Please enable JavaScript to use CodeHS

NV CS&A: 9-12.DC.D.1

CodeHS Lessons

Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work.

1.5 Privacy & Security
7.6 Clients and Servers
1.6 Privacy & Security
10.4 Privacy & Security
14.3 Impact of Cybersecurity
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
1.3 Impact of Cybersecurity
2.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
7.6 Network Communication
9.4 Databases
9.5 Clients and Servers
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
7.1 Clients and Servers
10.6 Network Communication
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
1.6 Privacy & Security
9.4 Privacy & Security
15.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
5.5 Databases
5.6 Clients and Servers
7.4 Level 4: Data and Licenses
8.1 Cryptography, Cryptology, Cryptanalysis
10.6 Network Communication
4.4 Privacy & Security
1.4 Impact of Cybersecurity
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
11.6 Network Communication
2.4 Privacy & Security
5.9 Network Attacks
1.6 Privacy & Security
1.5 Network Communication
1.8 Application Security
4.2 Impact of Cybersecurity
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.3 Impact of Cybersecurity
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
4.10 Network Communication
1.6 Privacy & Security
8.7 Network Attacks
21.1 Cryptography, Cryptology, Cryptanalysis
22.3 Databases
22.4 Clients and Servers
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
8.4 Databases
8.5 Clients and Servers
11.6 Network Communication
13.7 Network Attacks
13.9 Impact of Cybersecurity
1.6 Application Security
2.3 Clients and Servers
7.4 Level 4: Data and Licenses