Please enable JavaScript to use CodeHS

CA Networking: B8.4

CodeHS Lessons

Identify common potential risks and entrance points, including internal and external risks, and the tools used to neutralize them: firewalls; monitoring; and antivirus, spyware, and spam protection.

Standard
4.8 Application Security
Standard
3.1 Network Administrator
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
5.8 Application Security
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.8 Application Security
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
5.11 Network Administrator
8.2 Impact of Cybersecurity
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
13.6 Application Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
8.10 Cybersecurity
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
3.6 Application Security
4.8 Network Administrator
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
10.8 Application Security
Standard
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
7.6 Application Security
18.1 Network Administrator
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
4.6 Application Security
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity
5.7 Network Administrator
Standard
5.6 Cybersecurity
5.7 Network Administrator
Standard
1.6 Application Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.6 Application Security
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?