Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 18

CodeHS Lessons

Explore and identify various assessment methods including but not limited to network penetration and vulnerability testing. Create a chart to define how these systems are designed to help identify weak links in a company’s cyber security chain and how they provide feedback and recommendations needed in order to address them.

Standard
8.1 Identifying Risks
8.4 Penetration Testing
Standard
13.1 Identifying Risks
13.4 Penetration Testing