Please enable JavaScript to use CodeHS

OK 6-8: 8.NI.C.01

CodeHS Lessons

Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.11 Types of SQLi and Prevention
Standard
6.4 Cybersecurity
7.4 Privacy & Security
Standard
5.4 Privacy & Security
Standard
2.4 Cybersecurity
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
1.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
12.11 Types of SQLi and Prevention
Standard
5.8 Application Security
5.9 Browser Configuration
5.10 System Administration
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
22.10 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
14.11 Types of SQLi and Prevention
Standard
2.4 Cybersecurity
Standard
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
8.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
10.11 Types of SQLi and Prevention
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.4 Privacy & Security
4.4 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
10.8 Application Security
10.9 Browser Configuration
10.10 System Administration
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.12 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
4.4 Cybersecurity
6.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security