- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
Tennessee Cybersecurity I: 3
CodeHS Lessons
Consult a variety of sources to analyze security threats, vulnerabilities, and exploits. Research common ways that threats, vulnerabilities, and exploits impact an organization. For example, research and report on the threats, vulnerabilities, and exploit(s) used in a recent high profile breach.
Standard |
8.6 Checking for Vulnerabilities |
8.7 Risky Business |
Standard |
13.9 Impact of Cybersecurity |
Standard |
15.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
1.2 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
4.2 Impact of Cybersecurity |
Standard |
8.2 Impact of Cybersecurity |
Standard |
8.3 Impact of Cybersecurity |
Standard |
11.2 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
16.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
8.6 Checking for Vulnerabilities |
8.7 Risky Business |
Standard |
8.6 Checking for Vulnerabilities |
8.7 Risky Business |
Standard |
13.3 Impact of Cybersecurity |
Standard |
11.3 Impact of Cybersecurity |
Standard |
1.4 Impact of Cybersecurity |
Standard |
9.2 Impact of Cybersecurity |
Standard |
15.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company