Course Hero Logo

Assessment 3.docx - Assessment-3 Websites pentesting or...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 7 pages.

Assessment-3Websites pentesting or web-CTFStudent NamePheak Hiong LimCITNumber027083Competency Title, Codeand Banner CodeCRNCompetency: INTRODUCTION TO PENETRATION TESTINGPROCEDURES & SECURING A WEBSITENational ID: VU21989-VU21997Banner Code: INFT1017, INFT1013CRNs: 64369/64384/64390/64393Assessment Type☒ Practical ☒ WrittenProjectOtherAssessment NameAssignment-3 (Website pentesting or web-CTF)Assessment DateStudent Statement:This assessment is my own work.Any ideas and comments made byother people have been acknowledged.I understand that by emailing or submitting thisassessment electronically, I agree to this statement.Student SignatureHiongDate17/11/2022PRIVACY DISCLAIMER:CIT is collecting your personal information for assessment pur-poses. The information will only be used in accordance with the CIT Privacy Policy.Assessor Feedback (also complete observation checklist and questions on last page)Student provided with feedbackAttempt 1SatisfactoryNot YetSatisfactoryDate//Attempt 2SatisfactoryNot YetSatisfactoryDate//Assessor NameDr. Waqas HaiderAssessor SignatureNote to Assessor:Please record any reasonable adjustment that has occurred for thisassessment.Instructions to AssessorWork, Health and Safety: A work health and safety check of the assessment environment isto be conducted prior to the assessment and any hazards addressed appropriately.
List the assessment range and conditions, time and materials on the next pageThese sections should be detailed enough for multiple assessors to consistently implementthe assessment and include details of location, time restrictions, level of assistance permit-ted (if any), WHS, environment protocols, etc. The student should have access to techniques,procedures, information, resources and aids which would normally be available in the work-place. Include if open or closed book.Materials provided may include:assessment paper, site plan, text, internet access, etc.Materials supplied by student may include:personal protective equipmentAssessors must be satisfied that the candidate can:Identify web site contentDemonstrate web application proxy testing toolsUtilise a current framework to test for common softwareVulnerabilities and interpret the resultPrepare a written report on web application vulnerabilitiesInformation for students:For this assessment the golden rule is, please see the marking rubric below first and try toprovide the evidence for each performance criteria (PC) and knowledge evidence (KE).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Computer Security, World Wide Web, Web application framework, Denial of service attack

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture