Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-4.3

CodeHS Lessons

Distinguish between reconnaissance/footprinting, infiltration, network breach, network exploitation, and attack for effects (e.g., deceive, disrupt, degrade, and destroy).

Standard
8.1 Identifying Risks
8.4 Penetration Testing
Standard
13.1 Identifying Risks
13.4 Penetration Testing