For this class I am supposed to complete labs but some of them just are experien

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

For this class I am supposed to complete labs but some of them just are experien

For this class I am supposed to complete labs but some of them just are experiencing issues, The professor said it was okay to forgo the labs and work on the assignments. With that being said it is your choice on what vulnerabilities to write about :
Lesson 1.1: Conducting Vulnerability Scans
Lesson 1.2: Consulting a Vulnerability Database
Lesson 1.3: Scanning Vulnerabilities Using Microsoft Baseline Security Analyzer
Using your lab results and the Common Vulnerability Scoring System (CVSS), analyze a minimum of three vulnerabilities you found in the labs and identify system components responsible for each vulnerability as well as the root cause of the vulnerability. An example would be discovering that the root cause of a vulnerability is an outdated version of an open-source library. This would then provide you with the remediation strategy, which would involve upgrading the library.
Be sure to note the exploitability, the relative impact on the organization, and the scope of the vulnerability. A generic example template for a vulnerability assessment (VA) is provided in Course Resources, or you can use a Word® table. As part of your analysis, include descriiptions of the vulnerabilities, how each of the vulnerabilities relates to risk for the organization, and how each vulnerability can be mitigated.
Part 1 Requirements
Your assessment should:
Be a minimum of 2–3 pages in length (excluding title and reference pages). If you require more pages to thoroughly discuss the identified vulnerabilities, then include them.
Include an analysis that provides a detailed descriiption and assessment of a minimum of three vulnerabilities identified. Be sure to discuss root causes, the potential impacts on the organization, and mitigation strategies for each vulnerability.
Follow APA style format to reference any sources you consult and include in-text citations and a reference page. For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.
Contain no spelling or grammar errors.
Lesson 2.2: Using Social Engineering Techniques to Plan an Attack
Lesson 2.3: Demonstrating Network Mapping and Quarantining a Vulnerable System
Lesson 2.4: Identifying a Suspicious Account on the System User Groups
Analyze a minimum of three social engineering techniques. Feel free to include more techniques in your analysis, but three should be the minimum. Be sure to note the exploitability, the relative impact on the organization, and the scope of the attack. As part of your social engineering analysis, provide descriiptions of the social engineering techniques, including how each of the techniques relates to risk for the organization and how each technique can be mitigated.
An example of a social engineering technique would be a user receiving a phishing email purporting to be from the IRS giving the status of their tax refund with a link that downloads ransomware. The related remediation strategy might involve a combination of user training and restoring a recent backup image of the affected system.
Part 2 Requirements
Your assessment should:
Be a minimum of 2–3 pages in length (excluding title and reference pages). If you require more pages to thoroughly discuss the identified vulnerabilities, then include them.
Include an analysis that provides a detailed descriiption and assessment of a minimum of three vulnerabilities identified. Be sure to discuss root causes, the potential impacts on the organization, and mitigation strategies for each vulnerability.
Follow APA style format to reference any sources you consult and include in-text citations and a reference page. For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.
Contain no spelling or grammar errors.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount