Please enable JavaScript to use CodeHS

TX Foundations of Cyber: 127.792.d.14.f

CodeHS Lessons

analyze the purpose of event logs and identify suspicious activity

Standard
6.11 Network Management
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
5.13 Network Management
Standard
7.7 Network Management
Standard
4.12 Network Management
Standard
6.11 Network Management
Standard
6.11 Network Management
Standard
11.7 Network Management
Standard
11.3 Network Management
Standard
12.1 Digital Forensics
12.2 Forensic Case 1: Logs
Standard
10.7 Network Management
Standard
10.7 Network Management