Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 3

CodeHS Lessons

Consult a variety of sources to analyze methods used to discover method of evidence collection to support legal cases involving computer related crime. Create a presentation highlighting methods used.

Standard
5.2 Malware Types and Prevention
8.1 Identifying Risks
Standard
8.4 Malware Types and Prevention
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
12.1 Identifying Risks
Standard
8.2 Malware Types and Prevention
13.1 Identifying Risks
Standard
13.2 Malware Types and Prevention
15.1 Identifying Risks
Standard
13.1 Identifying Risks