Please enable JavaScript to use CodeHS

CT 3A: 3A-NI-08

CodeHS Lessons

Explain tradeoffs when selecting and implementing cybersecurity recommendations.

1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
10.1 Digital Footprint and Reputation
10.1 Digital Footprint and Reputation
10.4 Privacy & Security
10.4 Privacy & Security
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
12.2 Assessing Risks
12.3 Risk Response
21.1 Digital Footprint and Reputation
21.4 Privacy & Security
22.1 Project: Public Service Announcement
21.1 Digital Footprint and Reputation
21.4 Privacy & Security
22.1 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.6 Application Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
10.6 Network Communication
14.5 Cross-site Scripting
14.5 Cross-site Scripting
16.2 Assessing Risks
16.3 Risk Response
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
10.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.6 Common Security Problems
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
11.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.10 Securing a Network
5.10 Securing a Network
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.7 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
11.6 Network Communication
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.6 Common Security Problems
1.5 Network Communication
1.8 Application Security
1.8 Application Security
1.9 System Administration
2.8 Securing a Network
2.8 Securing a Network
4.5 Privacy & Security
4.5 Privacy & Security
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
5.7 Privacy & Security
5.7 Privacy & Security
2.1 Privacy & Security
2.1 Privacy & Security
3.6 Application Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Hash Functions
1.4 Hash Functions
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
8.3 Risk Response
1.6 Application Security
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
5.6 Cybersecurity
7.8 Browser Configuration
5.6 Cybersecurity
6.8 Browser Configuration