0% found this document useful (0 votes)
25 views1 page

NM4-Cyber Security CourseMetrics

The document assesses a student's practical cybersecurity training project. It outlines the project details, criteria, and evaluation for tasks like setting up networks and firewalls, vulnerability scanning, intrusion detection, and unified threat management configuration.

Uploaded by

arasan77silambu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views1 page

NM4-Cyber Security CourseMetrics

The document assesses a student's practical cybersecurity training project. It outlines the project details, criteria, and evaluation for tasks like setting up networks and firewalls, vulnerability scanning, intrusion detection, and unified threat management configuration.

Uploaded by

arasan77silambu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

NAAN MUDHALVAN – INGAGE CYBER SECURITY-PRACTICAL TRAINING

STUDENT’S PROJECT ASSESSMENT FORM


Name of the Student Branch of student

Roll number of students Practical session date

Father's Name Date

Name of the Institute

Outcome Project Details Criteria Criteria Evaluation Details Marks Marks Maximum Marks MCQ
for Obtained
Criteria
Design and Develop Cybersecurity Basics Exploration Wireshark(Virtual Set up a basic network using virtual machines. 5 25 MCQ
Security Measures Machine) Knowledge ONLINE
Overview of Cybersecurity and Types of Cyber Attacks a Install and configure Wireshark for network analysis. 10
TEST
Security Policies and Procedures & Ethical Hacking and Create and enforce simple security policies. 10
Legal Considerations
Test potential risks and Network Security pfSense (Firewall) Configure a firewall to filter network traffic. 5 25
vulnerabilities Firewall Configuration and Management ,OpenVPN (VPN) Set up and test an Intrusion Detection System. 10
Knowledge
Intrusion Detection and Prevention Systems (IDPS) Implement basic VPN configurations & Secure a wireless 10
network.
Virtual Private Networks (VPNs) and Wireless Security
Create Apply Vulnerability Assessment and Penetration Testing OpenVAS(Vulnerabilit Conduct a vulnerability assessment using OpenVAS. 5 25
Cryptographic y Scanning) &
Solutions Vulnerability Assessment & Penetration Testing OWASP tools Perform a penetration test on a simulated environment. 10
Methodologies Knowledge
Exploitation Tools and Techniques and Web Application Use Metasploit for ethical hacking and Secure a web 10
Security application using OWASP principles.
Design Employ Ethical Intrusion Detection System (IDS) Snort(IDS) Understand the concept of Intrusion Detection Systems. 5 25
Hacking Techniques Knowledge
Create Snort configuration files specifying network Install and configure Snort as an IDS. 10
interfaces, rules directory, and other settings
Create the latest Snort rules from the Snort website and Test the IDS by simulating various network attacks 10
update the rules directory.
Build a model based Unified Threat Management Firewall, VPN, NM, Set up a UTM appliance in a virtual environment 20 70 30
on security concepts OWASP ,Sophos UTM
Explore the features of Unified Threat Management Configure firewall rules, IPS, antivirus, and web filtering. 25
system
Test the UTM by accessing malicious websites and simulating 25
Configure a UTM appliance. attacks and generating the reports.

Student Aptitude Yes/ No Remark Principal Name, Seal & Signature

Does the student have an orientation towards Graphic Designing


Tools & principles

Has the student shown interest in learning beyond the course


content?

Faculty Signature

You might also like