Please enable JavaScript to use CodeHS

RI 9-12: 3-CY-S-2

CodeHS Lessons

Explain tradeoffs when selecting and implementing cybersecurity recommendations.

Standard
11.9 Cybersecurity
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.10 System Administration
6.10 Network Communication
Standard
3.5 Mobile Devices
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.8 Application Security
1.9 System Administration
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
3.7 Mobile Devices
5.12 Network Communication
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.8 System Administration
Standard
3.6 Personal Data Security
Standard
6.6 Application Security
6.8 System Administration
7.6 Network Communication
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
3.6 Application Security
3.8 System Administration
5.6 Network Communication
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.6 Application Security
4.8 System Administration
6.6 Network Communication
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.10 Network Administration
7.1 Project: Secure the Company's Network
Standard
2.4 Privacy & Security
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
1.8 System Administration
Standard
2.1 Privacy & Security
3.6 Application Security
3.8 System Administration
4.10 Network Communication
4.14 Mobile Devices
Standard
5.6 Privacy & Security
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
Standard
1.6 Privacy & Security
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.10 System Administration
6.10 Network Communication
Standard
7.9 Cybersecurity
8.5 Application Security
Standard
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.10 System Administration
6.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.5 Personal Data Security
5.7 Common Cyber Attacks and Prevention
10.8 Application Security
10.10 System Administration
12.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
11.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
18.5 Mobile Devices
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.8 System Administration
9.6 Network Communication
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.8 System Administration
4.10 Mobile Devices
10.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
4.5 Personal Data Security
4.7 Common Cyber Attacks and Prevention
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
10.6 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security