Please enable JavaScript to use CodeHS

IL 11-12: 11-12.NI.05

CodeHS Lessons

Compare ways software developers protect devices and information from unauthorized access.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
4.7 Software Licenses
4.8 Application Security
Standard
8.1 Identifying Risks
Standard
5.6 Software Licenses
5.8 Application Security
Standard
1.8 Application Security
Standard
5.5 Software Licenses
Standard
2.7 Software Licenses
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
13.5 Software Licenses
13.6 Application Security
Standard
3.7 Identifying Risks
14.5 Software Licenses
Standard
3.7 Identifying Risks
14.5 Software Licenses
Standard
6.5 Software Licenses
6.6 Application Security
12.1 Identifying Risks
Standard
3.5 Software Licenses
3.6 Application Security
Standard
4.5 Software Licenses
4.6 Application Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
1.5 Software Licenses
1.6 Application Security
Standard
3.5 Software Licenses
3.6 Application Security
Standard
5.12 Software Licenses
Standard
4.7 Software Licenses
4.8 Application Security
Standard
6.10 Cryptography
7.9 Cybersecurity
7.12 Software Licenses
8.5 Application Security
Standard
4.7 Software Licenses
4.8 Application Security
Standard
10.7 Software Licenses
10.8 Application Security
Standard
7.5 Software Licenses
7.6 Application Security
13.1 Identifying Risks
Standard
7.9 Cybersecurity
Standard
1.7 Software Licenses
19.2 Software Licenses
Standard
6.5 Software Licenses
6.6 Application Security
15.1 Identifying Risks
Standard
4.5 Software Licenses
4.6 Application Security
13.1 Identifying Risks
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Software Licenses
1.6 Application Security
Standard
7.8 Cryptography
10.9 Cybersecurity
Standard
7.5 Software Licenses
7.6 Application Security