You have been hired as a consultant to perform a network security assessment for a large firm – you will be focusing on Footprinting and Scanning the organization.
1. Describe the methodology and tools you would use to conduct your assessment.
2. Give a rationale for each step in your methodology.
Need 2 pages double spaced in APA format with at least 2 academic references.
Need by 11:00 PM EDT today!