Please enable JavaScript to use CodeHS

MD 6-8: 7.NI.C.01

CodeHS Lessons

Explain how to protect electronic information using both physical (hard drive) and digital measures; explain existing cybersecurity concerns with the internet and the systems it uses.

Standard
6.4 Storage Options
6.10 Network Communication
6.11 Network Management
Standard
5.5 Cross-site Scripting
Standard
6.4 Cybersecurity
7.4 Privacy & Security
Standard
5.4 Privacy & Security
Standard
2.4 Cybersecurity
Standard
13.7 Network Attacks
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
4.15 Network Management
Standard
1.1 What is Cybersecurity?
3.15 Network Management
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.2 Storage Options
1.5 Network Communication
2.8 Network Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
3.2 Storage Options
5.12 Network Communication
5.13 Network Management
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.12 Common Security Problems
8.7 Network Attacks
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
Standard
1.6 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
2.4 Cybersecurity
Standard
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.4 Storage Options
7.6 Network Communication
7.7 Network Management
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
5.4 Storage Options
5.6 Network Communication
5.7 Network Management
Standard
6.4 Storage Options
6.6 Network Communication
6.7 Network Management
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
5.9 Network Attacks
5.10 Network Administration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
4.6 Storage Options
4.10 Network Communication
4.12 Network Management
Standard
5.1 What is Cybersecurity?
Standard
1.4 Privacy & Security
4.4 Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
4.6 Cybersecurity
5.4 Privacy & Security
Standard
4.6 Cybersecurity
5.4 Privacy & Security
Standard
6.4 Storage Options
6.10 Network Communication
6.11 Network Management
Standard
6.4 Storage Options
6.10 Network Communication
6.11 Network Management
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
12.4 Storage Options
12.10 Network Communication
12.11 Network Management
Standard
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
2.3 Storage Options
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
11.4 Storage Options
11.6 Network Communication
11.7 Network Management
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
11.3 Network Management
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
9.4 Storage Options
9.6 Network Communication
9.7 Network Management
13.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
10.7 Network Management
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
6.4 Storage Options
Standard
4.4 Cybersecurity
6.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
10.7 Network Management
Standard
5.4 Privacy & Security
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
4.6 Cybersecurity