Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 12

CodeHS Lessons

Demonstrate the use of wireless security protocols. Drawing on evidence from textbooks and other resources, evaluate the capabilities of WPA, WPA-2, and WEP and the effectiveness of the security protocols and demonstrate how to use them appropriately.

5.4 Protocols and Standards
3.3 Protocols and Standards
7.9 Protocols and Standards