- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
NV Tech 6-8: 6-8.DC.D.1
CodeHS Lessons
Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work.
Standard |
4.8 Application Security |
Standard |
6.4 Cybersecurity |
6.5 The CIA Triad |
6.6 Encryption |
7.4 Privacy & Security |
Standard |
5.4 Privacy & Security |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
2.6 Encryption |
Standard |
13.9 Impact of Cybersecurity |
13.8 The CIA Triad |
Standard |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
15.4 The CIA Triad |
Standard |
1.4 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.2 Impact of Cybersecurity |
1.7 Privacy & Security |
12.9 Common Security Problems |
12.10 SQL Injection Overview |
12.11 Types of SQLi and Prevention |
Standard |
5.8 Application Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
2.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
1.8 Application Security |
4.2 Impact of Cybersecurity |
4.4 The CIA Triad |
4.5 Privacy & Security |
4.6 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
8.2 Impact of Cybersecurity |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
1.12 Common Security Problems |
21.1 Cryptography, Cryptology, Cryptanalysis |
22.9 SQL Injection Overview |
22.10 Types of SQLi and Prevention |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
8.3 Impact of Cybersecurity |
8.4 The CIA Triad |
Standard |
11.2 Impact of Cybersecurity |
11.3 The CIA Triad |
12.4 Privacy & Security |
13.6 Application Security |
14.9 Common Security Problems |
14.10 SQL Injection Overview |
14.11 Types of SQLi and Prevention |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
2.6 Encryption |
Standard |
2.4 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
1.4 The CIA Triad |
2.1 Cryptography, Cryptology, Cryptanalysis |
6.6 Application Security |
9.9 Common Security Problems |
9.10 SQL Injection Overview |
9.11 Types of SQLi and Prevention |
21.4 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
3.6 Application Security |
Standard |
4.6 Application Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
8.4 Privacy & Security |
10.1 Cryptography, Cryptology, Cryptanalysis |
16.3 Impact of Cybersecurity |
16.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.4 Privacy & Security |
10.9 Common Security Problems |
10.10 SQL Injection Overview |
10.11 Types of SQLi and Prevention |
11.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
2.4 Privacy & Security |
Standard |
1.6 Application Security |
Standard |
1.3 Impact of Cybersecurity |
2.1 Privacy & Security |
3.6 Application Security |
Standard |
5.2 The CIA Triad |
5.6 Privacy & Security |
Standard |
1.4 Privacy & Security |
4.4 Cybersecurity |
4.5 The CIA Triad |
4.6 Encryption |
Standard |
5.7 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.6 Cybersecurity |
4.8 Encryption |
5.4 Privacy & Security |
Standard |
4.6 Cybersecurity |
4.8 Encryption |
5.4 Privacy & Security |
Standard |
4.8 Application Security |
Standard |
8.5 Application Security |
Standard |
4.8 Application Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
10.8 Application Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
11.3 Impact of Cybersecurity |
11.4 The CIA Triad |
Standard |
1.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
1.3 The CIA Triad |
1.7 Privacy & Security |
Standard |
1.4 Impact of Cybersecurity |
1.5 The CIA Triad |
2.4 Privacy & Security |
4.1 Cryptography, Cryptology, Cryptanalysis |
7.6 Application Security |
17.9 Common Security Problems |
17.9 Common Security Problems |
17.10 SQL Injection Overview |
17.10 SQL Injection Overview |
17.11 Types of SQLi and Prevention |
17.11 Types of SQLi and Prevention |
Standard |
9.2 Impact of Cybersecurity |
9.3 The CIA Triad |
Standard |
2.2 The CIA Triad |
Standard |
10.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
4.4 Privacy & Security |
Standard |
1.5 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
4.1 Cryptography, Cryptology, Cryptanalysis |
6.6 Application Security |
7.4 Common Security Problems |
7.5 SQL Injection Overview |
7.6 Types of SQLi and Prevention |
Standard |
1.2 The CIA Triad |
1.3 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
1.4 The CIA Triad |
2.4 Privacy & Security |
4.6 Application Security |
5.10 Common Security Problems |
5.11 SQL Injection Overview |
5.12 Types of SQLi and Prevention |
8.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
4.4 Cybersecurity |
4.5 The CIA Triad |
4.6 Encryption |
6.4 Privacy & Security |
Standard |
1.6 Application Security |
Standard |
1.3 Impact of Cybersecurity |
1.4 The CIA Triad |
2.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
7.6 Application Security |
8.9 Common Security Problems |
8.10 SQL Injection Overview |
8.11 Types of SQLi and Prevention |
Standard |
5.4 Privacy & Security |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
2.6 Encryption |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.6 Privacy & Security |
Standard |
4.6 Cybersecurity |
4.7 The CIA Triad |
4.8 Encryption |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company