Part 1. Researching Network Attacks In Part 1 of this lab, you research various network attacks that have actually occurred and select one on which…

Part 2. Researching Security Audit Tools

In Part 2 of this lab, you research network security audit tools and attacker tools and investigate one that can be used to identify host or network device vulnerabilities. Fill in the report below based on your findings.

Step 1: Research various security audit and network attack tools.

List some of the tools that you identified in your search.

_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Leave a Reply