Please enable JavaScript to use CodeHS

AR 9-12: CSL2.8.4

CodeHS Lessons

Identify digital and physical methods used to secure networks

Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
3.2 Environmental Controls
5.5 Cross-site Scripting
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.7 Privacy & Security
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
6.8 Application Security
6.9 Browser Configuration
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.8 Application Security
2.8 Network Administration
4.1 What is Cybersecurity?
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
6.9 Environmental Controls
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
6.6 Application Security
6.7 Browser Configuration
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
3.6 Application Security
3.7 Browser Configuration
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
8.4 Privacy & Security
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
1.7 Browser Configuration
Standard
1.2 What is Cybersecurity?
1.4 Environmental Controls
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
10.8 Application Security
10.9 Browser Configuration
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
18.2 Environmental Controls
Standard
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
13.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.6 Application Security
1.7 Browser Configuration
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security