Please enable JavaScript to use CodeHS

IN ICS: ICS-7.3

CodeHS Lessons

Explore the job opportunities that are available in computer science.

Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
12.4 Clients and Servers
12.8 Databases
12.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.8 Network Administration
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
22.3 Databases
22.4 Clients and Servers
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
12.7 Hacking Ethics
14.4 Databases
14.5 Clients and Servers
14.9 Common Security Problems
Standard
9.4 Databases
9.5 Clients and Servers
9.9 Common Security Problems
21.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.7 Hacking Ethics
6.10 Network Administration
10.3 Databases
10.4 Clients and Servers
10.9 Common Security Problems
Standard
2.7 Hacking Ethics
5.10 Network Administration
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
17.4 Databases
17.5 Clients and Servers
Standard
2.3 Clients and Servers
Standard
7.6 Clients and Servers
Standard
2.7 Hacking Ethics
7.1 Clients and Servers
7.4 Common Security Problems
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.5 Databases
5.6 Clients and Servers
5.10 Common Security Problems
Standard
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems