Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 26

CodeHS Lessons

Analyze and research the features and uses of command line utilities to configure and examine networking services and construct a flow chart that a security analyst could reference.

Standard
7.9 Command Line Interface
10.7 Network Management
Standard
6.11 Command Line Interface
Standard
4.14 Command Line Interface
4.15 Network Management
Standard
3.14 Command Line Interface
3.15 Network Management
Standard
5.13 Network Management
Standard
13.9 Command Line Interface
Standard
6.9 Command Line Interface
7.7 Network Management
Standard
3.9 Command Line Interface
5.7 Network Management
Standard
1.9 Command Line Interface
Standard
3.9 Command Line Interface
4.12 Network Management
Standard
10.11 Command Line Interface
12.11 Network Management
Standard
7.10 Command Line Interface
11.7 Network Management
Standard
11.2 Command Line Interface
11.3 Network Management
Standard
6.9 Command Line Interface
9.7 Network Management
Standard
4.9 Command Line Interface
10.7 Network Management
Standard
1.9 Command Line Interface