Please enable JavaScript to use CodeHS

GA 6-8: CSS.DC.6-8.5.3

CodeHS Lessons

Identify phishing emails, insecure websites (e.g., not https), and risky links when on the Internet; build a positive digital footprint (e.g., blog, website, social media).

Standard
1.3 Impact of Cybersecurity
Standard
6.4 Cybersecurity
7.1 Digital Footprint and Reputation
Standard
5.1 Digital Footprint and Reputation
Standard
2.4 Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
Standard
1.1 Digital Footprint and Reputation
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
2.8 Network Administration
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
6.9 Network Attacks
6.10 Network Administration
Standard
5.9 Network Attacks
5.10 Network Administration
Standard
1.3 Impact of Cybersecurity
Standard
1.1 Digital Footprint and Reputation
4.4 Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.4 Cybersecurity
6.1 Digital Footprint and Reputation
Standard
2.4 Cybersecurity
Standard
2.1 Digital Footprint and Reputation
Standard
11.3 Impact of Cybersecurity