Identify Whether High-Risk Systems Were Affected
Cyberscore

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cybersecurity professionals, students, career changers, and more, growing their careers on Cybrary.

Time
1 hour
Difficulty
Intermediate

The highest risk systems are the ones with Internet facing Applications. One an attacker from the Internet is able to compromise the internal network, then it is very likely they will attempt to move to other machines on the network. The machines in the Demilitarized Zone (DMZ) are at high risk because they are not usually as protected as the compu...

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cybersecurity professionals, students, career changers, and more, growing their careers on Cybrary.

This Virtual Lab is part of a Career Path: Become a Cyber Security Engineer

Overview

The highest risk systems are the ones with Internet facing Applications. One an attacker from the Internet is able to compromise the internal network, then it is very likely they will attempt to move to other machines on the network. The machines in the Demilitarized Zone (DMZ) are at high risk because they are not usually as protected as the computers which are part of the Internal Network.

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.