Career and Technical Education (2022) Grade(s): 10-12 - Information Technology

CTE22.IT.C3.21

Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.

COS Examples

Examples: malware, unpatched security vulnerabilities, hidden backdoor programs, superuser or Admin Account privileges

ALSDE LOGO