Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.1

CodeHS Lessons

Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.

Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
Standard
3.4 Private Networks
3.5 Mobile Devices
3.6 Access Control
7.4 Level 4: Data and Licenses
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
Standard
5.1 Copyright Rules
5.3 Security in Game Design
Standard
4.2 Quality Datasets
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
Standard
1.1 What is Cybersecurity?
1.7 Privacy & Security
Standard
6.8 Application Security
8.10 Ethical and Social Implications of Computing
9.13 Ethical Issues Around Data Collection
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.8 Application Security
4.1 What is Cybersecurity?
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
3.7 Mobile Devices
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.4 Privacy & Security
13.6 Application Security
Standard
8.7 Quality Datasets
Standard
1.2 What is Cybersecurity?
2.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
4.14 Mobile Devices
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
18.6 Access Control
18.6 Access Control
18.4 Private Networks
18.4 Private Networks
19.4 Level 4: Data and Licenses
18.5 Mobile Devices
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
8.11 Access Control
9.8 Private Networks
14.4 Level 4: Data and Licenses
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
4.6 Application Security
4.10 Mobile Devices
7.4 Level 4: Data and Licenses
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
5.5 Private Networks
5.6 Cybersecurity
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
5.5 Private Networks
5.6 Cybersecurity
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
6.19 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
10.9 Cybersecurity
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
11.2 What is Cybersecurity?