Please enable JavaScript to use CodeHS

Natrona CS Principles: L2.NI.C.01

CodeHS Lessons

Compare ways software developers protect devices and information from unauthorized access.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
2.4 Authentication Methods
4.7 Software Licenses
4.8 Application Security
Standard
1.3 Advanced Cryptography
1.7 Digital Certificates
Standard
12.9 Common Security Problems
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
5.6 Software Licenses
5.8 Application Security
Standard
1.8 Application Security
Standard
1.6 Common Security Problems
5.5 Software Licenses
Standard
1.6 Common Security Problems
2.7 Software Licenses
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
21.7 Advanced Cryptography
Standard
1.6 Common Security Problems
5.5 Software Licenses
Standard
13.5 Software Licenses
13.6 Application Security
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
4.3 Advanced Cryptography
4.7 Digital Certificates
6.5 Software Licenses
6.6 Application Security
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
Standard
2.3 Asymmetric Encryption
2.4 Authentication Methods
3.5 Software Licenses
3.6 Application Security
Standard
2.3 Asymmetric Encryption
2.4 Authentication Methods
4.5 Software Licenses
4.6 Application Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
11.7 Advanced Cryptography
Standard
3.5 Software Licenses
3.6 Application Security
Standard
5.12 Software Licenses
Standard
2.3 Asymmetric Encryption
2.4 Authentication Methods
4.7 Software Licenses
4.8 Application Security
Standard
6.10 Cryptography
7.12 Software Licenses
8.5 Application Security
Standard
2.3 Asymmetric Encryption
2.4 Authentication Methods
4.7 Software Licenses
4.8 Application Security
Standard
10.7 Software Licenses
10.8 Application Security
Standard
5.3 Advanced Cryptography
5.7 Digital Certificates
7.5 Software Licenses
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
Standard
7.9 Cybersecurity
Standard
1.7 Software Licenses
19.2 Software Licenses
Standard
4.8 Digital Certificates
6.5 Software Licenses
6.6 Application Security
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
Standard
4.5 Software Licenses
4.6 Application Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
Standard
5.6 Cybersecurity
Standard
1.5 Software Licenses
1.6 Application Security
Standard
7.5 Software Licenses
7.6 Application Security
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention