Please enable JavaScript to use CodeHS

KY CTE: CTE.OA.16

CodeHS Lessons

Demonstrate an awareness of computer security and a basic understanding of ways to protect a computer (e.g., viruses, Trojans, Malware)

Standard
1.3 Impact of Cybersecurity
7.6 Application Security
7.8 System Administration
8.10 SQL Injection Overview
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
5.6 Internal Threats
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
11.10 SQL Injection Overview
Standard
6.8 Application Security
6.10 System Administration
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.8 Application Security
1.9 System Administration
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.6 Additional Attacks
8.7 Internal Threats
Standard
22.9 SQL Injection Overview
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
13.6 Application Security
13.8 System Administration
14.10 SQL Injection Overview
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.8 System Administration
9.10 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
3.6 Application Security
3.8 System Administration
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
10.10 SQL Injection Overview
Standard
1.6 Application Security
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
3.6 Application Security
3.8 System Administration
Standard
13.3 Impact of Cybersecurity
Standard
10.8 Application Security
10.10 System Administration
Standard
11.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
7.6 Application Security
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
Standard
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
15.3 Impact of Cybersecurity
Standard
3.4 Privacy & Security
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.8 System Administration
7.5 SQL Injection Overview
13.1 Network Attacks
13.2 Malware Types and Prevention
13.4 Additional Attacks
13.6 Internal Threats
Standard
1.3 Impact of Cybersecurity
4.6 Application Security
4.8 System Administration
5.11 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity
Standard
1.6 Application Security
1.8 System Administration