Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 5

CodeHS Lessons

Analyze methods to handle malware, such as how to control access to secured resources and computer resources. Give specific examples of methods that a security analyst can use, like encryption techniques, basic input/output system (BIOS) features, and strategies for dealing with malware.

Standard
5.2 Malware Types and Prevention
Standard
8.4 Malware Types and Prevention
Standard
8.2 Malware Types and Prevention
Standard
13.2 Malware Types and Prevention