Please enable JavaScript to use CodeHS

SC FCS: C.3

CodeHS Lessons

Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.

1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
4.12 The Impact of the Internet
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.5 Privacy & Security
1.7 Creative Credit & Copyright
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.3 Internet Safety
10.4 Privacy & Security
10.6 Creative Credit & Copyright
14.2 What is Cybersecurity?
14.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
5.7 The Impact of the Internet
1.2 What is Cybersecurity?
1.4 The CIA Triad
21.2 Cyberbullying
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
21.6 Creative Credit & Copyright
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
9.6 Creative Credit & Copyright
15.2 What is Cybersecurity?
15.4 The CIA Triad
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.7 Creative Credit & Copyright
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
5.8 The Impact of the Internet
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
5.7 The Impact of the Internet
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
4.8 Cyberbullying
4.9 Creative Credit & Copyright
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
8.8 The Impact of the Internet
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
5.7 Privacy & Security
5.8 Creative Credit & Copyright
1.2 What is Cybersecurity?
2.1 Privacy & Security
2.2 Creative Credit & Copyright
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
4.7 The Impact of the Internet
13.10 Creative Credit & Copyright
11.11 Creative Credit & Copyright
2.10 Creative Credit & Copyright
8.12 Creative Credit & Copyright
11.11 Creative Credit & Copyright
13.1 What is Cybersecurity?
13.8 The CIA Triad