CDU Skills Passport
Assessment 1: Network Security Assessment and Penetration Test
Cyber Security

Project Brief

Conduct a comprehensive security assessment of a provided simulated corporate network environment. Your assessment must include network reconnaissance and mapping using appropriate tools, vulnerability assessment identifying OS and application vulnerabilities, simulated penetration testing documenting attack vectors and exploitation (within ethical boundaries), analysis of network security controls (firewalls, IDS, encryption), evaluation of disaster recovery and business continuity plans, and a professional security assessment report (3000 words) with executive summary, detailed findings, risk classifications, and prioritized recommendations for security improvements. Include network diagrams, vulnerability scan results, and a proposed security policy framework.

My Work

Document

Network Reconnaissance Report

Document

Vulnerability Scan Results

Document

Penetration Test Documentation

Document

Security Assessment Report

Document

Security Policy Recommendations

Reflection

This cybersecurity assessment project was an intensive learning experience that transformed my understanding of information security from theoretical concepts to practical implementation. Working with a simulated corporate network environment with deliberate vulnerabilities provided realistic experience without real-world consequences. The reconnaissance phase taught me systematic approaches to understanding network architecture. Using tools like Nmap, Wireshark, and network mapping utilities revealed the importance of information gathering in security assessment. I learned that attackers and defenders both need comprehensive network visibility, but for opposite purposes. Understanding how to map network topology, identify running services, and fingerprint operating systems developed my analytical skills. Vulnerability assessment revealed the gap between knowing about vulnerabilities and actually finding them. Running automated scanners like Nessus and OpenVAS provided breadth, but manual analysis was crucial for depth. I learned to distinguish between false positives and genuine security issues, and to assess vulnerability severity in business context rather than just CVSS scores. The penetration testing phase was both exciting and sobering. Successfully exploiting vulnerabilities in the test environment demonstrated how seemingly small configuration errors can lead to complete system compromise. I learned the importance of the principle of least privilege, defense in depth, and why patching and updates are critical. Ethically conducting these tests reinforced that cybersecurity professionals must always operate within legal and ethical boundaries. The most valuable lesson was thinking like both attacker and defender. This dual perspective showed me that security is not about single solutions but layered defenses, continuous monitoring, and organizational culture. Writing the security policy recommendations taught me that technical controls must be complemented by policies, procedures, and user awareness training.

CDU Skills Passport - Your Journey to Employability