Network Security Audit & Recommendations
Categories
Skills
Project scope
What is the main goal for this project?
As networks grow, misconfigurations and unsecured devices pose increased risk. Learners will analyze network architecture, identify exposures, and offer detailed recommendations to harden systems.
- Conduct a basic audit of a network (real or simulated) to identify weaknesses in configuration, topology, and access controls. Propose changes to improve security and minimize attack surfaces.
As networks grow, misconfigurations and unsecured devices pose increased risk. Learners will analyze network architecture, identify exposures, and offer detailed recommendations to harden systems.
- Conduct a basic audit of a network (real or simulated) to identify weaknesses in configuration, topology, and access controls. Propose changes to improve security and minimize attack surfaces.
What tasks will learners need to complete to achieve the project goal?
Tasks and Activities:
- Analyze provided network diagrams or configuration snapshots
- Document existing network components and access points
- Identify vulnerable services, open ports, or weak firewall rules
- Propose revisions to firewall settings, VLAN structure, or segmentation
- Recommend secure configuration practices for routers, switches, or servers
- Summarize findings in an audit report with before-and-after visuals
Deliverables:
- Network Audit Report
- Annotated Network Diagram (before and proposed changes)
- Firewall Rule Review Summary
- Recommendations Deck with Prioritized Actions
Tasks and Activities:
- Analyze provided network diagrams or configuration snapshots
- Document existing network components and access points
- Identify vulnerable services, open ports, or weak firewall rules
- Propose revisions to firewall settings, VLAN structure, or segmentation
- Recommend secure configuration practices for routers, switches, or servers
- Summarize findings in an audit report with before-and-after visuals
Deliverables:
- Network Audit Report
- Annotated Network Diagram (before and proposed changes)
- Firewall Rule Review Summary
- Recommendations Deck with Prioritized Actions