Cybersecurity-Master-Journey

Module 04: Vulnerability Management - Practical Activity

📅 Date Started: 2026-05-06

📅 Date Completed: 2026-05-07

🧪 Activity Type:

Scenario-based professional simulation: Acting as a security analyst to analyze threat intelligence using STIX and perform penetration testing on a web application using OWASP ZAP for an online retail organization.

🎯 Lab Goal:

To analyze threat intelligence data using STIX (Structured Threat Information Expression) for standardized threat sharing, and conduct vulnerability assessments on a web application using OWASP ZAP to identify, categorize, and report security risks by severity level.

🛠 Tools Used:

📋 What I Did:

  1. Analyzed threat intelligence from a case study to understand threat actor tactics, techniques, and procedures (TTPs) using structured data formats.
  2. Explored STIX (Structured Threat Information Expression) as a standardized language for representing, storing, and sharing cyber threat intelligence across organizations.
  3. Analyzed STIX expressions to identify indicators of compromise (IOCs), attack patterns, and threat actor relationships in machine-readable format.
  4. Performed simulated penetration testing on an online retail organization’s web application using OWASP ZAP v2 to identify security vulnerabilities.
  5. Explored the OWASP ZAP interface, configured scan policies, and executed automated vulnerability scans against the target web application.
  6. Analyzed scan results to identify vulnerabilities, categorize them by risk level (High, Medium, Low, Informational), and document findings in a penetration testing report format.

🔍 What I Found:

💡 What I Learned:

📸 Screenshot:

🔒 Screenshot Restriction Notice

Screenshots from IBM SkillsBuild simulated lab environments are proprietary content and cannot be shared externally per IBM’s academic integrity policy and terms of use. Lab Completion Verified:

Alternative Evidence: Comprehensive written documentation provided in sections above.