Please enable JavaScript to use CodeHS

NC CPI: NCCTE.BP10.01.03

CodeHS Lessons

Understand ethics and security in the programming process

Standard
2.7 Hacking Ethics
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
8.2 Assessing Risks
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.11 Hacking Ethics
Standard
12.7 Hacking Ethics
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.7 Hacking Ethics
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
2.7 Hacking Ethics
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.7 Hacking Ethics
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
2.7 Hacking Ethics
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
15.2 Assessing Risks
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
3.11 Hacking Ethics