Please enable JavaScript to use CodeHS

CSTA 3A: 3A-NI-07

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

1.2 The CIA Triad
1.12 Common Security Problems
21.2 History of Cryptography
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
8.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
5.2 History of Cryptography
13.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.4 Hash Functions
6.6 Application Security
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
12.2 Assessing Risks
12.3 Risk Response
1.4 The CIA Triad
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
14.5 Cross-site Scripting
16.2 Assessing Risks
16.3 Risk Response
1.4 The CIA Triad
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
8.2 History of Cryptography
13.2 Assessing Risks
13.3 Risk Response
1.5 The CIA Triad
4.2 History of Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
7.6 Application Security
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
13.2 Assessing Risks
13.3 Risk Response
1.2 The CIA Triad
2.2 History of Cryptography
1.4 The CIA Triad
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
1.3 Advanced Cryptography
1.4 Hash Functions
5.5 Cross-site Scripting
8.2 Assessing Risks
8.3 Risk Response
1.8 Application Security
2.8 Securing a Network
4.4 The CIA Triad
4.7 Hash Functions
5.10 Securing a Network
5.11 Project: Secure the Company's Network
13.8 The CIA Triad
15.4 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.6 Application Security
3.6 Application Security