Fill in order details

  • Submit your instructions
    to writers for free!

Chat with the writer

  • Chat with preferred expert writers
  • Request a preview of your paper
    from them for free


  • Project edited by the quality evaluation department

Download Your Completed Project

  • Download the completed project from your account or have it sent to your email address

In a 500- to 750-word essay research virtualization

Secure Testing Environment: Create a Virtual Cyber Security Sand Box

Virtualization creates a safe sandbox environment for you to experiment with the various security tools that will be utilized within the course in a safe manner. You will be able to describe the fundamentals of virtualization, compare and contrast the various virtualization architectures, enumerate and describe the various interfaces between the hypervisors, VMs, physical and virtual hardware, code execution and emulation, management tools, networking, storage, and external environments.

  1. Using GCU Virtualization Solution, located in the Course Materials, create an out of band Penetration Testing (PEN) environment that will include one attack platform and numerous target operating systems.
  2. Install and configure Vmware Workstation or Fusion on your desktop or laptop.
  3. Download a Kali VM. Refer to the Kali Linux website located in the Course Materials.
  4. Install Kali Linux in virtual environment.
  5. Select at least two vulnerable target operation systems from the Vulnhub website, located in the Course Materials (suggestions: OSs, Metasploitable 1, Metasploitable 2, Windows XP Service Pack 0, or Windows 7 Service Pack 0).
  6. All virtual machines should be configured on an isolated subnet (suggested subnet:
  7. As you go, take instructional notes and screenshots to help reproduce your process.

In a 500- to 750-word essay research virtualization technologies, including Type I and II architectures, the technical mechanisms by which virtualization is implemented in a variety of environments, and their implications for cyber operations. Examine the following virtualization technologies and resource control principles:

  1. Memory management and isolation.
  2. Virtual storage allocation.
  3. Association of physical hardware with virtual hardware and device emulation.
  4. Live migration and failover of physical systems to virtual environment.
  5. Benefit of creating virtual snapshots and clones.
  6. Interfaces both internal and external for managing, monitoring, and synchronizing virtual environments.

Document the installation process in the “Lab Report Template.” Include individual IP addresses and host names for each virtual machine.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance. 

Topic 1 DQ 1

What is the importance of using an isolated environment to perform penetration testing? What are the benefits of virtualizing this environment instead of using actual hardware? What effect does this have on your host system?

What our customers say

error: Content is protected !!