Please enable JavaScript to use CodeHS

PA 3B: 3B-AP-18

CodeHS Lessons

Explain security issues that might lead to compromised computer programs.

1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.1 Inside Web Apps
9.1 Inside Web Apps
9.2 Developer Tools
9.2 Developer Tools
9.9 Common Security Problems
9.9 Common Security Problems
9.10 SQL Injection Overview
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
12.2 Assessing Risks
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.4 Common Security Problems
7.5 SQL Injection Overview
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
14.1 Network Attacks
14.2 Malware Types and Prevention
14.4 Additional Attacks
14.5 Cross-site Scripting
14.5 Cross-site Scripting
16.2 Assessing Risks
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.2 Inside Web Apps
5.2 Inside Web Apps
5.3 Developer Tools
5.3 Developer Tools
5.10 Common Security Problems
5.10 Common Security Problems
5.11 SQL Injection Overview
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
13.2 Assessing Risks
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
8.6 Common Security Problems
8.6 Common Security Problems
8.7 SQL Injection Overview
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
13.2 Assessing Risks
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.9 Network Attacks
5.9 Network Attacks
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.8 Application Security
1.9 System Administration
4.3 Hacking Ethics
4.3 Hacking Ethics
4.6 Cryptography, Cryptology, Cryptanalysis
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.8 Hacking Ethics
1.8 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.7 Network Attacks
8.7 Network Attacks
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.10 SQL Injection Overview
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
13.7 Network Attacks
13.7 Network Attacks
5.6 Cybersecurity
7.8 Browser Configuration
5.6 Cybersecurity
6.8 Browser Configuration
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration