{"id":37398,"date":"2024-11-10T00:23:09","date_gmt":"2024-11-10T00:23:09","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/u05a1-week-5-assignment-lab-conducting-scanning-and-enumeration-on-a-target-network\/"},"modified":"2024-11-10T00:23:09","modified_gmt":"2024-11-10T00:23:09","slug":"u05a1-week-5-assignment-lab-conducting-scanning-and-enumeration-on-a-target-network","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/u05a1-week-5-assignment-lab-conducting-scanning-and-enumeration-on-a-target-network\/","title":{"rendered":"[u05a1] Week 5 Assignment: Lab: Conducting Scanning and Enumeration on a Target Network"},"content":{"rendered":"<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could scanning and enumeration be done in this type of environment? What security controls would you recommend implementing to avoid this type of scanning and enumeration?<\/p>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Submit<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/strong>your&nbsp;essay including the lab report for this assignment by 11:59 pm on Sunday of this week.<\/p>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Additional Requirements<\/h2>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Written communication:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Ensure written communication is free of errors that detract from the overall message.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Length of paper:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>1\u20132 typed, double-spaced essay pages, lab report pages, title page, and a reference page.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Format:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/strong>Format resources and citations according to APA guidelines for style and format.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Font and font-size:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Use Times New Roman 12-point font.<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Sources:<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Cite at least two sources.<\/li>\n<\/ul>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Competencies Measured<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria.<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 1:<\/strong>&nbsp;<strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Describe the core concepts, technologies, components, and security issues related to mobile and wireless networks.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Apply internet research findings to analyze core concepts and applied technologies regarding security threats and attack vectors in a Bring Your Own Device (BYOD) context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 3:&nbsp;Analyze how mobile systems operate to facilitate secure data access and voice.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Describe scanning and enumeration on a target network in a lab context.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Recommend security controls to implement to avoid scanning and enumeration in a Bring Your Own Device (BYOD) context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 4:&nbsp;Apply network defense tools to identify and mitigate mobile network security concerns.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Complete the lab tasks as described in the lab learning objectives.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Describe how scanning and enumeration can be applied in a Bring Your Own Device (BYOD) context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 6:&nbsp;Exhibit proficiency in writing, critical thinking, and research topic areas in real-life data communication networks.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Organize content so ideas flow logically with smooth transitions.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Convey clear meaning through appropriate word choice and usage.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could scanning and enumeration be done in this type of environment? What security controls would you recommend implementing to avoid this type of scanning and enumeration? Submit&nbsp;your&nbsp;essay including the lab report for this assignment [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/37398"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=37398"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/37398\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=37398"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=37398"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=37398"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=37398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}