Please enable JavaScript to use CodeHS

SC 9-12: HS4.IC.2.2

CodeHS Lessons

Recommend methods to protect digital information in different situations (e.g., traveling to other countries, two-factor authentication, encryption).

Standard
2.4 Privacy & Security
Standard
1.3 Advanced Cryptography
1.4 Hash Functions
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.5 Privacy & Security
4.7 Hash Functions
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.6 Privacy & Security
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
Standard
4.3 Advanced Cryptography
4.4 Hash Functions
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
11.7 Advanced Cryptography
11.8 Hash Functions
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
5.3 Advanced Cryptography
5.4 Hash Functions
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Hash Functions
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security