Please enable JavaScript to use CodeHS

IN Advanced Cybersecurity: 7178.D1.3

CodeHS Lessons

Gain an understanding of how to investigate cybercrime from a technical perspective.

Standard
6.11 Network Management
8.6 Checking for Vulnerabilities
Standard
8.4 Penetration Testing
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
5.13 Network Management
9.2 Forensic Case 1: Logs
9.3 Forensic Case 2: File Metadata
9.4 Forensic Case 3: Exif Data
Standard
7.7 Network Management
12.4 Penetration Testing
Standard
4.12 Network Management
Standard
6.11 Network Management
8.6 Checking for Vulnerabilities
Standard
6.11 Network Management
8.6 Checking for Vulnerabilities
Standard
11.7 Network Management
13.4 Penetration Testing
20.2 Forensic Case 1: Logs
20.3 Forensic Case 2: File Metadata
20.4 Forensic Case 3: Exif Data
Standard
11.3 Network Management
Standard
10.7 Network Management
13.4 Penetration Testing
17.2 Forensic Case 1: Logs
17.3 Forensic Case 2: File Metadata
17.4 Forensic Case 3: Exif Data
Standard
10.7 Network Management
15.2 Forensic Case 1: Logs
15.3 Forensic Case 2: File Metadata
15.4 Forensic Case 3: Exif Data