top of page

Objective 2

Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.

This pentest setup document shows the virtual machine configuration as well as the use of curl on uat.edu.

The personal risk assessment below demonstrates the use of GlassWire, Nord VPN, EULA Searching, KeePass and a high level overview of osintframework.com.

bottom of page