Security Policy
You'll be introduced to some comprehensive security sub-policies.
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.
Talking Safely Online
Teams of students play together to win!
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Unit 7 Vocabulary - IT Security
Try to collect as many vegetables as you can to make your own delicious chakalaka!
Virus Match
By MJ Tech Support
Vulnerability Assessment & Attack Mitigation Terms
You'll focus on information relating to vulnerability assessments and attack mitigation.