Overview
You will review a list of security controls which are to be applied to systems on a fictitious corporate network. You will use security auditing tools to perform a real-world assessment of a system on this network, with the goal of determining if the system has the required controls in place and documenting your findings.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468ec0d8cabf844bb85c4c6_Control_Assessment_and_Evaluation.png)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs