The key to this assignment is to demonstrate your


The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.
Please complete the scenario below following these guidelines for your deliverable.
• Your assignment must be a minimum of 2 pages double spaced, plus a title page and a reference page for a total of 4 pages.
• Make sure you are using at least two (2) academic references.

Scenario:

You have been hired as a consultant to perform a network security assessment for a large firm - you will be focusing on Footprinting and Scanning the organization. 
1. Describe the methodology and tools you would use to conduct your assessment. 
2. Give a rationale for each step in your methodology. 
******(Note: You are not limited to following the methodology/tools described in your textbook. If there are additional steps you would take in conducting your assessment, please list them and explain why you are taking them.)
Submission Instructions: 
• This submission should be created following APA 6th edition guidelines.
• The paper is to follow the APA style guide, Sixth Edition (available via bookstores). ? Also refer to APA's online resources: https://apastyle.apa.org/learn/tutorials/basics-tutorial.aspx
? and the APUS web site: https://www.apus.edu/Online-Library/tutorials/apa.htm

• Submit your assignment as a MSWord attachment.
• You will be required to run your paper through Turnitin.com, ensure that your similarity index is sufficiently low, and submit an originality report with your paper. 
Rubric for grading:
Methodology and Tools 50%
Rationale for Each Step 30%
Writing Conventions (Grammar and Mechanics)10%
Source 10% 

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: The key to this assignment is to demonstrate your
Reference No:- TGS01083784

Expected delivery within 24 Hours