general requirements
-Determine and explain the major risks and vulnerabilities that hackers seek to exploit in Unix/Linux.
-Determine and explain the controls and protections against those vulnerabilities.
-Explain the tools that are used to exploit the vulnerabilities in the enumeration phase related to Unix/Linux systems.
specific requirements
-Provides a short paper about the vulnerabilities and controls (V and Cs) of enumeration phase related to Unix/Linux systems.
-Explains all of the risks and vulnerabilities phase related to Unix/Linux systems that enumeration seeks to exploit.
-Explains the tools that are used to exploit the vulnerabilities of enumeration related to Unix/Linux systems.
-Explains the controls and protections used against the stated vulnerabilities in the enumeration phase related to Unix/Linux systems.