Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-2.2

CodeHS Lessons

Investigate potential abuse and unethical uses of computers and networks.

Standard
1.4 Cyber Ethics and Laws
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
1.11 Hacking Ethics
12.10 SQL Injection Overview
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.4 Privacy & Security
12.7 Hacking Ethics
14.10 SQL Injection Overview
Standard
3.5 Cyber Ethics and Laws
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.10 SQL Injection Overview
12.2 Assessing Risks
21.7 Hacking Ethics
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
8.4 Privacy & Security
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
10.10 SQL Injection Overview
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
1.4 Cyber Ethics and Laws
Standard
1.4 Cyber Ethics and Laws
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.4 Cyber Ethics and Laws
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
8.1 Network Attacks
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.2 Assessing Risks
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
2.4 Hacking Ethics
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
7.5 SQL Injection Overview
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
13.6 Internal Threats
15.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
5.11 SQL Injection Overview
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
8.10 SQL Injection Overview
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics