This is the continuion of the project. This continues from Phase 3 step 3. Keep in mind, LinkedIn is the assigned organization. Any details regarding LinkedIn security weakness and posture can be seen in the links below.
Please include diagrams, tables, charts, and figures if possible. No need to rush this, take your time and let this be plagiarism free.
Please use sources as needed and don’t forget to include URLs for all sources used.