In this assignment, students will quantify a network in order to map it, ensure everything in the system is reporting correctly, and demonstrate one of the first steps a hacker would take to try to gain access to the system.
Using NMAP, quantify a home or work network. Refer to the Internet to provide guidance on the installation and configuration of NMAP. Then, identify the following:
Compile your findings including screenshots from the NMAP program. Make sure to include the following statement from the asset owner: "Use of these assets are governed by <insert title>, <insert date> and <insert version>."