Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 12

CodeHS Lessons

Demonstrate the use of wireless security protocols. Drawing on evidence from textbooks and other resources, evaluate the capabilities of WPA, WPA-2, and WEP and the effectiveness of the security protocols and demonstrate how to use them appropriately.

Standard
3.3 Protocols and Standards
Standard
5.8 Protocols and Standards
Standard
7.9 Protocols and Standards
Standard
18.3 Protocols and Standards
Standard
8.9 Protocols and Standards
Standard
5.4 Protocols and Standards
Standard
5.4 Protocols and Standards