Please enable JavaScript to use CodeHS

Oklahoma Cybersecurity

Lesson 8.6 Checking for Vulnerabilities

Activities

These are all the activities included in the lesson

8.6.1 Vulnerabilities, Cyber Threats, and Attacks
8.6.2 Checking for Vulnerabilities
8.6.3 To Open, or Not To Open
8.6.4 Pen Test Simulation: Intro and Passive Recon
8.6.5 Active Reconnaissance
8.6.6 Active Recon Notes
8.6.7 Exploit Vulnerabilities
8.6.8 Pen Testing Report