This preview has intentionally blurred parts. Sign up to view the full document

View Full Document

Unformatted Document Excerpt

Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010-1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ........................................................................................................................... 7 Laboratory #1 .............................................................................................................................................. 11 Lab #1: Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) ........................................... 11 Learning Objectives and Outcomes........................................................................................................ 11 Required Setup and Tools....................................................................................................................... 11 Recommended Procedures...................................................................................................................... 14 Deliverables ...................................................................................................................................... ...... 18 Evaluation Criteria and Rubrics.............................................................................................................. 18 Lab #1 Assessment Worksheet ............................................................................................................ 19 Laboratory #2 .............................................................................................................................................. 22 Lab #2: Perform a Vulnerability Assessment Scan Using Nessus ....................................................... 22 Learning Objectives and Outcomes........................................................................................................ 22 Required Setup and Tools....................................................................................................................... 22 Recommended Procedures...................................................................................................................... 25 Deliverables ......................................................................................................................................... View Full Document

End of Preview

Sign up now to access the rest of the document