Control Assessment and Evaluation

You will review a list of security controls which are to be applied to systems on a fictitious corporate network. You will use security auditing tools to perform a real-world assessment of a system on this network, with the goal of determining if the system has the required controls in place and documenting your findings.

Overview

You will review a list of security controls which are to be applied to systems on a fictitious corporate network. You will use security auditing tools to perform a real-world assessment of a system on this network, with the goal of determining if the system has the required controls in place and documenting your findings.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs