Please enable JavaScript to use CodeHS

CSTA 3A: 3A-NI-06

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.13 Project: Public Service Announcement
13.1 What is Cybersecurity?
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.4 Privacy & Security
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
10.7 Project: Public Service Announcement
14.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
8.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
2.2 History of Cryptography
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.2 History of Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
13.2 Assessing Risks
13.3 Risk Response
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
3.1 Project: Public Service Announcement
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
8.2 History of Cryptography
13.2 Assessing Risks
13.3 Risk Response
1.2 What is Cybersecurity?
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.4 Hash Functions
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
12.2 Assessing Risks
12.3 Risk Response
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
22.1 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
1.13 Project: Public Service Announcement
2.8 Securing a Network
4.1 What is Cybersecurity?
4.5 Privacy & Security
4.7 Hash Functions
5.1 Project: Public Service Announcement
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
14.5 Cross-site Scripting
15.1 Project Security Assessment Report
16.2 Assessing Risks
16.3 Risk Response
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.2 What is Cybersecurity?
2.1 Privacy & Security
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
3.1 Project: Public Service Announcement
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.12 Common Security Problems
1.13 Project: Public Service Announcement
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
12.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.8 Project: Public Service Announcement
5.10 Securing a Network
5.11 Project: Secure the Company's Network
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.6 Common Security Problems
9.3 Collecting and Storing Data
1.3 Advanced Cryptography
1.4 Hash Functions
5.5 Cross-site Scripting
6.1 Project Security Assessment Report
8.2 Assessing Risks
8.3 Risk Response
4.1 Collecting and Storing Data