- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
NV Tech 9-12: 9-12.DC.B.2
CodeHS Lessons
Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.
Standard |
11.9 Cybersecurity |
Standard |
11.9 Cybersecurity |
Standard |
3.4 Private Networks |
5.1 Network Attacks |
5.3 Common Network Attacks |
5.6 Internal Threats |
7.2 Level 2: User Training |
8.1 Identifying Risks |
8.2 Assessing Risks |
Standard |
13.7 Network Attacks |
13.9 Impact of Cybersecurity |
13.1 What is Cybersecurity? |
Standard |
9.3 Internet Safety |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
15.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.2 Impact of Cybersecurity |
1.6 Internet Safety |
1.7 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
2.8 Network Administration |
4.1 What is Cybersecurity? |
4.2 Impact of Cybersecurity |
4.3 Hacking Ethics |
4.5 Privacy & Security |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
8.2 Impact of Cybersecurity |
8.3 Network Attacks |
8.5 Common Network Attacks |
8.7 Internal Threats |
Standard |
11.9 Cybersecurity |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
8.7 Network Attacks |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
8.3 Impact of Cybersecurity |
8.2 What is Cybersecurity? |
Standard |
11.1 What is Cybersecurity? |
11.2 Impact of Cybersecurity |
12.3 Internet Safety |
12.4 Privacy & Security |
12.7 Hacking Ethics |
Standard |
3.7 Identifying Risks |
Standard |
3.7 Identifying Risks |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
11.2 Level 2: User Training |
12.1 Identifying Risks |
12.2 Assessing Risks |
21.3 Internet Safety |
21.4 Privacy & Security |
21.7 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
8.10 Cybersecurity |
Standard |
8.10 Cybersecurity |
Standard |
8.3 Internet Safety |
8.4 Privacy & Security |
16.3 Impact of Cybersecurity |
16.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.3 Internet Safety |
1.4 Privacy & Security |
1.7 Hacking Ethics |
6.9 Network Attacks |
6.10 Network Administration |
Standard |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
5.9 Network Attacks |
5.10 Network Administration |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.1 Privacy & Security |
2.4 Level 2: User Training |
Standard |
5.1 What is Cybersecurity? |
5.5 Internet Safety |
5.6 Privacy & Security |
5.13 Hacking Ethics |
Standard |
5.7 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
7.9 Cybersecurity |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
11.2 What is Cybersecurity? |
11.3 Impact of Cybersecurity |
Standard |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.6 Internet Safety |
1.7 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.3 What is Cybersecurity? |
1.4 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
8.1 Network Attacks |
18.4 Private Networks |
18.4 Private Networks |
13.1 Identifying Risks |
13.2 Assessing Risks |
19.2 Level 2: User Training |
Standard |
7.9 Cybersecurity |
9.1 What is Cybersecurity? |
9.2 Impact of Cybersecurity |
Standard |
1.3 Internet Safety |
2.1 What is Cybersecurity? |
2.4 Hacking Ethics |
Standard |
10.3 Internet Safety |
10.4 Privacy & Security |
15.2 What is Cybersecurity? |
15.3 Impact of Cybersecurity |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.5 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
9.8 Private Networks |
13.1 Network Attacks |
13.3 Common Network Attacks |
13.6 Internal Threats |
14.2 Level 2: User Training |
15.1 Identifying Risks |
15.2 Assessing Risks |
Standard |
1.1 What is Cybersecurity? |
1.3 Privacy & Security |
1.8 Hacking Ethics |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
7.2 Level 2: User Training |
13.1 Identifying Risks |
13.2 Assessing Risks |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
5.5 Private Networks |
5.6 Cybersecurity |
Standard |
5.5 Private Networks |
5.6 Cybersecurity |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
4.3 Internet Safety |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company