Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 35

CodeHS Lessons

Demonstrate the methods used to protect against unauthorized use of files. Configure file and folder permissions using both Windows and Linux environments.

Standard
4.10 System Administration
Standard
5.10 System Administration
Standard
1.9 System Administration
Standard
13.8 System Administration
Standard
6.8 System Administration
Standard
1.8 System Administration
Standard
3.8 System Administration
Standard
4.10 System Administration
Standard
4.10 System Administration
Standard
10.10 System Administration
Standard
7.8 System Administration
Standard
9.4 System Administration
Standard
6.8 System Administration
Standard
4.8 System Administration
Standard
1.8 System Administration
Standard
7.8 System Administration