Please enable JavaScript to use CodeHS

ND 6-8: 6.HS.5

CodeHS Lessons

Identify security measures to protect technology systems.

1.12 Common Security Problems
8.7 Network Attacks
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
6.9 Network Attacks
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
14.5 Cross-site Scripting
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
5.5 Cross-site Scripting
13.7 Network Attacks
1.8 Application Security
1.9 System Administration
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
6.8 Browser Configuration