Please enable JavaScript to use CodeHS

AK 6-8: 6.NI.C.01

CodeHS Lessons

Identify existing cybersecurity concerns with the Internet and systems it uses.

Standard
2.5 Future of Computing
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
8.10 SQL Injection Overview
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
2.5 Future of Computing
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
12.3 Future of Computing
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
4.5 Future of Computing
Standard
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
5.4 Future of Computing
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
Standard
1.6 Privacy & Security
4.5 Future of Computing
22.9 SQL Injection Overview
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
9.10 SQL Injection Overview
21.4 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
2.4 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.7 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
2.5 Future of Computing
Standard
1.4 Impact of Cybersecurity
2.4 Privacy & Security
8.7 SQL Injection Overview
Standard
2.6 Future of Computing
9.2 Impact of Cybersecurity
Standard
4.5 Future of Computing
7.7 The Impact of the Internet
10.4 Privacy & Security
14.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
3.7 The Impact of the Internet
7.8 Future of Computing
13.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.5 SQL Injection Overview
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.11 SQL Injection Overview
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity