SlideShare a Scribd company logo
1 of 4
Assignment Content
A Penetration Tester evaluates the security of an information
infrastructure by intentionally, and safely, exploiting
vulnerabilities.
Take
on the role of Penetration Tester for the organization you chose
in Week 1.
Use
the
Penetration Testing Plan Template
to create a 3- to 4-page Penetration Testing Plan for the
organization you chose.
Research
and
include
the following:
Pentest Pre-Planning
Engagement timeline: Tasks and who performs them
Team location: Where will the penetration team execute their
tests?
Organization locations tested: multiple locations, countries
(Export restrictions and government restrictions)
Which pentest technologies will be used? Consider the
following as you research options:
Scanning Tools: Nmap, Nikto
Credential Testing Tools: Hashcat, Medussa, John the Ripper,
Cain and Abel
OSINT Tools: Whois, TheHarvester
Wireless Tools: Aircrack-ng, Kismet
Networking Tools: Wireshark, Hping
What client personal are aware of the testing?
What resources provided to pentest team?
Test Boundaries:
What is tested?
Social engineering test boundaries? What is acceptable?
What are the boundaries of physical security tests?
What are the restrictions on invasive pentest attacks?
What types of corporate policy affect your test?
Gain Appropriate authorization (Including third-party
authorization)
Pentest Execution Planning: Given the scope and constraints
you developed in your Pentest Pre-Plan, plan the following
pentest execution activities
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Pentest Analysis and Report Planning:
Analyze pentest results
Report pentest results
Note:
The page assignment length requirement applies to the content
of the assignment. Start the assignment with an APA formatted
title page and add a reference section with at least two
professional references. Use the references in the text of the
assignment. For assignments that require use of the template,
insert the completed template into the APA document. Delete
the assignment instructions from the document. This will
improve the originality score from Safe Assign. Make sure to
check the SafeAssign originality score.
Submit
the assignment.

More Related Content

Similar to Assignment ContentA Penetration Tester evaluates the secur.docx

Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWshyamuop
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWshyamuopfive
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?Bhavin Shah
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky
 
Apply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docxApply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docxjesuslightbody
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Jorge Orchilles
 
List of Penetration Testing Tools -.ppt
List of  Penetration Testing Tools -.pptList of  Penetration Testing Tools -.ppt
List of Penetration Testing Tools -.pptjoe reese
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.Rahul Sasi
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfDipak Tiwari
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkillijtsrd
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityPanda Security
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals211 Check
 

Similar to Assignment ContentA Penetration Tester evaluates the secur.docx (20)

Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency Principles
 
Apply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docxApply OSINT Research and Presentation [due Day 7]Assignment.docx
Apply OSINT Research and Presentation [due Day 7]Assignment.docx
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
List of Penetration Testing Tools -.ppt
List of  Penetration Testing Tools -.pptList of  Penetration Testing Tools -.ppt
List of Penetration Testing Tools -.ppt
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.APT Targeting Indian Police Agencies.
APT Targeting Indian Police Agencies.
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
STIX2-TAXII2_Update
STIX2-TAXII2_UpdateSTIX2-TAXII2_Update
STIX2-TAXII2_Update
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 

More from williejgrant41084

Assignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docxAssignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docxwilliejgrant41084
 
Assignment ContentMany different threats can arise to the .docx
Assignment ContentMany different threats can arise to the .docxAssignment ContentMany different threats can arise to the .docx
Assignment ContentMany different threats can arise to the .docxwilliejgrant41084
 
Assignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docxAssignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docxwilliejgrant41084
 
Assignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docxAssignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docxwilliejgrant41084
 
Assignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docxAssignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docxwilliejgrant41084
 
Assignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docxAssignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docxwilliejgrant41084
 
Assignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docxAssignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docxwilliejgrant41084
 
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxAssignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxwilliejgrant41084
 
Assignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docxAssignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docxwilliejgrant41084
 
Assignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docxAssignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docxwilliejgrant41084
 
Assignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docxAssignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docxwilliejgrant41084
 
Assignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docxAssignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docxwilliejgrant41084
 
Assignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docxAssignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docxwilliejgrant41084
 
Assignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docxAssignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docxwilliejgrant41084
 
Assignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docxAssignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docxwilliejgrant41084
 
Assignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docxAssignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docxwilliejgrant41084
 
Assignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docxAssignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docxwilliejgrant41084
 
Assignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docxAssignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docxwilliejgrant41084
 
Assignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docxAssignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docxwilliejgrant41084
 
Assignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docxAssignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docxwilliejgrant41084
 

More from williejgrant41084 (20)

Assignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docxAssignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docx
 
Assignment ContentMany different threats can arise to the .docx
Assignment ContentMany different threats can arise to the .docxAssignment ContentMany different threats can arise to the .docx
Assignment ContentMany different threats can arise to the .docx
 
Assignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docxAssignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docx
 
Assignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docxAssignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docx
 
Assignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docxAssignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docx
 
Assignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docxAssignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docx
 
Assignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docxAssignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docx
 
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxAssignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
 
Assignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docxAssignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docx
 
Assignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docxAssignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docx
 
Assignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docxAssignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docx
 
Assignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docxAssignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docx
 
Assignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docxAssignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docx
 
Assignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docxAssignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docx
 
Assignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docxAssignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docx
 
Assignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docxAssignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docx
 
Assignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docxAssignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docx
 
Assignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docxAssignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docx
 
Assignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docxAssignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docx
 
Assignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docxAssignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docx
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Assignment ContentA Penetration Tester evaluates the secur.docx

  • 1. Assignment Content A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of Penetration Tester for the organization you chose in Week 1. Use the Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for the organization you chose. Research and include the following: Pentest Pre-Planning Engagement timeline: Tasks and who performs them
  • 2. Team location: Where will the penetration team execute their tests? Organization locations tested: multiple locations, countries (Export restrictions and government restrictions) Which pentest technologies will be used? Consider the following as you research options: Scanning Tools: Nmap, Nikto Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel OSINT Tools: Whois, TheHarvester Wireless Tools: Aircrack-ng, Kismet Networking Tools: Wireshark, Hping What client personal are aware of the testing? What resources provided to pentest team? Test Boundaries: What is tested? Social engineering test boundaries? What is acceptable? What are the boundaries of physical security tests? What are the restrictions on invasive pentest attacks? What types of corporate policy affect your test?
  • 3. Gain Appropriate authorization (Including third-party authorization) Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks Pentest Analysis and Report Planning: Analyze pentest results Report pentest results Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. Delete the assignment instructions from the document. This will improve the originality score from Safe Assign. Make sure to check the SafeAssign originality score.