Please enable JavaScript to use CodeHS

GA CYB: IT-ICS-8.10

CodeHS Lessons

Prevent input validation attacks and scripting attacks.

9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
12.2 Assessing Risks
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
13.2 Assessing Risks
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
13.2 Assessing Risks
5.5 Cross-site Scripting
8.2 Assessing Risks
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
14.5 Cross-site Scripting
16.2 Assessing Risks
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
22.10 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report