Documente Academic
Documente Profesional
Documente Cultură
Assignment Overview
This assignment will contribute 100% towards the incoure marks and consists of three
sections as follows:
Section A:
3.
4.
5.
6.
WARNING: DO NOT try the aforementioned tools or techniques on real systems! You should
test and create your tutorials by using Isolated/Testbed environments such as VMWare,
Metasploitable, DVWA, and etc.)
Section B:
This section is a group task focuses on vulnerability assessment and carries 40% of total
module marks. Vulnerability scanning identifies vulnerabilities and weaknesses of a system and
network in order to determine how a system can be exploited. The students provided with a
windows operating system in virtual machine format. Each team must use proper scanning tool
and methodologies to locate and remediate vulnerabilities in the given operating system. In
addition each team is required to provide detailed reports as follows:
12345-
Section C:
This section is a group task and carries 20% of total module marks. The main obejctive
of section C is to anlyze a given memory dump from infected machine using volatility
framework.
Document the results of your work in a professional and systematic manner and submit one
soft copy and one hard copy. Your completed documentation should meet the following
requirements:
Submission requirements
1. A CD containing an electronic version of the document.
2. Your report must be typed using Microsoft Word with Times New Roman font with 1.5
spaces.
3. The report has to be well presented and should be typed.
4. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. Paper weight of
80 grams and above is highly recommended.
5. The report should have a one (1) margin all around the page as illustrated below:
1 inch
1 inch
1 inch
1 inch
1 inch
1 inch
1 inch
1 inch
6. Every report must have a front cover. A transparent plastic sheet can be placed in front of the
report to protect the front cover. The front cover should have the following details:a) Name
b) Intake code.
c) Subject.
d) Project Title.
e) Date Assigned (the date the report was handed out).
f) Date Completed (the date the report is due to be handed in).
7. All information, figures and diagrams obtained from external sources must be referenced
using the Harvard referencing system accordingly.
Workload Matrix
The marking table must be placed on a single page, located as either the second or third
page of the final assignment documentation. Ensure to fill up of the team members full names
and their respective student IDs.
Students Name
Individual Components (A)
Introduction to the technique/tool/framework that
you have selected (3)
Nobility of selected item (10)
Impact of the selected technique/tool/framework on
the security (4)
General functionality of selected
technique/tool/framework (3)
Step by step tutorial on how to use
technique/tool/framework (10)
Critical analysis of technique/tool/framework and
any countermeasure if applicable (10)
Total Marks (out of 40)
Student 1
Student 2
Student 3
Student 4