Please enable JavaScript to use CodeHS

FL 6-8: SC.68.CS-PC.4.4

CodeHS Lessons

Identify threats and actions that protect devices from viruses, intrusion, vandalism, and other malicious activities

Standard
1.3 Browsers
Standard
12.3 Browsers
Standard
4.8 Application Security
6.10 Network Communication
Standard
6.4 Cybersecurity
7.7 Hacking Ethics
Standard
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
9.4 Privacy & Security
Standard
1.7 Hacking Ethics
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
5.12 Network Communication
Standard
1.6 Privacy & Security
21.3 Why encrypt?
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
Standard
2.4 Cybersecurity
Standard
2.7 Hacking Ethics
Standard
6.6 Application Security
7.6 Network Communication
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.6 Application Security
5.6 Network Communication
Standard
4.6 Application Security
6.6 Network Communication
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
3.6 Application Security
4.10 Network Communication
Standard
5.6 Privacy & Security
Standard
1.7 Hacking Ethics
4.4 Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.6 Cybersecurity
5.7 Hacking Ethics
Standard
4.6 Cybersecurity
5.7 Hacking Ethics
Standard
4.8 Application Security
6.10 Network Communication
Standard
8.5 Application Security
Standard
1.3 Browsers
Standard
4.8 Application Security
6.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
12.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
11.6 Network Communication
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
11.2 Browsers
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
9.6 Network Communication
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
10.6 Network Communication
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Browsers
Standard
1.3 Browsers
Standard
4.4 Cybersecurity
6.7 Hacking Ethics
Standard
1.6 Application Security
Standard
2.4 Privacy & Security
7.6 Application Security
10.6 Network Communication
Standard
5.7 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.6 Cybersecurity