Assessment Description Part I Creating a virtual environment allows students to learn ethical hacking in a safe and secure environment without the costly infrastructure often associated with technical
Stuck with a difficult assignment? No time to get your paper done? Feeling confused? If you’re looking for reliable and timely help for assignments, you’ve come to the right place. We promise 100% original, plagiarism-free papers custom-written for you. Yes, we write every assignment from scratch and it’s solely custom-made for you.
Order a Similar Paper Order a Different Paper
Assessment Description
Part I
Creating a virtual environment allows students to learn ethical hacking in a safe and secure environment without the costly infrastructure often associated with technical labs. Within this lab, students will create an environment, that provides a legal and ethical platform in which to practice ethical hacking. View the “Overview and Lab 1 Build a Virtual Lab” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.
Utilizing the Student Success Center, create a virtual lab to include the following VMs:
– Kali
– Kioptrix 1
– Kioptrix 2
– Metasploitable 2
Part II
The utilization of VMs to understand the principles of ethical hacking has become common within cybersecurity. In this assignment, we will walk through the basics of vulnerability analysis and show the ease with which a vulnerability can be exploited to gain root access to a system.
View the “Lab 3 Your First Hack Part 1 Lab” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.Utilizing the Kioptrix 1 VM, conduct a scan of the system from your Kali box to examine vulnerabilities within the system. After identifying and categorizing the vulnerabilities, conduct an analysis and mapping of the vulnerabilities.
- Perform an NMAP scan of the system.
- Create a slide presentation (8-10 slides) of your findings (screenshots) with an embedded video detailing the following:- Conduct the enumeration/footprinting of the Kioptrix 1 machine.- Provide at least 3 additional NMAP commands and screenshots not utilized in the lab video.- Explain flaw hypothesis methodology and provide a hypothesis based on your findings.- Create and apply a vulnerability map of a system.- Explain the flaws found, research at least two, and detail possible root causes of the flaws.- Include commands.
Refer to “CYB-610-RS-Build A Virtual Lab Scoring Guide” prior to beginning the assignment to become familiar with the expectations for successful completion.
APA style is not required, but solid academic writing is expected. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. You are not required to submit this assignment to LopesWrite.

We’ve proficient writers who can handle both short and long papers, be they academic or non-academic papers, on topics ranging from soup to nuts (both literally and as the saying goes, if you know what we mean). We know how much you care about your grades and academic success. That's why we ensure the highest quality for your assignment. We're ready to help you even in the most critical situation. We're the perfect solution for all your writing needs.
Get a 15% discount on your order using the following coupon code SAVE15
Order a Similar Paper Order a Different Paper