Computing – Ethical Hacking | Report

For this assessment you will have to use Oracle VM Virtual Box, you will need to target operation system Windows 7 using Kali Linux, Metasploit and Golismero. As you will scan for exploits you will then need to take a screenshot as proof and put them into the security report document explaining your findings. You will find all the information on the Power Points.

http://writerslabs.com/file?alias=Creating_A_Security_Report.pptx&file=336910425_support_Creating_A_Security_Report_5sLNapywcI97Fse.pptx
http://writerslabs.com/file?alias=Security_Assessment_Report_Guidelines.pptx&file=336910425_support_Security_Assessment_Report_Guidelines_IAPsoCdseREcB2J.pptx

READ ALSO :   Operations design