Do a vulnerability assessment of a place you work or another network you are familiar with. I want it to be a business network not your home network. Analyze the network for possible security vulnerabilities and loopholes that you know or think may exist. Be sure to include entry ways into the network. Don’t forget about physical security as well.
Do not violate any rules or laws your company may have.
Your report can be theoretical without having hard data that the vulnerability exists.
PPT & WORD