Please enable JavaScript to use CodeHS

NV 9-12 Adv: A9-12.AP.PD.2

CodeHS Lessons

Explain security issues that might lead to compromised computer programs.

1.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
4.7 Digital Certificates
6.6 Application Security
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.4 Privacy & Security
2.4 Privacy & Security
4.8 Digital Certificates
6.6 Application Security
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
14.4 Additional Attacks
14.5 Cross-site Scripting
14.6 Internal Threats
16.2 Assessing Risks
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
1.6 Privacy & Security
9.4 Privacy & Security
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
4.4 Privacy & Security
2.4 Privacy & Security
5.7 Digital Certificates
7.6 Application Security
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
13.2 Assessing Risks
1.6 Privacy & Security
1.8 Application Security
4.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
2.1 Privacy & Security
3.6 Application Security
1.6 Privacy & Security
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
1.3 Privacy & Security
1.6 Common Security Problems
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
11.10 The Impact of the Internet
13.9 The Impact of the Internet
41.1 Cryptography
31.1 Practice PT: Steganography
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
11.10 The Impact of the Internet
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
5.6 Cybersecurity
5.8 The Impact of the Internet
5.6 Cybersecurity
5.8 The Impact of the Internet
1.6 Application Security
1.7 Digital Certificates
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks