Please enable JavaScript to use CodeHS

AL 9-12: 36

CodeHS Lessons

Explain the tradeoffs when selecting and implementing cybersecurity recommendations. Examples: Two-factor authentication, password requirements, geolocation requirements.

5.6 Cybersecurity
7.8 Browser Configuration
5.6 Cybersecurity
6.8 Browser Configuration
1.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
16.2 Assessing Risks
16.3 Risk Response
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
1.6 Privacy & Security
9.4 Privacy & Security
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
4.4 Privacy & Security
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
1.6 Privacy & Security
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
8.2 Assessing Risks
8.3 Risk Response