Professional CCNA/CCNP/Network System Administrator Needed
Project detail
Hello,
I am looking for someone with Professional CCNA/CCNP/Network System Administrator skills. You must be able to research and use your knowledge to write articles and professional writings in regards to :
You should write a report (approximately 4500 words, submitted in PDF format) detailing your plan, with a justification for tools and techniques used, the results and a complete chronological audit trail of hacking actions taken in line with expected professional and ethical standards.
For the practical part, you must carry out a pen testing limited to a given virtual machine. For the rest of the work, use the information provided in the scenario, and make the appropriate and reasonable assumptions if necessary (provide a rationale for it).
The report will have to cover all the stages of the ethical hacking methodology. The report should include at least the following elements :
1. Demonstration of understanding of the scenario and discussion of the pre-engagement interactions. (10%)
2. Identification of relevant tools for each stage of the ethical hacking. (10%)
3. Appropriate information gathering and threat modelling (10%)
4. Identification of security vulnerabilities (10%)
5. Exploitation of the vulnerabilities (10%)
6. Post exploitation activities (10%)
7. Reporting of the findings and potential suggestions for countermeasures (10%)
8. Critical reflection of self-performance and the development of skills for employment as a computer security professional. (10%)
Second job is :
You are required to design and build an internet-connected secure server network for Smith Logistics, which is a medium size warehouse and logistics company.
You are to assume the role of the assigned technical lead for this proposal and have been tasked with creating the initial mock environment and associated documentation.
Write a report which should at a minimum contain:
A network diagram, including IP addresses.
A rationale of the load balancing chosen.
A recommendation and explanation of chosen disk redundancy and backup solutions for the final build (does not need simulating).
Documentation for each network component, describing briefly it’s function and explaining what dependencies it may have and/or how it interacts with other components on the network
• Documentation might include IP Addresses of servers, DHCP Options, DNS Forward Lookup zones, Websites setup, etc.
Documentation of a proof of concept network, evidencing the setup and configurations made using screenshots.
• Client machine evidence should be used to demonstrate that the wider system works.
• Internet connectivity is expected for both servers and clients.
Recommendations of potential hardware based upon recommended specifications for operating systems and services along with indicative pricing.
The report is expected to address any potential legal, ethical or security issue that may be present throughout the body of work.
Your report could also optionally include:
Pro-active advice on identifying single points of failure and possible recommendations to mitigate or eliminate these.
Pro-active advice for improving security and possible recommendations for future actions.
Pro-active security advice including policy recommendations for the new network.
4.4 Structure of Report
The report must not exceed 3,500 word, and must include the following sections:
Table of contents
Introduction
Your works
Conclusion
References
Appendices (if applicable)