Please enable JavaScript to use CodeHS

SC FCS: C.7

CodeHS Lessons

Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.

Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.3 The CIA Triad
1.11 Hacking Ethics
Standard
6.8 Application Security
6.9 Browser Configuration
6.10 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.8 Application Security
1.9 System Administration
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.3 The CIA Triad
12.7 Hacking Ethics
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
21.7 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
16.2 What is Cybersecurity?
16.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.2 What is Cybersecurity?
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.8 Browser Configuration
5.13 Hacking Ethics
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
10.8 Application Security
10.9 Browser Configuration
10.10 System Administration
Standard
11.2 What is Cybersecurity?
11.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
9.1 What is Cybersecurity?
9.3 The CIA Triad
9.4 System Administration
Standard
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.4 Hacking Ethics
Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
3.11 Hacking Ethics
Standard
2.5 The CIA Triad