{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

 

I will need you to login to my school profile to access Lab.
To access, Go to
https://my.wgu.edu/home
login info available to assigned writer
Scroll down to middle of page and click on class
Emerging Technology In Cybersecurity C844
I will need task 1 done. I provided the same instruction below, but I will need you to review a video for more indepth intructions for task one. On that same
page to the right of the task, you will see course Tips, please click on that then access the 15min video explaining task one in detail.
This the link for that video, but I’m thinking you may not be able to view it unless logged into my account.
https://wgu.webex.com/wgu/ldr.php?RCID=5a5942ac3117eede716b438d2c096d30
From the Lab Il need at least 3 vulnerabilities for zenmap and 3 vulnerabilities wire shark, please take screen shots and ill need 3. 3 anomalies to zenmap and
3 anomalies for zenmaps, and one source to back up each of these claims.
4042.5.3 : Mapping and Monitoring
The graduate executes network mapping and monitoring procedures using industry-standard software for identifying vulnerabilities and threats.
INTRODUCTION
In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on
that network. You will need to know how to run network mapping and monitoring software to find vulnerabilities and anomalies that could impact the security
of your network in order to recommend sound solutions.
For this task, you will use the virtual world at the “Performance Assessment Lab” web link and access the files and lab environment necessary to run both
Nmap and Wireshark on the network associated with this task. You will need to save the output of both Nmap and Wireshark to include in your submission.
You will then recommend solutions to address any issues you find.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual
source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that
can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each
requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.
B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.
C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each
anomaly.
D. Summarize the potential implications of not addressing each of the anomalies found when running Wireshark.
E. Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected,
reliable research and sources to support your recommendations for each vulnerability or anomaly.
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?