Please enable JavaScript to use CodeHS

NV 9-12: 9-12.NI.C.2

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
8.10 Cryptography
11.8 Cybersecurity
11.9 The Impact of the Internet
12.1 The Effects of the Internet
Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
13.9 The Impact of the Internet
32.1 The Effects of the Internet
41.1 Cryptography
Standard
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
10.7 Network Management
Standard
5.6 Internal Threats
8.2 Assessing Risks
8.3 Risk Response
Standard
6.9 Browser Configuration
6.10 System Administration
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
1.5 Network Communication
1.9 System Administration
Standard
5.12 Network Communication
5.13 Network Management
8.7 Internal Threats
Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
13.7 Browser Configuration
13.8 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
12.2 Assessing Risks
12.3 Risk Response
Standard
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
5.7 Network Management
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
Standard
5.8 Browser Configuration
Standard
10.9 Browser Configuration
10.10 System Administration
12.10 Network Communication
12.11 Network Management
Standard
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
9.4 System Administration
11.3 Network Management
Standard
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
9.7 Network Management
13.6 Internal Threats
15.2 Assessing Risks
15.3 Risk Response
Standard
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
6.8 Browser Configuration
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
7.8 Browser Configuration
Standard
1.7 Browser Configuration
1.8 System Administration