Please enable JavaScript to use CodeHS

SC FCS: C.7

CodeHS Lessons

Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.

1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
13.1 What is Cybersecurity?
13.8 The CIA Triad
15.2 What is Cybersecurity?
15.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
14.2 What is Cybersecurity?
14.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
8.2 What is Cybersecurity?
8.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.2 What is Cybersecurity?
13.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
1.2 What is Cybersecurity?
1.4 The CIA Triad
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
21.7 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
1.8 Application Security
1.9 System Administration
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.2 What is Cybersecurity?
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.8 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
6.8 Browser Configuration