Overview
Students will conduct scans against a web server, a file share, a printer and a user's host device. The student will identify specific threats posed to the system. Students will then scan a network and identify potential points of ingress (open ports, etc) that could cause compromise to the system.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs