UOP CMGT400 Week 2 Assignment Penetration Testing Plan

Question # 00772450 Posted By: rey_writer Updated on: 08/01/2020 04:48 AM Due on: 08/01/2020
Subject Education Topic General Education Tutorials:
Question
Dot Image

CMGT400 Intro to Information Assurance & Security

Week 2 Assignment

Penetration Testing Plan

A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities.

Take on the role of Penetration Tester for the organization you chose in Week 1.

Complete the Penetration Testing Plan Template to create a Penetration Testing Plan for the organization you chose.

Research/Consider and include the following:

• Pentest Pre-Planning

• Engagement timeline: Tasks and who performs them

• Team location: Where will the penetration team execute their tests? Team location

    can be the location of the teams involved with testing such as IT Operations. It's not

    uncommon for teams to operate in separate locations. Therefore, for this assignment 

    the team location can be San Francisco, CA or it can be at the company

    headquarters such as Seattle, WA. This part is all fictional data so feel free to complete

    this portion of the assignment however you like. If you need ideas, you can look at

     larger public companies such as Amazon, Google, Microsoft, Apple, etc. as they tend

     to share a good deal of information on their websites about their organizations, office

     locations, corporate offices, etc.

• Organization locations tested: multiple locations, countries (export restrictions and

    government restrictions). Organization location can be the headquarters of the

    corporate office (e.g. Seattle, WA).

• Which pentest technologies will be used? Consider the following as you research

    options:

• Scanning Tools: Nmap, Nikto

• Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel

• OSINT Tools: Whois, TheHarvester

• Wireless Tools: Aircrack-ng, Kismet

• Networking Tools: Wireshark, Hping

• What client personal are aware of the testing?

• What resources provided to pentest team?

• Test Boundaries:

• What is tested?

• Social engineering test boundaries? What is acceptable?

• What are the boundaries of physical security tests?

• What are the restrictions on invasive pentest attacks?

• What types of corporate policy affect your test?

• Gain Appropriate authorization (Including third-party authorization)

• Pentest Execution Planning: Given the scope and constraints you developed in your

   Pentest Pre-Plan, plan the following pentest execution activities

• Reconnaissance

• Scanning

• Gaining Access

• Maintaining Access

• Covering Tracks

• Pentest Analysis and Report Planning:

• Analyze pentest results

• Report pentest results

• Project sponsor can be CIO, CISO, CEO, the board, etc.

• Business context for penetration test is a business statement for why the test is needed.

• Project scope description can be application testing, internal/external network testing,

    wifi testing, physical security testing, social engineering testing. These are common

   scopes for real-world penetration testing.

• Date prepared & prepared by are the current date and you can list your name.

• Organization location can be the headquarters of the corporate office (e.g. Seattle,

   WA).

• Team location can be the location of the teams involved with testing such as IT

   Operations. It's not uncommon for teams to operate inseparate locations. Therefore, for

   this assignment the team location can be San Francisco, CA or it can be at the

   company headquarters such as Seattle, WA. This part is all fictional data so feel free to

    complete this portion of the assignment however you like. If you need ideas, you can

   look at larger public companies such as Amazon, Google, Microsoft, Apple, etc. as they tend to share a good deal of information on their websites about their organizations,office locations, corporate offices, etc.

      • Regarding the chart on page 2 in the template that contains ID, Activity, Resource,

    Labor, Material, & Total Cost, here's what to consider for each:

      • ID: simple numbering system (1, 2, 3, etc.)

      • Activity: related activity or specific tasks required to complete the work

      • Resource: resources (tool, etc.) needed to complete the work

      • Labor: how much labor is required by individuals to complete the work

      • Material: what's needed to complete the item

• The items related to the chart on page 2 are all directly related to the work required to complete penetration test activities and manage the effort. Please search the web for examples and some ideas. These numbers and information can be estimates.

Submit the assignment.

Dot Image
Tutorials for this Question
  1. Tutorial # 00771945 Posted By: rey_writer Posted on: 08/01/2020 04:48 AM
    Puchased By: 2
    Tutorial Preview
    The solution of UOP CMGT400 Week 2 Assignment Penetration Testing Plan...
    Attachments
    Solution-00771945.zip (100 KB)

Great! We have found the solution of this question!

Whatsapp Lisa