Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 11

CodeHS Lessons

Analyze attack methods on wireless networks. Read and interpret trade journals, assessing the usefulness of each source, to describe the different methods used. For example, cite evidence from trade journals to explain man in the middle, sniffing, and wireless SSID spoofing to explain their unique attack methods.

Standard
3.3 Protocols and Standards
5.1 Network Attacks
Standard
5.8 Protocols and Standards
8.3 Network Attacks
Standard
7.9 Protocols and Standards
Standard
8.1 Network Attacks
18.3 Protocols and Standards
Standard
8.9 Protocols and Standards
13.1 Network Attacks
Standard
5.4 Protocols and Standards
Standard
5.4 Protocols and Standards