Please enable JavaScript to use CodeHS

CompTIA Security: 2.2

CodeHS Lessons

Given a scenario, use appropriate software tools to assess the security posture of an organization.

Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
10.6 Checking for Vulnerabilities
10.7 Risky Business
Standard
11.6 Checking for Vulnerabilities
11.7 Risky Business
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
7.7 Risky Business
Standard
6.6 Checking for Vulnerabilities
6.7 Risky Business