Please enable JavaScript to use CodeHS

Utah Computer Programming 2: UT.CP2.7.1c

CodeHS Lessons

Show how security concerns can be addressed in an application (i.e., biometrics, passwords, information hiding, etc.)

Standard
11.9 Cybersecurity
Standard
2.4 Privacy & Security
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
Standard
7.9 Cybersecurity
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
9.1 Computer Science Careers
Standard
17.1 Computer Science Careers
Standard
8.1 Computer Science Careers
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
3.6 Privacy & Security