Please enable JavaScript to use CodeHS

CYBER ORG 9-12: 9-12.DC.THRT

CodeHS Lessons

Analyze the motives of threat actors. Clarification statement: At this level, student discussions should focus on previous standards as well as grade-appropriate examples of motives of threat actors such as financial, political, ideological, or simple malice. This analysis may occur in a variety of forms, such as supplying a scenario or case study from current events.

Standard
2.7 Hacking Ethics
Standard
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.5 Hacking Ethics
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
Standard
1.11 Hacking Ethics
Standard
12.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.7 Hacking Ethics
8.2 Malware Types and Prevention
Standard
2.7 Hacking Ethics
13.2 Malware Types and Prevention
13.3 Common Network Attacks
13.4 Additional Attacks
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
3.11 Hacking Ethics