Please enable JavaScript to use CodeHS

OH 6: NI.C.6.b

CodeHS Lessons

Identify the different types of malware to understand threats to data security.

Standard
4.8 Application Security
Standard
7.7 Hacking Ethics
Standard
5.7 Hacking Ethics
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
Standard
5.8 Application Security
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.8 Application Security
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
13.6 Application Security
Standard
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.6 Application Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
3.6 Application Security
Standard
5.1 What is Cybersecurity?
Standard
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
Standard
5.7 Hacking Ethics
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
10.8 Application Security
Standard
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
7.6 Application Security
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
4.6 Application Security
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.6 Application Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.6 Application Security
Standard
5.7 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?