Analyze network systems for cybersecurity vulnerabilities.

Analysis of systems should include detecting vulnerabilities by using

  • port scanning (i.e., Network Mapper [Nmap])
  • software update services
  • baseline creation
  • industry standard vulnerability scanning
  • other tools, such as Microsoft Baseline Security Analyzer (MBSA)
  • normal network traffic
  • malicious network traffic (i.e., Address Resolution Protocol [ARP] poisoning, teardrop attack, SMURF attack).