The next part of your training manual will focus on network scanning and assessment. The goal of running a vulnerability scanner or conducting an external vulnerability assessment is to identify devices on your network that are open to known vulnerabilities without compromising your systems. Continue the development of your training manual with an overview of the assigned topic and a summary of functions and capabilities. Demonstrate your implementation with corresponding screenshots from your labs (when applicable).
Now it is time to create your training manual section on network scanning and assessment. This process may involve automated and manual techniques with varying degrees using a risk-based approach. Continue using the Training Manual Template document to develop the section on network scanning and assessment.
For each section of the training manual, develop guidelines for employees to select and employ specific software, tools, and methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
- Illustrate the processes of detecting rogue devices, detecting malicious connections, and viewing network topologies to identify network weakness.
- Explain how to interpret the output of network scans to identify weaknesses.
What to Submit
Fill in Section Five of the Training Manual Template document. This section contains two main parts with additional subtopics related to detecting intrusions. This section should address best practices and tools and methodologies for scanning your network and assessing its security. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.