Imagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into the network of a business known to be engaged in criminal activity for financial gain as its primary activity.
Introduction In this assignment, you will assume the role of an ethical hacker tasked by law enforcement to infiltrate the network of a business known to engage in illegal activities. The specific course learning outcome associated with this assignment is: Conduct activities to protect IT assets and infrastructure from threats and improve incident response strategies. […]