Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 5

CodeHS Lessons

Analyze methods to handle malware, such as how to control access to secured resources and computer resources. Give specific examples of methods that a security analyst can use, like encryption techniques, basic input/output system (BIOS) features, and strategies for dealing with malware.

8.2 Malware Types and Prevention
14.2 Malware Types and Prevention
5.2 Malware Types and Prevention