Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 3

CodeHS Lessons

Consult a variety of sources to analyze methods used to discover method of evidence collection to support legal cases involving computer related crime. Create a presentation highlighting methods used.

8.2 Malware Types and Prevention
13.1 Identifying Risks
5.2 Malware Types and Prevention
8.1 Identifying Risks
14.2 Malware Types and Prevention
16.1 Identifying Risks