Overview
You will review a list of security controls which are to be applied to systems on a fictitious corporate network. You will use security auditing tools to perform a real-world assessment of a system on this network, with the goal of determining if the system has the required controls in place and documenting your findings.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs