Please enable JavaScript to use CodeHS

FL CSD: CS-PC.1.4

CodeHS Lessons

Explain the principles of cryptography by examining encryption, digital signatures, and authentication methods (e.g., explain why and how certificates are used with “https” for authentication and encryption).

1.1 What is Cybersecurity?
1.2 The CIA Triad
13.1 What is Cybersecurity?
13.8 The CIA Triad
15.2 What is Cybersecurity?
15.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
14.2 What is Cybersecurity?
14.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
8.2 What is Cybersecurity?
8.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 What is Cybersecurity?
1.5 The CIA Triad
4.1 Cryptography, Cryptology, Cryptanalysis
5.7 Digital Certificates
1.2 What is Cybersecurity?
1.4 The CIA Triad
8.1 Cryptography, Cryptology, Cryptanalysis
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
4.7 Digital Certificates
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 What is Cybersecurity?
1.3 The CIA Triad
4.1 What is Cybersecurity?
4.4 The CIA Triad
4.6 Cryptography, Cryptology, Cryptanalysis
1.2 What is Cybersecurity?
1.4 The CIA Triad
4.1 Cryptography, Cryptology, Cryptanalysis
4.8 Digital Certificates
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
21.1 Cryptography, Cryptology, Cryptanalysis
11.1 Cryptography, Cryptology, Cryptanalysis
1.7 Digital Certificates