- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
NV Tech 9-12: 9-12.DC.D.1
CodeHS Lessons
Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work.
Standard |
8.10 Cryptography |
11.9 Cybersecurity |
Standard |
8.10 Cryptography |
11.9 Cybersecurity |
Standard |
4.8 Application Security |
6.10 Network Communication |
Standard |
7.4 Level 4: Data and Licenses |
Standard |
41.1 Cryptography |
Standard |
13.7 Network Attacks |
13.9 Impact of Cybersecurity |
Standard |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.2 Impact of Cybersecurity |
1.7 Privacy & Security |
12.9 Common Security Problems |
12.10 SQL Injection Overview |
12.11 Types of SQLi and Prevention |
Standard |
5.8 Application Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
2.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
1.5 Network Communication |
1.8 Application Security |
4.2 Impact of Cybersecurity |
4.5 Privacy & Security |
4.6 Cryptography, Cryptology, Cryptanalysis |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
5.12 Network Communication |
8.2 Impact of Cybersecurity |
Standard |
8.10 Cryptography |
11.9 Cybersecurity |
Standard |
1.6 Privacy & Security |
1.12 Common Security Problems |
8.7 Network Attacks |
21.1 Cryptography, Cryptology, Cryptanalysis |
22.9 SQL Injection Overview |
22.10 Types of SQLi and Prevention |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
8.3 Impact of Cybersecurity |
Standard |
11.2 Impact of Cybersecurity |
12.4 Privacy & Security |
13.6 Application Security |
14.9 Common Security Problems |
14.10 SQL Injection Overview |
14.11 Types of SQLi and Prevention |
Standard |
1.3 Impact of Cybersecurity |
2.1 Cryptography, Cryptology, Cryptanalysis |
6.6 Application Security |
7.6 Network Communication |
9.9 Common Security Problems |
9.10 SQL Injection Overview |
9.11 Types of SQLi and Prevention |
11.4 Level 4: Data and Licenses |
21.4 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
3.6 Application Security |
5.6 Network Communication |
Standard |
4.6 Application Security |
6.6 Network Communication |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
7.7 Cryptography |
8.10 Cybersecurity |
Standard |
7.7 Cryptography |
8.10 Cybersecurity |
Standard |
8.4 Privacy & Security |
10.1 Cryptography, Cryptology, Cryptanalysis |
16.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.4 Privacy & Security |
6.9 Network Attacks |
10.9 Common Security Problems |
10.10 SQL Injection Overview |
10.11 Types of SQLi and Prevention |
11.1 Cryptography, Cryptology, Cryptanalysis |
Standard |
2.4 Privacy & Security |
5.9 Network Attacks |
Standard |
1.6 Application Security |
Standard |
1.3 Impact of Cybersecurity |
2.1 Privacy & Security |
2.6 Level 4: Data and Licenses |
3.6 Application Security |
4.10 Network Communication |
Standard |
5.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
5.7 Privacy & Security |
Standard |
4.8 Application Security |
6.10 Network Communication |
Standard |
6.10 Cryptography |
7.9 Cybersecurity |
8.5 Application Security |
Standard |
4.8 Application Security |
6.10 Network Communication |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
Standard |
10.8 Application Security |
12.10 Network Communication |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
11.3 Impact of Cybersecurity |
Standard |
1.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
1.7 Privacy & Security |
Standard |
1.4 Impact of Cybersecurity |
2.4 Privacy & Security |
4.1 Cryptography, Cryptology, Cryptanalysis |
7.6 Application Security |
17.9 Common Security Problems |
17.9 Common Security Problems |
17.10 SQL Injection Overview |
17.10 SQL Injection Overview |
17.11 Types of SQLi and Prevention |
17.11 Types of SQLi and Prevention |
11.6 Network Communication |
19.4 Level 4: Data and Licenses |
Standard |
7.9 Cybersecurity |
9.2 Impact of Cybersecurity |
Standard |
10.4 Privacy & Security |
15.3 Impact of Cybersecurity |
Standard |
4.4 Privacy & Security |
Standard |
1.5 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
4.1 Cryptography, Cryptology, Cryptanalysis |
6.6 Application Security |
7.4 Common Security Problems |
7.5 SQL Injection Overview |
7.6 Types of SQLi and Prevention |
9.6 Network Communication |
14.4 Level 4: Data and Licenses |
Standard |
1.3 Privacy & Security |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
4.6 Application Security |
5.10 Common Security Problems |
5.11 SQL Injection Overview |
5.12 Types of SQLi and Prevention |
7.4 Level 4: Data and Licenses |
8.1 Cryptography, Cryptology, Cryptanalysis |
10.6 Network Communication |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
5.6 Cybersecurity |
Standard |
5.6 Cybersecurity |
Standard |
1.6 Application Security |
Standard |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
7.6 Application Security |
8.9 Common Security Problems |
8.10 SQL Injection Overview |
8.11 Types of SQLi and Prevention |
10.6 Network Communication |
Standard |
4.4 Privacy & Security |
5.1 Cryptography, Cryptology, Cryptanalysis |
13.3 Impact of Cybersecurity |
Standard |
1.6 Privacy & Security |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company