Please enable JavaScript to use CodeHS

FL CSD: CS-PC.1.6

CodeHS Lessons

Describe computer security vulnerabilities and methods of attack, and evaluate their social and economic impact on computer systems and people.

1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
10.4 Privacy & Security
14.2 What is Cybersecurity?
14.4 The CIA Triad
14.3 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.4 Privacy & Security
21.7 Hacking Ethics
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
14.1 Network Attacks
14.4 Additional Attacks
14.5 Cross-site Scripting
16.2 Assessing Risks
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.4 The CIA Triad
8.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
15.3 Impact of Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
4.4 Privacy & Security
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
8.1 Network Attacks
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
13.2 Assessing Risks
2.4 Privacy & Security
2.7 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.7 Privacy & Security
1.12 Hacking Ethics
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.8 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
1.5 Privacy & Security
13.1 What is Cybersecurity?
13.8 The CIA Triad
13.9 Impact of Cybersecurity
5.1 Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
8.2 Assessing Risks