Please enable JavaScript to use CodeHS

SC CYB: F.7

CodeHS Lessons

Compare and contrast the various types of security, e.g., physical security, technological, and administrative.

Standard
1.7 Common Cyber Attacks and Prevention
4.10 System Administration
8.5 Environmental Controls
Standard
3.2 Environmental Controls
Standard
5.10 System Administration
Standard
1.9 System Administration
Standard
6.9 Environmental Controls
Standard
13.8 System Administration
Standard
6.8 System Administration
Standard
1.7 Common Cyber Attacks and Prevention
2.3 Asymmetric Encryption
3.8 System Administration
Standard
1.7 Common Cyber Attacks and Prevention
2.3 Asymmetric Encryption
4.8 System Administration
Standard
1.8 System Administration
Standard
1.4 Environmental Controls
3.8 System Administration
Standard
1.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
2.3 Asymmetric Encryption
4.10 System Administration
8.5 Environmental Controls
Standard
1.7 Common Cyber Attacks and Prevention
2.3 Asymmetric Encryption
4.10 System Administration
8.5 Environmental Controls
Standard
5.7 Common Cyber Attacks and Prevention
10.10 System Administration
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
7.8 System Administration
18.2 Environmental Controls
Standard
9.4 System Administration
Standard
6.8 System Administration
Standard
4.8 System Administration
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.8 System Administration
Standard
7.8 System Administration