Complete a port scan. Use NMAP for this. Showcase the findings.
Use wireshark and perform a TCPFlood attack. Record your findings.
Use Kali tools to perform a Hping3 attack. Record your findings.
Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack vectors.