Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 15

CodeHS Lessons

Research and analyze security awareness in an organization. Create a table or other graphic organizer that lists the following examples of how to manage user habits and expectations: a. Security policy training and procedures b. Personally identifiable information c. Information classifications d. Data labeling, handling, and disposal e. Compliance with laws, best practices, and standards f. User habits g. Threat awareness h. Use of social networking

Standard
7.2 Level 2: User Training
Standard
11.2 Level 2: User Training
Standard
2.4 Level 2: User Training
Standard
19.2 Level 2: User Training
Standard
14.2 Level 2: User Training
Standard
7.2 Level 2: User Training