Mounting - Linux
You'll be introduced to terms related to mounting in the Linux OS.
Basics of Wireless Security
This rapid fire game addresses the basics of wireless security.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Securing Computers from Threats
You'll be introduced to how you can secure computers against future threats.
Incident Response Plan Steps
You'll learn the steps necessary to create an incident response plan.
Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Hardening Windows Process
You'll learn to recognize the steps in the Hardening Windows Process.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
Security Control Process
You'll learn the five steps to the Security Control Process.