Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 18

CodeHS Lessons

Explore and identify various assessment methods including but not limited to network penetration and vulnerability testing. Create a chart to define how these systems are designed to help identify weak links in a company’s cyber security chain and how they provide feedback and recommendations needed in order to address them.

12.1 Identifying Risks
12.4 Penetration Testing
13.1 Identifying Risks
13.4 Penetration Testing
13.1 Identifying Risks
13.4 Penetration Testing
8.1 Identifying Risks
8.4 Penetration Testing
16.1 Identifying Risks
16.4 Penetration Testing