Please enable JavaScript to use CodeHS

TX FOC: 127.769.3E

CodeHS Lessons

(E) define and identify techniques such as hacking, phishing, social engineering, online piracy, spoofing, and data vandalism; and

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.5 What is Cybersecurity? Quiz
2.4 Privacy & Security
2.7 Hacking Ethics
8.9 Common Security Problems
8.10 SQL Injection Overview
Standard
5.5 Cross-site Scripting
Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.5 What is Cybersecurity? Quiz
15.2 What is Cybersecurity?
Standard
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
1.11 Hacking Ethics
11.9 Common Security Problems
11.10 SQL Injection Overview
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Common Security Problems
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
8.5 What is Cybersecurity? Quiz
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
11.4 What is Cybersecurity? Quiz
12.4 Privacy & Security
12.7 Hacking Ethics
14.9 Common Security Problems
14.10 SQL Injection Overview
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.5 What is Cybersecurity? Quiz
9.9 Common Security Problems
9.10 SQL Injection Overview
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
16.3 Impact of Cybersecurity
8.4 Privacy & Security
16.5 What is Cybersecurity? Quiz
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
10.9 Common Security Problems
10.10 SQL Injection Overview
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
11.5 What is Cybersecurity? Quiz
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.6 What is Cybersecurity? Quiz
2.4 Privacy & Security
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.5 What is Cybersecurity? Quiz
Standard
2.1 What is Cybersecurity?
2.4 Hacking Ethics
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.5 What is Cybersecurity? Quiz
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.5 What is Cybersecurity? Quiz
2.4 Privacy & Security
2.7 Hacking Ethics
7.4 Common Security Problems
7.5 SQL Injection Overview
13.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.5 What is Cybersecurity? Quiz
2.4 Privacy & Security
2.7 Hacking Ethics
5.10 Common Security Problems
5.11 SQL Injection Overview
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.5 What is Cybersecurity? Quiz
13.2 What is Cybersecurity?
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security
3.11 Hacking Ethics