Please enable JavaScript to use CodeHS

CA 6-8: 6-8.NI.6

CodeHS Lessons

Apply multiple methods of information protection to model the secure transmission of information.

Standard
1.4 Viewing Websites
12.6 Packets and Protocols
Standard
12.4 Viewing Websites
Standard
6.4 Cybersecurity
7.3 Internet Safety
7.4 Privacy & Security
Standard
5.3 Internet Safety
5.4 Privacy & Security
Standard
2.4 Cybersecurity
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
2.4 Cybersecurity
Standard
2.3 Internet Safety
2.4 Privacy & Security
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
10.3 Basic Crypto Systems: Caesar Cipher
10.4 Basic Crypto Systems: Cracking Caesar
10.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
7.1 Project: Secure the Company's Network
11.1 Cryptography, Cryptology, Cryptanalysis
11.4 Basic Crypto Systems: Caesar Cipher
11.5 Basic Crypto Systems: Cracking Caesar
11.6 Basic Crypto Systems: Vigenere Cipher
Standard
5.11 Project: Secure the Company's Network
Standard
1.3 Internet Safety
1.4 Privacy & Security
4.4 Cybersecurity
Standard
4.6 Cybersecurity
5.3 Internet Safety
5.4 Privacy & Security
Standard
4.6 Cybersecurity
5.3 Internet Safety
5.4 Privacy & Security
Standard
1.4 Viewing Websites
12.6 Packets and Protocols
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
1.4 Viewing Websites
8.6 Packets and Protocols
Standard
1.4 Viewing Websites
8.6 Packets and Protocols
Standard
4.4 Cybersecurity
6.3 Internet Safety
6.4 Privacy & Security
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
5.3 Internet Safety
5.4 Privacy & Security
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
Standard
4.6 Cybersecurity