Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 19

CodeHS Lessons

Identify and explain the uses for security testing tools. Demonstrate and compare the effectiveness of Nessus and Nmap. Write and explanation and justify conclusions by citing supporting evidence from technical manuals vendor resources.

Standard
8.1 Identifying Risks
Standard
3.7 Identifying Risks
Standard
12.1 Identifying Risks
Standard
13.1 Identifying Risks
Standard
16.1 Identifying Risks
Standard
13.1 Identifying Risks