Please enable JavaScript to use CodeHS

MO 9-10: NI.C.04

CodeHS Lessons

Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise and government.

1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
6.7 Browser Configuration
6.8 System Administration
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
12.3 Risk Response
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
16.2 Assessing Risks
16.3 Risk Response
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
13.3 Risk Response
7.7 Browser Configuration
7.8 System Administration
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
13.2 Assessing Risks
13.3 Risk Response
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
5.9 Network Attacks
5.10 Securing a Network
5.11 Project: Secure the Company's Network
1.9 System Administration
2.8 Securing a Network
13.7 Network Attacks
1.7 Browser Configuration
1.8 System Administration
3.7 Browser Configuration
3.8 System Administration
6.8 Browser Configuration
8.2 Assessing Risks
8.3 Risk Response