Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 9

CodeHS Lessons

In teams, examine trade journals and research literature from product vendors to develop a simple public key infrastructure to be used by a small business. For example, show how an organization can use digital certificates, encrypted file transfers and email utilizing encryption.