Control Assessment and Evaluation

CYBRScore
Cyberscore

You will review a list of security controls which are to be applied to systems on a fictitious corporate network. You will use security auditing tools to perform a real-world assessment of a system on this network, with the goal of determining if the system has the required controls in place and documenting your findings.

Time
1 hour
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

You will review a list of security controls which are to be applied to systems on a fictitious corporate network. You will use security auditing tools to perform a real-world assessment of a system on this network, with the goal of determining if the system has the required controls in place and documenting your findings.