Please enable JavaScript to use CodeHS

SC CYB: G.6

CodeHS Lessons

Explain types of attacks, e.g., wireless, application, social engineering, buffer overflow attacks, backdoor, etc.

Standard
1.7 Common Cyber Attacks and Prevention
8.3 Security in Coding
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
8.2 Assessing Risks
Standard
8.3 Network Attacks
8.4 Malware Types and Prevention
Standard
12.2 Assessing Risks
Standard
1.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
8.3 Security in Coding
Standard
1.7 Common Cyber Attacks and Prevention
8.3 Security in Coding
Standard
5.7 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
8.3 Security in Coding
Standard
8.1 Common Cyber Attacks and Prevention
8.3 Security in Coding
Standard
8.1 Network Attacks
8.2 Malware Types and Prevention
13.2 Assessing Risks
Standard
13.1 Network Attacks
13.2 Malware Types and Prevention
15.2 Assessing Risks
Standard
13.2 Assessing Risks
Standard
4.7 Common Cyber Attacks and Prevention