Please enable JavaScript to use CodeHS

MD 11-12: 12.NI.C.01

CodeHS Lessons

Compare and refine ways software developers protect devices and information from unauthorized access including complex encryption algorithms such as public key encryption.

5.3 Advanced Cryptography
5.6 Asymmetric Encryption
13.2 Assessing Risks
4.3 Advanced Cryptography
4.6 Asymmetric Encryption
12.2 Assessing Risks
1.3 Advanced Cryptography
1.6 Asymmetric Encryption
8.2 Assessing Risks