Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-2.1

CodeHS Lessons

Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.

Standard
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks
Standard
13.9 Impact of Cybersecurity
Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.7 Privacy & Security
12.10 SQL Injection Overview
Standard
5.8 Application Security
5.9 Browser Configuration
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
1.6 Privacy & Security
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
14.10 SQL Injection Overview
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.10 SQL Injection Overview
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
10.10 SQL Injection Overview
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
8.5 Application Security
Standard
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
10.9 Browser Configuration
10.10 System Administration
Standard
4.4 Privacy & Security
11.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
1.4 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.2 Assessing Risks
Standard
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
10.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.5 SQL Injection Overview
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
13.6 Internal Threats
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.11 SQL Injection Overview
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.10 SQL Injection Overview
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security