Please enable JavaScript to use CodeHS

CompTIA ITF: 6.2

CodeHS Lessons

Explain methods to secure devices and best practices.

Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
5.8 Application Security
5.9 Browser Configuration
5.10 System Administration
Standard
1.8 Application Security
1.9 System Administration
Standard
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
Standard
3.6 Personal Data Security
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.6 Application Security
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.8 Browser Configuration
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
8.5 Application Security
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
5.5 Personal Data Security
5.7 Common Cyber Attacks and Prevention
10.8 Application Security
10.9 Browser Configuration
10.10 System Administration
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
9.4 System Administration
Standard
6.6 Application Security
Standard
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
4.5 Personal Data Security
4.7 Common Cyber Attacks and Prevention
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration