Please enable JavaScript to use CodeHS

SC CYB: C.7

CodeHS Lessons

Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.

Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Standard
1.7 Digital Certificates
5.2 Malware Types and Prevention
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
5.9 Browser Configuration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.4 Malware Types and Prevention
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
Standard
3.7 Cybersecurity Essentials
Standard
4.7 Digital Certificates
6.6 Application Security
6.7 Browser Configuration
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
3.6 Application Security
3.7 Browser Configuration
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.6 Application Security
4.7 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Standard
8.5 Application Security
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.6 Cybersecurity Essentials
5.7 Common Cyber Attacks and Prevention
10.8 Application Security
10.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
5.7 Digital Certificates
7.6 Application Security
7.7 Browser Configuration
8.2 Malware Types and Prevention
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.8 Digital Certificates
6.6 Application Security
6.7 Browser Configuration
13.2 Malware Types and Prevention
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
4.6 Cybersecurity Essentials
4.7 Common Cyber Attacks and Prevention
Standard
1.6 Application Security
1.7 Browser Configuration
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration