Please enable JavaScript to use CodeHS

Oklahoma Computer Science I

Lesson 8.3 Security in Coding

Activities

These are all the activities included in the lesson

8.3.1 SQL Injection
8.3.2 SQL Injection Practice
8.3.3 Can you gain access?
8.3.4 Cross Site Scripting (XSS)
8.3.5 XSS Response
8.3.6 XSS Tutorial
8.3.7 Input Validation
8.3.8 Input Validation Response
8.3.9 Buffer and Integer Overflow
8.3.10 Buffer and Integer Overflow Response