Please enable JavaScript to use CodeHS

CompTIA ITF: 6.6

CodeHS Lessons

Explain common uses of encryption.

Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.4 Authentication Methods
5.7 How Do Websites Work?
8.1 Data as a Resource
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
4.7 How Do Websites Work?
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
5.7 How Do Websites Work?
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
12.1 Project: Classic Cipher Newscast
Standard
2.7 How Do Websites Work?
3.2 Data as a Resource
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
5.8 How Do Websites Work?
8.1 Data as a Resource
Standard
2.1 Cryptography: Then, Now, and Future
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
5.8 How Do Websites Work?
8.1 Data as a Resource
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
11.7 How Do Websites Work?
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography