Please enable JavaScript to use CodeHS

TN CI: C10H14.15

CodeHS Lessons

Document the security risks associated with new applications and evaluate the severity of the risk involved in each, including but not limited to: a. Identifying threats to information systems facilities, data communications systems, and other applications b. Adhering to federal and state legislation pertaining to computer crime, fraud, and abuse c. Providing means for preserving confidentiality and encryption of sensitive data d. Detailing steps to recover from routine errors or catastrophic failures, such as might be caused by a malicious computer virus

9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report