Please enable JavaScript to use CodeHS

IN CS3S: CS3S-2.2

CodeHS Lessons

Investigate security vulnerabilities in various data structures, such as out-of-bounds arrays and buffer overflows.

22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
12.2 Assessing Risks
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
16.2 Assessing Risks
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
13.2 Assessing Risks
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
13.2 Assessing Risks
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
8.2 Assessing Risks