College of Engineering and Polymer Science
Date of Last Revision
Computer Information Systems
Number of Credits
Bachelor of Science
Date of Expected Graduation
A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.
Dr. John Nicholas
Honors Faculty Advisor
Proprietary and/or Confidential Information
Adkins, Isabella, "Defense of a Small Network" (2023). Williams Honors College, Honors Research Projects. 1674.