Please enable JavaScript to use CodeHS

OH 8: NI.C.8.b

CodeHS Lessons

Compare and contrast the effects of different types of malware to determine strategies for how to protect devices.

1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.6 Network Communication
7.7 Network Management
9.9 Common Security Problems
21.4 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.4 Common Security Problems
10.6 Network Communication
10.7 Network Management
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.10 Common Security Problems
10.6 Network Communication
10.7 Network Management
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
8.6 Common Security Problems
11.6 Network Communication
11.7 Network Management
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
8.9 Common Security Problems
11.6 Network Communication
11.7 Network Management
1.3 Privacy & Security
1.6 Common Security Problems
13.7 Network Attacks
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
2.4 Privacy & Security
5.9 Network Attacks
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.5 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
10.4 Privacy & Security
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.6 Privacy & Security
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.6 Privacy & Security
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
4.4 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.5 Network Communication
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
4.10 Network Communication
4.12 Network Management
1.1 What is Cybersecurity?
1.3 Privacy & Security