Please enable JavaScript to use CodeHS

Tennessee Coding I

Lesson 8.6 Checking for Vulnerabilities

Description

In this lesson, students learn about vulnerabilities, cyber threats, and attacks on networks and organizations. Students simulate identifying and exploiting vulnerabilities.


Objective

Students will be able to:

  • Run and analyze simulated nmap scans
  • Identify key vulnerabilities in a fictional organization
  • Develop plans to attack vulnerabilities