Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.7a

CodeHS Lessons

Identify examples of threats to systems and data.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
4.8 Application Security
Standard
5.5 Cross-site Scripting
7.4 Level 4: Data and Licenses
8.1 Identifying Risks
8.2 Assessing Risks
Standard
13.7 Network Attacks
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
5.8 Application Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
6.6 Application Security
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
11.4 Level 4: Data and Licenses
12.1 Identifying Risks
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.9 Network Attacks
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
5.9 Network Attacks
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
Standard
5.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
19.4 Level 4: Data and Licenses
Standard
7.9 Cybersecurity
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
13.5 Cross-site Scripting
14.4 Level 4: Data and Licenses
15.1 Identifying Risks
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
7.4 Level 4: Data and Licenses
13.1 Identifying Risks
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.6 Application Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security