Please enable JavaScript to use CodeHS

NV CS&A: 9-12.DC.B.2

CodeHS Lessons

Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.

Standard
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.7 Browser Configuration
Standard
5.2 Malware Types and Prevention
5.4 Additional Attacks
8.1 Identifying Risks
8.2 Assessing Risks
Standard
9.3 Internet Safety
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
6.9 Browser Configuration
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
2.8 Network Administration
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
8.4 Malware Types and Prevention
8.6 Additional Attacks
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
8.7 Network Attacks
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.3 Internet Safety
12.4 Privacy & Security
12.7 Hacking Ethics
13.7 Browser Configuration
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
1.3 Impact of Cybersecurity
6.7 Browser Configuration
12.1 Identifying Risks
12.2 Assessing Risks
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
8.3 Internet Safety
8.4 Privacy & Security
16.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
6.9 Network Attacks
6.10 Network Administration
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
5.9 Network Attacks
5.10 Network Administration
Standard
1.7 Browser Configuration
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.7 Browser Configuration
Standard
5.5 Internet Safety
5.6 Privacy & Security
5.8 Browser Configuration
5.13 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
10.9 Browser Configuration
Standard
4.3 Internet Safety
4.4 Privacy & Security
11.3 Impact of Cybersecurity
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.7 Browser Configuration
8.2 Malware Types and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
Standard
9.2 Impact of Cybersecurity
Standard
1.3 Internet Safety
2.4 Hacking Ethics
Standard
10.3 Internet Safety
10.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
6.7 Browser Configuration
13.2 Malware Types and Prevention
13.4 Additional Attacks
15.1 Identifying Risks
15.2 Assessing Risks
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
4.7 Browser Configuration
13.1 Identifying Risks
13.2 Assessing Risks
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.7 Browser Configuration
Standard
3.5 Internet Safety
3.6 Privacy & Security
3.11 Hacking Ethics