Objective:
The student will summarize the techniques used in
security assessments.
Resources:
- See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf
Assignment:
- Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
- Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
- Read the Case Study – Bug Bounty.pdf document and be prepared to answer the questions at the end.
- Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
- Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 7th, 2023
Teacher Pacing Due Date: March 8th, 2023