Cybersecurity Vocabulary Review
CEIS - Etech Activity Quiz for ABM, HUMMS and STEM
Security Control Process
You'll learn the five steps to the Security Control Process.
Securing Computers from Threats
You'll be introduced to how you can secure computers against future threats.
Incident Response Plan Steps
You'll learn the steps necessary to create an incident response plan.
Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Hardening Windows Process
You'll learn to recognize the steps in the Hardening Windows Process.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
Group Policy Object Order
You'll learn to identify group policy object layers and the order they're applied.
Managing File & Directory Permissions (Linux)
This game will help players manage file and directory permissions within the Linux operating system.