- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
SC 9-12: HS1.NI.2.2
CodeHS Lessons
Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).
Standard |
8.2 Assessing Risks |
6.1 Project Security Assessment Report |
Standard |
12.10 SQL Injection Overview |
12.11 Types of SQLi and Prevention |
Standard |
2.8 Network Administration |
Standard |
22.9 SQL Injection Overview |
22.10 Types of SQLi and Prevention |
Standard |
14.10 SQL Injection Overview |
14.11 Types of SQLi and Prevention |
Standard |
9.10 SQL Injection Overview |
9.11 Types of SQLi and Prevention |
12.2 Assessing Risks |
Standard |
6.10 Network Administration |
7.1 Project: Secure the Company's Network |
10.10 SQL Injection Overview |
10.11 Types of SQLi and Prevention |
Standard |
5.10 Network Administration |
5.11 Project: Secure the Company's Network |
Standard |
17.10 SQL Injection Overview |
17.10 SQL Injection Overview |
17.11 Types of SQLi and Prevention |
17.11 Types of SQLi and Prevention |
13.2 Assessing Risks |
Standard |
7.5 SQL Injection Overview |
7.6 Types of SQLi and Prevention |
15.2 Assessing Risks |
Standard |
5.11 SQL Injection Overview |
5.12 Types of SQLi and Prevention |
13.2 Assessing Risks |
Standard |
8.10 SQL Injection Overview |
8.11 Types of SQLi and Prevention |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company