Warning: Trying to access array offset on value of type bool in /home/topgsnkq/myessaydesk.com/wp-content/themes/enfold/framework/php/function-set-avia-frontend.php on line 637

CMGT/400 – Penetration Testing Plan

A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities.Take on the role of Penetration Tester for the organization you chose in Week 1. (Pick an Organization)Use thePenetration Testing Plan Templateto create a 3- to 4-page Penetration Testing Plan for the organization you chose. The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document.Research and include the following:Pentest Pre-PlanningEngagement timeline: Tasks and who performs themTeam location: Where will the penetration team execute their tests?Organization locations tested: multiple locations, countries (Export restrictions and government restrictions)Which pentest technologies will be used? Consider the following as you research options:Scanning Tools: Nmap, NiktoCredential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and AbelOSINT Tools: Whois, TheHarvesterWireless Tools: Aircrack-ng, KismetNetworking Tools: Wireshark, HpingWhat client personal are aware of the testing?What resources provided to pentest team?Test Boundaries:What is tested?Social engineering test boundaries? What is acceptable?What are the boundaries of physical security tests?What are the restrictions on invasive pentest attacks?What types of corporate policy affect your test?Gain Appropriate authorization (Including third-party authorization)Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activitiesReconnaissanceScanningGaining AccessMaintaining AccessCovering TracksPentest Analysis and Report Planning:Analyze pentest resultsReport pentest results

 
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"

"Do you have an upcoming essay or assignment due?


Get any topic done in as little as 6 hours

If yes Order Similar Paper

All of our assignments are originally produced, unique, and free of plagiarism.