Please enable JavaScript to use CodeHS

CT 3B: 3B-AP-18

CodeHS Lessons

Explain security issues that might lead to compromised computer programs.

Standard
11.9 Cybersecurity
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.10 SQL Injection Overview
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
Standard
13.7 Network Attacks
13.7 Network Attacks
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
11.1 Inside Web Apps
11.2 Developer Tools
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
6.8 Application Security
6.8 Application Security
6.9 Browser Configuration
6.10 System Administration
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.8 Application Security
1.8 Application Security
1.9 System Administration
4.3 Hacking Ethics
4.3 Hacking Ethics
4.6 Cryptography, Cryptology, Cryptanalysis
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
8.3 Network Attacks
8.4 Malware Types and Prevention
8.6 Additional Attacks
Standard
11.9 Cybersecurity
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.7 Network Attacks
8.7 Network Attacks
21.2 History of Cryptography
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
22.9 SQL Injection Overview
21.1 Cryptography, Cryptology, Cryptanalysis
22.2 Developer Tools
22.1 Inside Web Apps
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
21.8 Hash Functions
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
22.9 SQL Injection Overview
21.7 Advanced Cryptography
22.2 Developer Tools
22.1 Inside Web Apps
21.10 Project: Classic Cipher Newscast
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
12.7 Hacking Ethics
12.7 Hacking Ethics
13.6 Application Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
14.1 Inside Web Apps
14.1 Inside Web Apps
14.2 Developer Tools
14.2 Developer Tools
14.9 Common Security Problems
14.9 Common Security Problems
14.10 SQL Injection Overview
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
14.11 Types of SQLi and Prevention
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.1 Inside Web Apps
9.1 Inside Web Apps
9.2 Developer Tools
9.2 Developer Tools
9.9 Common Security Problems
9.9 Common Security Problems
9.10 SQL Injection Overview
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
22.1 Project: Public Service Announcement
10.1 Project: Security Assessment Report
21.7 Hacking Ethics
21.7 Hacking Ethics
10.1 Project: Security Assessment Report
22.1 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
2.3 Asymmetric Encryption
3.6 Application Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
8.10 Cybersecurity
Standard
8.5 Project: Public Service Announcement
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
8.5 Project: Public Service Announcement
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.7 Hacking Ethics
1.7 Hacking Ethics
2.1 Project: Public Service Announcement
2.1 Project: Public Service Announcement
6.9 Network Attacks
6.9 Network Attacks
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.1 Inside Web Apps
10.2 Developer Tools
10.2 Developer Tools
10.9 Common Security Problems
10.9 Common Security Problems
10.10 SQL Injection Overview
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
10.12 Cross-site Scripting
11.1 Cryptography, Cryptology, Cryptanalysis
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
11.2 History of Cryptography
11.7 Advanced Cryptography
11.7 Advanced Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.9 Network Attacks
5.9 Network Attacks
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
3.6 Application Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.8 Browser Configuration
5.13 Hacking Ethics
5.13 Hacking Ethics
5.14 Project: Public Service Announcement
5.14 Project: Public Service Announcement
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
17.2 Developer Tools
9.1 Project: Security Assessment Report
17.1 Inside Web Apps
17.2 Developer Tools
9.1 Project: Security Assessment Report
17.1 Inside Web Apps
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
1.5 Project: Public Service Announcement
1.5 Project: Public Service Announcement
2.4 Hacking Ethics
2.4 Hacking Ethics
Standard
10.7 Project: Public Service Announcement
Standard
4.7 Project: Public Service Announcement
Standard
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
13.1 Network Attacks
13.2 Malware Types and Prevention
13.4 Additional Attacks
13.5 Cross-site Scripting
15.2 Assessing Risks
Standard
1.8 Hacking Ethics
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.2 Inside Web Apps
5.2 Inside Web Apps
5.3 Developer Tools
5.3 Developer Tools
5.10 Common Security Problems
5.10 Common Security Problems
5.11 SQL Injection Overview
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
13.2 Assessing Risks
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
3.11 Hacking Ethics
3.11 Hacking Ethics
3.12 Project: Public Service Announcement
3.12 Project: Public Service Announcement