Please enable JavaScript to use CodeHS

NV Tech 9-12: 9-12.DC.B.2

CodeHS Lessons

Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.

Standard
11.9 Cybersecurity
Standard
3.4 Private Networks
5.1 Network Attacks
5.3 Common Network Attacks
5.6 Internal Threats
7.2 Level 2: User Training
8.1 Identifying Risks
8.2 Assessing Risks
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
9.3 Internet Safety
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
2.8 Network Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.5 Common Network Attacks
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
8.7 Network Attacks
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.3 Internet Safety
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
11.2 Level 2: User Training
12.1 Identifying Risks
12.2 Assessing Risks
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
8.3 Internet Safety
8.4 Privacy & Security
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
6.9 Network Attacks
6.10 Network Administration
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
5.9 Network Attacks
5.10 Network Administration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
2.4 Level 2: User Training
Standard
5.1 What is Cybersecurity?
5.5 Internet Safety
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
7.9 Cybersecurity
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
8.1 Network Attacks
18.4 Private Networks
18.4 Private Networks
13.1 Identifying Risks
13.2 Assessing Risks
19.2 Level 2: User Training
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
1.3 Internet Safety
2.1 What is Cybersecurity?
2.4 Hacking Ethics
Standard
10.3 Internet Safety
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
9.8 Private Networks
13.1 Network Attacks
13.3 Common Network Attacks
13.6 Internal Threats
14.2 Level 2: User Training
15.1 Identifying Risks
15.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.2 Level 2: User Training
13.1 Identifying Risks
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
5.5 Private Networks
5.6 Cybersecurity
Standard
5.5 Private Networks
5.6 Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics