Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 4

CodeHS Lessons

Read and interpret technical information to define risk management and how it applies to information security. Examine a case study of a company using a systematic approach for the identification, assessment and management of information security risks and compile a brief narrative summarizing conclusions.

Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.1 Identifying Risks
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
12.1 Identifying Risks
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
13.1 Identifying Risks
Standard
15.1 Identifying Risks
Standard
13.1 Identifying Risks