Please enable JavaScript to use CodeHS

Arizona CTE Software and App Development: 2.1

CodeHS Lessons

Identify common computer threats (e.g., viruses, phishing, suspicious email, social engineering, spoofing, identity theft, and spamming)

Standard
4.8 Application Security
Standard
1.2 Impact of Cybersecurity
Standard
5.8 Application Security
Standard
1.8 Application Security
Standard
13.6 Application Security
Standard
6.6 Application Security
Standard
1.6 Application Security
Standard
3.6 Application Security
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
10.8 Application Security
Standard
7.6 Application Security
Standard
6.6 Application Security
Standard
4.6 Application Security
Standard
1.6 Application Security
Standard
7.6 Application Security