Please enable JavaScript to use CodeHS

GA CYB: IT-ICS-8.7

CodeHS Lessons

Demonstrate knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities and how to differentiate between types of application attacks. [NICE 150]

Standard
1.6 Cybersecurity Essentials
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
5.1 Network Attacks
Standard
3.7 Cybersecurity Essentials
Standard
1.6 Cybersecurity Essentials
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
1.6 Cybersecurity Essentials
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
5.6 Cybersecurity Essentials
Standard
8.1 Network Attacks
Standard
13.1 Network Attacks
Standard
4.6 Cybersecurity Essentials