assessment is divided into two parts. In t he first part -Assignment 1a, focuses on hashes and passwords and implementation and evaluation of the major password attack tools available in Kali Linux that is marked for 5% of the total marks and the second part is an extension of first part along with understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools covering the remaining 10 % of the total marks. In the second part- Assignment 1b, the students are required to explore and evaluate 3 security scanners but not limited to scanners like N-Stalker, Searchsploit and Metasploit tools.

Assignment 1 Specifications:

For this Assignment 1, you will implement and evaluate 2 password cracking tools in Kali Linux and explore and evaluate 3 security scanners.

You have to write a report for Assignment 1a and for Assignment 1b, a report with video presentation on how you will perform and evaluate these penetration testing tools is required.

Assignment 1a: Implement and evaluate 2 password cracking tools in Kali Linux

Focus on the following points while making a report:

Demonstrate building a Software Test platform to evaluate 2 password cracking tools.

Why attack and Penetration Tools are important?

What are the attributes of Good Assessment Tool for Penetration Testing?

Assignment 1b: Explore and evaluate 3 Exploitation and Reverse Engineering security scanners

Focus on the following points while making a video presentation and report:

Addressing the feedback provided in Part 1 of the assignment.

Demonstrate understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools.

There are several security scanners available in the market. Justify why you choose to explore the 3 Exploitation and Reverse Engineering security scanners you will be evaluating?

The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.

You should demonstrate 3 security scanners in the video and draw a conclusion on your experience with the 3 security scanners you evaluated.

Note - Assignment 1b-800 words.

Our Cyber Security and Analytics Assignment Help service is available 24x7 to help you out from all your academic worries and woes.

Tags: Cyber Security and Analytics Assignment Help, Cyber Security and Analytics Homework Help, Cyber Security and Analytics Coursework, Cyber Security and Analytics Solved Assignments, Penetration Testing Tools Assignment Help, Penetration Testing Tools Homework Help

Attachment:- Cyber Security and Analytics.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Evaluate security testing tools in a computing environment
Reference No:- TGS03055599

Expected delivery within 24 Hours