IRedDragonICY commited on
Commit
08df6fa
·
verified ·
1 Parent(s): 5cdfbfe

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +4 -1
README.md CHANGED
@@ -14,6 +14,7 @@ This lab setup is designed to help you gain hands-on experience with data and ne
14
 
15
  ## Virtual Machine Structure
16
 
 
17
  ### VirtualBox VMs
18
 
19
  The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration.
@@ -27,6 +28,8 @@ The main VM is configured to launch VirtualBox, and inside the VirtualBox manage
27
 
28
  The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise.
29
 
 
 
30
  ### Task 1: Cybersecurity Attack Analysis
31
 
32
  1. **Attack Data Collection**:
@@ -130,7 +133,7 @@ The tasks that students need to complete for this module have been designed in a
130
  ## Submission Guidelines
131
 
132
  * Submit your work in a single PDF file.
133
- * Ensure your front page contains your name, matrix ID, lecture name, and submission date.
134
  * Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion.
135
  * References should be clearly listed at the end of the report.
136
  * Submit your work within the time limits provided by your lecturer.
 
14
 
15
  ## Virtual Machine Structure
16
 
17
+
18
  ### VirtualBox VMs
19
 
20
  The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration.
 
28
 
29
  The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise.
30
 
31
+ **Lecture Name:** Mr. Syahrizal Azmir Bin Md. Sharif
32
+
33
  ### Task 1: Cybersecurity Attack Analysis
34
 
35
  1. **Attack Data Collection**:
 
133
  ## Submission Guidelines
134
 
135
  * Submit your work in a single PDF file.
136
+ * Ensure your front page contains your name, matrix ID, lecture name (**Mr. Syahrizal Azmir Bin Md. Sharif**), and submission date.
137
  * Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion.
138
  * References should be clearly listed at the end of the report.
139
  * Submit your work within the time limits provided by your lecturer.