Please enable JavaScript to use CodeHS

NV 6-8: 6-8.NI.C.1

CodeHS Lessons

Explain how physical and digital security measures protect electronic information.

1.5 Network Communication
1.8 Application Security
1.9 System Administration
2.8 Securing a Network
4.5 Privacy & Security
2.4 Privacy & Security
5.10 Securing a Network
5.11 Project: Secure the Company's Network
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
14.5 Cross-site Scripting
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
11.6 Network Communication
11.7 Network Management
1.6 Privacy & Security
1.12 Common Security Problems
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
11.6 Network Communication
11.7 Network Management
1.3 Privacy & Security
1.6 Common Security Problems
5.5 Cross-site Scripting
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
6.8 Browser Configuration
1.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
1.6 Privacy & Security
9.4 Privacy & Security
4.4 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security