Please enable JavaScript to use CodeHS

CT 3A: 3A-NI-07

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
11.9 Cybersecurity
Standard
15.4 The CIA Triad
15.4 The CIA Triad
Standard
1.4 The CIA Triad
1.4 The CIA Triad
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
11.6 Network Communication
11.7 Network Management
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
8.3 Risk Response
Standard
13.8 The CIA Triad
13.8 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
4.15 Network Management
Standard
1.2 The CIA Triad
1.2 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.5 Network Communication
1.8 Application Security
2.8 Securing a Network
2.8 Securing a Network
4.4 The CIA Triad
4.4 The CIA Triad
4.7 Hash Functions
4.7 Hash Functions
Standard
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.6 Common Security Problems
1.6 Common Security Problems
5.12 Network Communication
5.13 Network Management
Standard
11.9 Cybersecurity
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.12 Common Security Problems
1.12 Common Security Problems
21.2 History of Cryptography
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.2 History of Cryptography
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
8.4 The CIA Triad
8.4 The CIA Triad
Standard
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
7.6 Network Communication
7.7 Network Management
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
12.2 Assessing Risks
12.3 Risk Response
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
8.10 Cybersecurity
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
5.10 Securing a Network
5.10 Securing a Network
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
3.6 Application Security
4.10 Network Communication
4.12 Network Management
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.3 The CIA Triad
1.3 The CIA Triad
Standard
1.5 The CIA Triad
1.5 The CIA Triad
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
8.6 Common Security Problems
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
7.9 Cybersecurity
9.3 The CIA Triad
9.3 The CIA Triad
11.3 Network Management
Standard
14.4 The CIA Triad
14.4 The CIA Triad
Standard
1.6 Application Security
Standard
1.4 The CIA Triad
1.4 The CIA Triad
4.2 History of Cryptography
4.2 History of Cryptography
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
10.6 Network Communication
10.7 Network Management
14.5 Cross-site Scripting
14.5 Cross-site Scripting
16.2 Assessing Risks
16.3 Risk Response
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.4 The CIA Triad
1.4 The CIA Triad
4.6 Application Security
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.2 History of Cryptography
8.2 History of Cryptography
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
5.6 Cybersecurity