Please enable JavaScript to use CodeHS

OH 6: NI.C.6.c

CodeHS Lessons

Identify ways to protect private information.

Standard
4.9 Browser Configuration
4.10 System Administration
Standard
6.4 Cybersecurity
6.5 The CIA Triad
7.3 Internet Safety
7.4 Privacy & Security
Standard
5.3 Internet Safety
5.4 Privacy & Security
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
13.8 The CIA Triad
Standard
9.4 Privacy & Security
15.4 The CIA Triad
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.3 The CIA Triad
1.7 Privacy & Security
12.11 Types of SQLi and Prevention
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.9 System Administration
4.4 The CIA Triad
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
22.10 Types of SQLi and Prevention
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.4 The CIA Triad
Standard
11.3 The CIA Triad
12.4 Privacy & Security
13.7 Browser Configuration
13.8 System Administration
14.11 Types of SQLi and Prevention
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
2.3 Internet Safety
2.4 Privacy & Security
Standard
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
6.7 Browser Configuration
6.8 System Administration
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
3.7 Browser Configuration
3.8 System Administration
Standard
4.7 Browser Configuration
4.8 System Administration
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
16.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.4 Privacy & Security
10.11 Types of SQLi and Prevention
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
2.1 Privacy & Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.2 The CIA Triad
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.3 Internet Safety
1.4 Privacy & Security
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.6 Cybersecurity
5.3 Internet Safety
5.4 Privacy & Security
Standard
4.6 Cybersecurity
5.3 Internet Safety
5.4 Privacy & Security
Standard
4.9 Browser Configuration
4.10 System Administration
Standard
4.9 Browser Configuration
4.10 System Administration
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
10.9 Browser Configuration
10.10 System Administration
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
11.4 The CIA Triad
Standard
1.4 Privacy & Security
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.5 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.7 Browser Configuration
7.8 System Administration
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
Standard
9.3 The CIA Triad
9.4 System Administration
Standard
10.4 Privacy & Security
15.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
6.7 Browser Configuration
6.8 System Administration
7.6 Types of SQLi and Prevention
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.7 Browser Configuration
4.8 System Administration
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
4.4 Cybersecurity
4.5 The CIA Triad
6.3 Internet Safety
6.4 Privacy & Security
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
1.4 The CIA Triad
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.7 Browser Configuration
7.8 System Administration
8.11 Types of SQLi and Prevention
Standard
5.3 Internet Safety
5.4 Privacy & Security
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.6 Cybersecurity
4.7 The CIA Triad