Description

Instructions

Part 1 – (labs are already completed; please see the screenshots on the assessment template)

Based on the actions taken in the lab, explain in detail the information that was gained in using Zenmap for reconnaissance efforts (please submit answer on assessment template part 1.3 response).

Part 2 – Security Planning: Network Device Security and Intrusion Detection Presentation

Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

Network Device Security (Please submit police on the assessment template part 2: security planning Item 2.1)

Intrusion Detection (Please submit policy on the assessment template part 2: security planning Item 2.2).

Consider the following scoring guide criteria as you complete your assessment:

Provide required screenshots that document lab completion.

Write a network device security policy that is appropriate for the Course Security scenario.

Write an intrusion detection process that is appropriate for the Course Security scenario.

Explain the information that is gained in using Zenmap for reconnaissance efforts.


    Make your order right away

    Confidentiality and privacy guaranteed

    satisfaction guaranteed