Please enable JavaScript to use CodeHS

KY CTE: CTE.OA.16

CodeHS Lessons

Demonstrate an awareness of computer security and a basic understanding of ways to protect a computer (e.g., viruses, Trojans, Malware)

Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.6 Application Security
7.8 System Administration
8.10 SQL Injection Overview
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
5.6 Internal Threats
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.8 Application Security
1.9 System Administration
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.6 Additional Attacks
8.7 Internal Threats
Standard
22.9 SQL Injection Overview
Standard
8.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.8 System Administration
9.10 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
10.10 SQL Injection Overview
Standard
1.6 Application Security
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
3.6 Application Security
3.8 System Administration
Standard
13.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
7.6 Application Security
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
8.7 SQL Injection Overview
Standard
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
14.3 Impact of Cybersecurity
Standard
1.6 Application Security
1.8 System Administration
Standard
3.4 Privacy & Security
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.8 System Administration
7.5 SQL Injection Overview
14.1 Network Attacks
14.2 Malware Types and Prevention
14.4 Additional Attacks
14.6 Internal Threats
Standard
1.3 Impact of Cybersecurity
4.6 Application Security
4.8 System Administration
5.11 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity