Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 35

CodeHS Lessons

Demonstrate the methods used to protect against unauthorized use of files. Configure file and folder permissions using both Windows and Linux environments.

Standard
7.8 System Administration
Standard
1.9 System Administration
Standard
6.8 System Administration
Standard
1.8 System Administration
Standard
3.8 System Administration
Standard
7.8 System Administration
Standard
9.4 System Administration
Standard
1.8 System Administration
Standard
6.8 System Administration
Standard
4.8 System Administration