Penetration testing in a corporate environment

Questions 1: Penetration testing in a corporate environment”
Imagine you are an information security manager. How would you consider utilizing penetration testing in a corporate environment? Are there situations in which you feel another technique is more appropriate? In a few sentences, describe the most important business areas and/or network infrastructure components that would be most and least beneficial to test. Recommend a website as a potential useful resource that outlines best practices for conducting an internal penetration test.
Share with your classmates and provide links to any useful resources you find. Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you’ve picked up.
Question 2: Hashing algorithms: MD5 or SHA1″
In your opinion which is the better hashing algorithm: MD5 or SHA1? What are the differences, strengths, and weaknesses of each? Create a scenario in which each would be the more suitable method to secure data. Examine your own PC’s operating system. Are there any tools built in to verify MD5 or SHA1 checksums of downloaded software? If your PC’s operating system does not have any, what tools can you recommend?
Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you’ve picked up.
Question3:”Using TCPdump and Wireshark”
In your labs, you performed a network capture using TCPdump and Wireshark. Using your experiences this week and any other experience you may have, compare and contrast the use of TCPdump and Wireshark. In what situations would each of these tools be most effective? Recommend a website or video that provides a tutorial on how to best use one of these tools.
Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you’ve picked up.

This question has been answered.

Get Answer