Please enable JavaScript to use CodeHS

HI 2: 2-IC-23

CodeHS Lessons

Describe tradeoffs between allowing information to be public and keeping information private and secure.

1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.3 Cyberbullying
1.5 Privacy & Security
1.5 Privacy & Security
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
3.1 Intro to the Internet
3.1 Intro to the Internet
3.7 The Impact of the Internet
3.7 The Impact of the Internet
13.1 Project: The Effects of the Internet
12.1 Project: Public Service Announcement
13.1 Project: The Effects of the Internet
12.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
7.1 Intro to the Internet
7.1 Intro to the Internet
7.7 The Impact of the Internet
7.7 The Impact of the Internet
10.1 Digital Footprint and Reputation
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.2 Cyberbullying
10.3 Internet Safety
10.3 Internet Safety
10.4 Privacy & Security
10.4 Privacy & Security
10.6 Creative Credit & Copyright
10.6 Creative Credit & Copyright
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.4 The CIA Triad
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.4 The CIA Triad
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
1.7 Intro to the Internet
1.7 Intro to the Internet
1.8 The Impact of the Internet
1.8 The Impact of the Internet
3.1 Intro to the Internet
3.1 Intro to the Internet
3.7 The Impact of the Internet
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
3.8 Project: The Effects of the Internet
7.1 Intro to the Internet
7.1 Intro to the Internet
7.7 The Impact of the Internet
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
8.1 Project: The Effects of the Internet
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.2 Cyberbullying
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
9.6 Creative Credit & Copyright
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.4 Impact of Cybersecurity
1.5 The CIA Triad
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
7.6 Application Security
8.6 Common Security Problems
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.10 Impact of the Internet
10.10 Impact of the Internet
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.2 History of Cryptography
8.2 History of Cryptography
9.10 Impact of the Internet
9.10 Impact of the Internet
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
6.6 Application Security
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.6 Creative Credit & Copyright
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.6 Creative Credit & Copyright
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.5 Cyberbullying
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.8 Application Security
2.7 Impact of the Internet
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.2 Impact of Cybersecurity
4.4 The CIA Triad
4.4 The CIA Triad
4.5 Privacy & Security
4.5 Privacy & Security
4.8 Cyberbullying
4.8 Cyberbullying
4.9 Creative Credit & Copyright
4.9 Creative Credit & Copyright
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
9.11 Impact of the Internet
9.11 Impact of the Internet
14.5 Cross-site Scripting
14.5 Cross-site Scripting
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Privacy & Security
2.1 Privacy & Security
2.2 Creative Credit & Copyright
2.2 Creative Credit & Copyright
3.6 Application Security
7.11 Impact of the Internet
7.11 Impact of the Internet
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.10 Impact of the Internet
10.10 Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.7 Creative Credit & Copyright
4.7 Creative Credit & Copyright
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
5.7 Privacy & Security
5.7 Privacy & Security
5.8 Creative Credit & Copyright
5.8 Creative Credit & Copyright
13.10 Creative Credit & Copyright
13.10 Creative Credit & Copyright
8.12 Creative Credit & Copyright
8.12 Creative Credit & Copyright
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
1.6 Application Security
2.10 Creative Credit & Copyright
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
2.11 Impact of the Internet
5.5 Cross-site Scripting
5.5 Cross-site Scripting