Please enable JavaScript to use CodeHS

IN Computer Science: 7352.D2.5

CodeHS Lessons

Investigate principles of secure design. ● Analyze the tradeoffs associated with designing security into a product. ● Implement input validation in applications ● Discuss the security implications of relying on open design vs the secrecy of design. ● Explain the tradeoffs of developing a program in a type-safe language. ● Investigate potential errors detected from both strong-type and weak-type languages. ● Investigate potential vulnerabilities in provided programming code. ● Investigate common coding errors that introduce security vulnerabilities, such as buffer overflows, integer errors, and memory leaks.

Standard
8.3 The Value of Data
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
Standard
8.4 Penetration Testing
Standard
11.3 The Value of Data
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
Standard
14.3 The Value of Data
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
9.3 The Value of Data
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.4 Penetration Testing
10.1 Project: Security Assessment Report
Standard
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.4 Penetration Testing
17.3 The Value of Data
9.1 Project: Security Assessment Report
Standard
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
15.4 Penetration Testing
Standard
5.4 The Value of Data
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.4 Penetration Testing
6.1 Project: Security Assessment Report