Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-4.3

CodeHS Lessons

Distinguish between reconnaissance/footprinting, infiltration, network breach, network exploitation, and attack for effects (e.g., deceive, disrupt, degrade, and destroy).

Standard
8.1 Identifying Risks
8.4 Penetration Testing
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
12.1 Identifying Risks
12.4 Penetration Testing
Standard
13.1 Identifying Risks
13.4 Penetration Testing
Standard
15.1 Identifying Risks
15.4 Penetration Testing
Standard
13.1 Identifying Risks
13.4 Penetration Testing