Please enable JavaScript to use CodeHS

CSTA 3A: 3A-NI-08

CodeHS Lessons

Explain tradeoffs when selecting and implementing cybersecurity recommendations.

1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
12.1 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
10.1 Digital Footprint and Reputation
10.4 Privacy & Security
10.7 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
6.6 Application Security
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
12.2 Assessing Risks
12.3 Risk Response
21.1 Digital Footprint and Reputation
21.4 Privacy & Security
22.1 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
14.5 Cross-site Scripting
16.2 Assessing Risks
16.3 Risk Response
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
10.1 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
13.2 Assessing Risks
13.3 Risk Response
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
3.1 Project: Public Service Announcement
5.4 Hash Functions
7.6 Application Security
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
13.2 Assessing Risks
13.3 Risk Response
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.8 Project: Public Service Announcement
5.10 Securing a Network
5.11 Project: Secure the Company's Network
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.13 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Common Security Problems
1.13 Project: Public Service Announcement
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
3.1 Project: Public Service Announcement
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.6 Common Security Problems
1.8 Application Security
2.8 Securing a Network
4.5 Privacy & Security
4.7 Hash Functions
5.1 Project: Public Service Announcement
2.1 Privacy & Security
3.6 Application Security
1.4 Hash Functions
5.5 Cross-site Scripting
8.2 Assessing Risks
8.3 Risk Response
1.6 Application Security