After 90 min: A secure system for storing and managing your passwords safely
Conduct a Network Security Audit
After 90 min: A comprehensive security report identifying vulnerabilities and improvement areas
What you need
The 90-Minute Plan
List all devices, software, and services on your network that need protection.
Use scanning tools to identify open ports, outdated software, and weak configurations.
Review user permissions, firewall rules, and password policies.
Evaluate backup procedures, update schedules, and incident response plans.
Write findings report with recommendations. Prioritize fixes. Next: implement solutions.
Document everything. Get permission before scanning. Prioritize by risk level.
You might also try
After 90 min: A comprehensive penetration test report identifying security weaknesses
After 90 min: A webpage with buttons, forms, and interactive elements that respond to user actions
After 90 min: A website that looks perfect on phones, tablets, and desktops