Please enable JavaScript to use CodeHS

NV CS&A: 9-12.DC.B.2

CodeHS Lessons

Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.

1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
10.3 Internet Safety
10.4 Privacy & Security
14.3 Impact of Cybersecurity
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.3 Impact of Cybersecurity
6.7 Browser Configuration
12.1 Identifying Risks
12.2 Assessing Risks
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
6.7 Browser Configuration
14.2 Malware Types and Prevention
14.4 Additional Attacks
16.1 Identifying Risks
16.2 Assessing Risks
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
8.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
9.3 Internet Safety
9.4 Privacy & Security
15.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
4.7 Browser Configuration
13.1 Identifying Risks
13.2 Assessing Risks
4.3 Internet Safety
4.4 Privacy & Security
1.4 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.7 Browser Configuration
8.2 Malware Types and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
5.9 Network Attacks
5.10 Securing a Network
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
8.7 Network Attacks
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.7 Browser Configuration
2.8 Securing a Network
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.7 Browser Configuration
1.3 Privacy & Security
1.8 Hacking Ethics
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Privacy & Security
13.7 Network Attacks
13.9 Impact of Cybersecurity
1.7 Browser Configuration
6.8 Browser Configuration
5.2 Malware Types and Prevention
5.4 Additional Attacks
8.1 Identifying Risks
8.2 Assessing Risks