- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
NV CS&A: 9-12.DC.D.1
CodeHS Lessons
Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work.
Standard |
4.8 Application Security |
6.10 Network Communication |
Standard |
7.4 Level 4: Data and Licenses |
Standard |
13.7 Network Attacks |
13.9 Impact of Cybersecurity |
Standard |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.2 Impact of Cybersecurity |
1.7 Privacy & Security |
12.4 Clients and Servers |
12.8 Databases |
Standard |
5.8 Application Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
2.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
1.5 Network Communication |
1.8 Application Security |
4.2 Impact of Cybersecurity |
4.5 Privacy & Security |
4.6 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.3 Privacy & Security |
Standard |
1.3 Privacy & Security |
5.12 Network Communication |
8.2 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
8.7 Network Attacks |
21.1 Cryptography, Cryptology, Cryptanalysis |
22.3 Databases |
22.4 Clients and Servers |
Standard |
1.3 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
8.3 Impact of Cybersecurity |
Standard |
11.2 Impact of Cybersecurity |
12.4 Privacy & Security |
13.6 Application Security |
14.4 Databases |
14.5 Clients and Servers |
Standard |
1.3 Impact of Cybersecurity |
2.1 Cryptography, Cryptology, Cryptanalysis |
6.6 Application Security |
7.6 Network Communication |
9.4 Databases |
9.5 Clients and Servers |
11.4 Level 4: Data and Licenses |
21.4 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
3.6 Application Security |
5.6 Network Communication |
Standard |
4.6 Application Security |
6.6 Network Communication |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
8.4 Privacy & Security |
10.1 Cryptography, Cryptology, Cryptanalysis |
16.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.4 Privacy & Security |
6.9 Network Attacks |
10.3 Databases |
10.4 Clients and Servers |
11.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
2.4 Privacy & Security |
5.9 Network Attacks |
Standard |
1.6 Application Security |
Standard |
1.3 Impact of Cybersecurity |
2.1 Privacy & Security |
2.6 Level 4: Data and Licenses |
3.6 Application Security |
4.10 Network Communication |
Standard |
5.6 Privacy & Security |
Standard |
5.7 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.8 Application Security |
6.10 Network Communication |
Standard |
8.5 Application Security |
Standard |
4.8 Application Security |
6.10 Network Communication |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
10.8 Application Security |
12.10 Network Communication |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
11.3 Impact of Cybersecurity |
Standard |
1.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
1.7 Privacy & Security |
Standard |
1.4 Impact of Cybersecurity |
2.4 Privacy & Security |
4.1 Cryptography, Cryptology, Cryptanalysis |
7.6 Application Security |
11.6 Network Communication |
17.4 Databases |
17.5 Clients and Servers |
19.4 Level 4: Data and Licenses |
Standard |
9.2 Impact of Cybersecurity |
Standard |
10.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
4.4 Privacy & Security |
Standard |
2.3 Clients and Servers |
Standard |
1.5 Privacy & Security |
7.6 Clients and Servers |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
4.1 Cryptography, Cryptology, Cryptanalysis |
6.6 Application Security |
7.1 Clients and Servers |
9.6 Network Communication |
14.4 Level 4: Data and Licenses |
Standard |
1.3 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
4.6 Application Security |
5.5 Databases |
5.6 Clients and Servers |
7.4 Level 4: Data and Licenses |
8.1 Cryptography, Cryptology, Cryptanalysis |
10.6 Network Communication |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Application Security |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
7.6 Application Security |
8.4 Databases |
8.5 Clients and Servers |
10.6 Network Communication |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company