Update README.md
Browse files
README.md
CHANGED
|
@@ -14,6 +14,7 @@ This lab setup is designed to help you gain hands-on experience with data and ne
|
|
| 14 |
|
| 15 |
## Virtual Machine Structure
|
| 16 |
|
|
|
|
| 17 |
### VirtualBox VMs
|
| 18 |
|
| 19 |
The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration.
|
|
@@ -27,6 +28,8 @@ The main VM is configured to launch VirtualBox, and inside the VirtualBox manage
|
|
| 27 |
|
| 28 |
The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise.
|
| 29 |
|
|
|
|
|
|
|
| 30 |
### Task 1: Cybersecurity Attack Analysis
|
| 31 |
|
| 32 |
1. **Attack Data Collection**:
|
|
@@ -130,7 +133,7 @@ The tasks that students need to complete for this module have been designed in a
|
|
| 130 |
## Submission Guidelines
|
| 131 |
|
| 132 |
* Submit your work in a single PDF file.
|
| 133 |
-
* Ensure your front page contains your name, matrix ID, lecture name, and submission date.
|
| 134 |
* Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion.
|
| 135 |
* References should be clearly listed at the end of the report.
|
| 136 |
* Submit your work within the time limits provided by your lecturer.
|
|
|
|
| 14 |
|
| 15 |
## Virtual Machine Structure
|
| 16 |
|
| 17 |
+
|
| 18 |
### VirtualBox VMs
|
| 19 |
|
| 20 |
The main VM is configured to launch VirtualBox, and inside the VirtualBox manager you will find the following pre-configured VMs, which will be used for penetration testing and exploration.
|
|
|
|
| 28 |
|
| 29 |
The tasks that students need to complete for this module have been designed in a comprehensive manner, encompassing various aspects of computer and network security. All the work must be done inside the main VM environment unless instructed otherwise.
|
| 30 |
|
| 31 |
+
**Lecture Name:** Mr. Syahrizal Azmir Bin Md. Sharif
|
| 32 |
+
|
| 33 |
### Task 1: Cybersecurity Attack Analysis
|
| 34 |
|
| 35 |
1. **Attack Data Collection**:
|
|
|
|
| 133 |
## Submission Guidelines
|
| 134 |
|
| 135 |
* Submit your work in a single PDF file.
|
| 136 |
+
* Ensure your front page contains your name, matrix ID, lecture name (**Mr. Syahrizal Azmir Bin Md. Sharif**), and submission date.
|
| 137 |
* Each task should be addressed in the order mentioned above, showing all steps from the beginning until the conclusion.
|
| 138 |
* References should be clearly listed at the end of the report.
|
| 139 |
* Submit your work within the time limits provided by your lecturer.
|