Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 3

CodeHS Lessons

Consult a variety of sources to analyze methods used to discover method of evidence collection to support legal cases involving computer related crime. Create a presentation highlighting methods used.

Standard
5.2 Malware Types and Prevention
8.1 Identifying Risks
Standard
13.1 Identifying Risks