Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 2

CodeHS Lessons

Using news articles, research current events on breaches; focus on particular Information Assurance (IA) areas that were compromised. For example, research and report on the effects of unethical security breaches on a business citing specific textual evidence.

Standard
5.2 Malware Types and Prevention
Standard
13.9 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
8.4 Malware Types and Prevention
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
11.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
8.2 Malware Types and Prevention
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
13.2 Malware Types and Prevention
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity