For Lab two, run and map against your own network on Kali. Run a ping scan in discovery mode and then check out the image and operating system showcased by the scan inside your network. Write a one-page paper discussing your findings and how this might be used in black box penetration testing.
APA (edition "APA 7")
Establishing an effective IT Security Policy Framework
As a consultant, draft an IT Security Policy Framework(NIST (SP 800-53), ISO / IEC 27000 series, and COBIT) for a medium-size organization.-Describe the framework selected-Design an IT Security Policy Framework for the organization.-Describe the importance Read more…