Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 15

CodeHS Lessons

Research and analyze security awareness in an organization. Create a table or other graphic organizer that lists the following examples of how to manage user habits and expectations: a. Security policy training and procedures b. Personally identifiable information c. Information classifications d. Data labeling, handling, and disposal e. Compliance with laws, best practices, and standards f. User habits g. Threat awareness h. Use of social networking

7.2 Level 2: User Training
7.2 Level 2: User Training
2.4 Level 2: User Training