Please enable JavaScript to use CodeHS

SC FCS: K.5

CodeHS Lessons

Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.

1.1 What is Cybersecurity?
1.6 Privacy & Security
13.1 What is Cybersecurity?
9.4 Privacy & Security
15.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
10.4 Privacy & Security
14.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
8.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.3 What is Cybersecurity?
2.4 Privacy & Security
7.6 Application Security
1.2 What is Cybersecurity?
2.4 Privacy & Security
4.6 Application Security
1.2 What is Cybersecurity?
6.6 Application Security
21.4 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.8 Application Security
4.1 What is Cybersecurity?
4.5 Privacy & Security
1.2 What is Cybersecurity?
2.4 Privacy & Security
6.6 Application Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.2 What is Cybersecurity?
2.1 Privacy & Security
3.6 Application Security
1.2 What is Cybersecurity?
2.4 Privacy & Security
7.6 Application Security
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.5 Privacy & Security
4.4 Privacy & Security
1.6 Application Security