Please enable JavaScript to use CodeHS

RI 9-12: 3-CY-R-3

CodeHS Lessons

Explain how the digital security of an organization may be affected by the actions of its employees.

Standard
11.9 Cybersecurity
Standard
4.10 System Administration
Standard
5.6 Internal Threats
7.2 Level 2: User Training
8.2 Assessing Risks
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
Standard
5.10 System Administration
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.9 System Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
13.8 System Administration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.8 System Administration
11.2 Level 2: User Training
12.2 Assessing Risks
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
8.10 Cybersecurity
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.8 System Administration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Level 2: User Training
3.8 System Administration
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
4.10 System Administration
Standard
7.9 Cybersecurity
Standard
4.10 System Administration
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
10.10 System Administration
Standard
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
7.8 System Administration
13.2 Assessing Risks
19.2 Level 2: User Training
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.8 System Administration
13.6 Internal Threats
14.2 Level 2: User Training
15.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
4.8 System Administration
7.2 Level 2: User Training
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.8 System Administration
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?