Please enable JavaScript to use CodeHS

RI 9-12: 3-CY-S-1

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.8 Cybersecurity
11.9 The Impact of the Internet
12.1 The Effects of the Internet
Standard
11.9 Cybersecurity
Standard
13.9 The Impact of the Internet
32.1 The Effects of the Internet
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.11 Types of SQLi and Prevention
11.6 Network Communication
11.7 Network Management
9.1 Project: Security Assessment Report
Standard
5.3 Common Network Attacks
5.4 Additional Attacks
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.7 Privacy & Security
11.11 Types of SQLi and Prevention
Standard
6.8 Application Security
6.9 Browser Configuration
6.10 System Administration
9.13 Ethical Issues Around Data Collection
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
4.15 Network Management
Standard
1.6 Privacy & Security
3.15 Network Management
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.8 Application Security
1.9 System Administration
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
5.12 Network Communication
5.13 Network Management
8.5 Common Network Attacks
8.6 Additional Attacks
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
1.6 Privacy & Security
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
14.11 Types of SQLi and Prevention
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
10.1 Project: Security Assessment Report
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.11 Types of SQLi and Prevention
Standard
2.4 Privacy & Security
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
7.13 Ethical Issues Around Data Collection
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
9.1 Project: Security Assessment Report
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
9.4 System Administration
11.3 Network Management
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
14.3 Common Network Attacks
14.4 Additional Attacks
16.2 Assessing Risks
16.3 Risk Response
8.1 Project: Security Assessment Report
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.12 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
6.1 Project: Security Assessment Report
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
6.8 Browser Configuration
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
7.8 Browser Configuration
13.7 Ethical Issues Around Data Collection
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
7.13 Ethical Issues Around Data Collection
Standard
10.9 Cybersecurity