Network penetration
Description
Having Trouble Meeting Your Deadline?
Get your assignment on Network penetration completed on time. avoid delay and – ORDER NOW
Learning Goal: I’m working on a cyber security multi-part question and need the explanation and answer to help me learn.
I have given all instructions of the assignment please complete all and rubric is below.
Need presentation, recording, and documentation.
Title: Network Penetration Testing with Kali Linux
Introduction: In this group assignment, you will immerse yourselves in the world of network penetration testing using Kali Linux, a powerful tool for ethical hacking and security assessment. Working in teams, you will plan, execute, and document successful penetration tests on two different target systems. Through this assignment, you will gain hands-on experience in identifying vulnerabilities, exploiting security weaknesses, and improving overall network security. Each team will record their work and create a presentation to showcase their penetration testing efforts.
Instructions:
- Team Formation:
- Form teams of 3 to 4 students each.
- Assign roles within your team, such as team lead, penetration tester, documentation coordinator, and presentation creator.
- Target Selection:
- Research and identify two different target systems (can be virtual machines) for penetration testing.
- Ensure that you have legal authorization to test the chosen systems.
- Penetration Testing:
- Utilize Kali Linux tools to perform successful penetration tests on both target systems.
- Document each step of your penetration testing process, including vulnerability identification, exploitation, and any post-exploitation activities.
- Work Recording:
- Record your team’s work as you perform the penetration tests on both target systems.
- Capture screenshots, terminal outputs, and other relevant evidence of your testing process.
- Presentation Creation:
- Create a presentation that showcases your penetration testing efforts.
- Include an introduction to your team, an overview of the target systems, details of vulnerabilities discovered, methods of exploitation, and recommendations for improving security.
- Each team member should participate in the presentation.
Page 2: Rubric
Criteria | Excellent (5) | Good (4) | Satisfactory (3) | Needs Improvement (2) | Poor (1) |
---|---|---|---|---|---|
Team Formation | Formed cohesive teams with well-defined roles and responsibilities | Formed teams with defined roles, though some roles were not well-defined | Formed teams with roles, but some members lacked clear responsibilities | Formed teams without clear roles and responsibilities | Did not form teams |
Target Selection | Chose two relevant and legally authorized target systems for penetration testing | Chose suitable target systems for testing, though some aspects could be improved | Chose target systems with limited relevance or authorization issues | Chose irrelevant target systems or without proper authorization | Did not choose target systems |
Penetration Testing | Successfully executed penetration tests on both target systems with clear documentation | Conducted penetration tests on both targets with good documentation, though some steps could be clearer | Conducted penetration tests with minor gaps in documentation or execution | Encountered difficulties in conducting penetration tests or lacked clear documentation | Did not conduct penetration tests |
Work Recording | Recorded comprehensive and well-organized evidence of the penetration testing process | Recorded evidence of the testing process with good organization, though some aspects could be clearer | Recorded evidence with gaps in organization or documentation | Recorded limited or unclear evidence of the testing process | Did not record evidence of the testing process |
Presentation Quality | Created a well-structured and engaging presentation covering all aspects of the assignment | Created a good presentation with clear organization and engagement | Created a presentation with satisfactory organization and engagement | Created a presentation with poor organization and engagement | Did not create a presentation |
Content Depth | Provided detailed and insightful content in the presentation with comprehensive explanations | Provided good content with insightful explanations, though some aspects could be more detailed | Provided content with basic explanations, lacking depth | Provided content with vague or inaccurate explanations | Did not provide sufficient content |
Team Collaboration | Demonstrated excellent collaboration among team members throughout the assignment | Demonstrated good collaboration, though some aspects could |
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.