Please enable JavaScript to use CodeHS

IN Advanced Cybersecurity: 7178.D1.3

CodeHS Lessons

Gain an understanding of how to investigate cybercrime from a technical perspective.

Standard
10.7 Network Management
15.2 Forensic Case 1: Logs
15.3 Forensic Case 2: File Metadata
15.4 Forensic Case 3: Exif Data
Standard
8.4 Penetration Testing
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
5.13 Network Management
9.2 Forensic Case 1: Logs
9.3 Forensic Case 2: File Metadata
9.4 Forensic Case 3: Exif Data
Standard
7.7 Network Management
12.4 Penetration Testing
Standard
4.12 Network Management
Standard
11.7 Network Management
13.4 Penetration Testing
20.2 Forensic Case 1: Logs
20.3 Forensic Case 2: File Metadata
20.4 Forensic Case 3: Exif Data
Standard
11.3 Network Management
Standard
10.7 Network Management
13.4 Penetration Testing
17.2 Forensic Case 1: Logs
17.3 Forensic Case 2: File Metadata
17.4 Forensic Case 3: Exif Data