Please enable JavaScript to use CodeHS

NM: 3A-NI-07

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
1.4 The CIA Triad
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.4 Hash Functions
5.5 Cross-site Scripting
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.3 The CIA Triad
11.9 Common Security Problems
11.11 Types of SQLi and Prevention
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
2.2 History of Cryptography
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
2.8 Network Administration
4.4 The CIA Triad
4.7 Hash Functions
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.2 The CIA Triad
1.12 Common Security Problems
21.2 History of Cryptography
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
5.2 History of Cryptography
8.4 The CIA Triad
Standard
11.3 The CIA Triad
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
1.4 The CIA Triad
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.4 Hash Functions
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
10.2 History of Cryptography
16.4 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
11.2 History of Cryptography
11.7 Advanced Cryptography
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
Standard
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
5.2 The CIA Triad
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
5.2 History of Cryptography
11.4 The CIA Triad
Standard
1.5 The CIA Triad
4.2 History of Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
Standard
9.3 The CIA Triad
Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
13.5 Cross-site Scripting
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
8.2 History of Cryptography
6.1 Project: Security Assessment Report
Standard
5.2 History of Cryptography
13.4 The CIA Triad
Standard
3.2 The CIA Triad
Standard
2.5 The CIA Triad