- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
NV CS&A: 9-12.DC.B.2
CodeHS Lessons
Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.
Standard |
4.9 Browser Configuration |
Standard |
5.2 Malware Types and Prevention |
5.4 Additional Attacks |
8.1 Identifying Risks |
8.2 Assessing Risks |
Standard |
13.7 Network Attacks |
13.9 Impact of Cybersecurity |
Standard |
9.3 Internet Safety |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.2 Impact of Cybersecurity |
1.6 Internet Safety |
1.7 Privacy & Security |
1.11 Hacking Ethics |
Standard |
5.9 Browser Configuration |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
2.8 Network Administration |
4.2 Impact of Cybersecurity |
4.3 Hacking Ethics |
4.5 Privacy & Security |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
8.2 Impact of Cybersecurity |
8.4 Malware Types and Prevention |
8.6 Additional Attacks |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
8.7 Network Attacks |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
8.3 Impact of Cybersecurity |
Standard |
11.2 Impact of Cybersecurity |
12.3 Internet Safety |
12.4 Privacy & Security |
12.7 Hacking Ethics |
13.7 Browser Configuration |
Standard |
3.7 Identifying Risks |
Standard |
3.7 Identifying Risks |
Standard |
1.3 Impact of Cybersecurity |
6.7 Browser Configuration |
12.1 Identifying Risks |
12.2 Assessing Risks |
21.3 Internet Safety |
21.4 Privacy & Security |
21.7 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
3.7 Browser Configuration |
Standard |
4.7 Browser Configuration |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
8.3 Internet Safety |
8.4 Privacy & Security |
16.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.3 Internet Safety |
1.4 Privacy & Security |
1.7 Hacking Ethics |
6.9 Network Attacks |
6.10 Network Administration |
Standard |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
5.9 Network Attacks |
5.10 Network Administration |
Standard |
1.7 Browser Configuration |
Standard |
1.3 Impact of Cybersecurity |
2.1 Privacy & Security |
3.7 Browser Configuration |
Standard |
5.5 Internet Safety |
5.6 Privacy & Security |
5.8 Browser Configuration |
5.13 Hacking Ethics |
Standard |
5.7 Privacy & Security |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.9 Browser Configuration |
Standard |
4.9 Browser Configuration |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
10.9 Browser Configuration |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
11.3 Impact of Cybersecurity |
Standard |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.6 Internet Safety |
1.7 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.4 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
7.7 Browser Configuration |
8.2 Malware Types and Prevention |
13.1 Identifying Risks |
13.2 Assessing Risks |
Standard |
9.2 Impact of Cybersecurity |
Standard |
1.3 Internet Safety |
2.4 Hacking Ethics |
Standard |
10.3 Internet Safety |
10.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.5 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
6.7 Browser Configuration |
13.2 Malware Types and Prevention |
13.4 Additional Attacks |
15.1 Identifying Risks |
15.2 Assessing Risks |
Standard |
1.3 Privacy & Security |
1.8 Hacking Ethics |
Standard |
1.3 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
4.7 Browser Configuration |
13.1 Identifying Risks |
13.2 Assessing Risks |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
6.8 Browser Configuration |
Standard |
7.8 Browser Configuration |
Standard |
1.7 Browser Configuration |
Standard |
1.3 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
7.7 Browser Configuration |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
Standard |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company