Please enable JavaScript to use CodeHS

TX FOC: 127.769.2B

CodeHS Lessons

(B) research careers in cybersecurity and information assurance along with the education and job skills required for obtaining a job in both the public and private sectors;

Standard
7.1 Communication is Key!
Standard
4.1 Communication is Key!
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
12.8 Databases
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
1.6 Common Security Problems
6.1 Communication is Key!
Standard
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.12 Common Security Problems
22.10 Types of SQLi and Prevention
22.3 Databases
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
14.4 Databases
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.4 Databases
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
10.3 Databases
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.1 Communication is Key!
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
7.1 Communication is Key!
Standard
7.1 Communication is Key!
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
23.1 Communication is Key!
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.4 Databases
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
11.2 Communication is Key!
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
5.5 Databases
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
12.1 Communication is Key!
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
8.4 Databases
8.9 Common Security Problems
8.11 Types of SQLi and Prevention