Incident Response Plan Steps
You'll learn the steps necessary to create an incident response plan.
Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Hardening Windows Process
You'll learn to recognize the steps in the Hardening Windows Process.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
Security Control Process
You'll learn the five steps to the Security Control Process.
Group Policy Object Order
You'll learn to identify group policy object layers and the order they're applied.
Online Security
CEIS - Etech Activity Quiz for ABM, HUMMS and STEM
PWNed or Protected?
"PWNed or Protected?" is a fast-paced cybersecurity knowledge game where players test their ability to identify vulnerabilities, recognize threats, and defend against cyberattacks. Challenge yourself in a battle of wits to determine if you’re a cybersecurity pro—or just another easy target. Will you secure the network, or will you get PWNed?
Scam and Digital Forgery
Provide knowledge about what is scam and digital forgery and how it works.
NETWORK word
memory match