Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 18

CodeHS Lessons

Explore and identify various assessment methods including but not limited to network penetration and vulnerability testing. Create a chart to define how these systems are designed to help identify weak links in a company’s cyber security chain and how they provide feedback and recommendations needed in order to address them.

Standard
8.1 Identifying Risks
8.4 Penetration Testing
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
12.1 Identifying Risks
12.4 Penetration Testing
Standard
13.1 Identifying Risks
13.4 Penetration Testing
Standard
15.1 Identifying Risks
15.4 Penetration Testing
Standard
13.1 Identifying Risks
13.4 Penetration Testing