Please enable JavaScript to use CodeHS

AL 9-12: 36

CodeHS Lessons

Explain the tradeoffs when selecting and implementing cybersecurity recommendations. Examples: Two-factor authentication, password requirements, geolocation requirements.

Standard
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.10 Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
16.2 Assessing Risks
16.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration