Please enable JavaScript to use CodeHS

VA 7: 7.7

CodeHS Lessons

The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.

2.3 Internet Safety
2.4 Privacy & Security
5.9 Network Attacks
5.10 Securing a Network
5.11 Project: Secure the Company's Network
1.2 Storage Options
1.5 Network Communication
2.8 Securing a Network
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
13.7 Network Attacks
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
10.3 Internet Safety
10.4 Privacy & Security
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.7 Browser Configuration
7.4 Storage Options
7.6 Network Communication
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
21.3 Internet Safety
21.4 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
6.7 Browser Configuration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
9.3 Internet Safety
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
4.7 Browser Configuration
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
4.3 Internet Safety
4.4 Privacy & Security
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
7.7 Browser Configuration
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
11.4 Storage Options
11.6 Network Communication
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.6 Internet Safety
1.7 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
7.7 Browser Configuration
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
11.4 Storage Options
11.6 Network Communication
1.5 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.7 Browser Configuration
4.6 Storage Options
4.10 Network Communication
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.7 Browser Configuration
7.4 Storage Options
7.8 Browser Configuration
6.4 Storage Options
6.8 Browser Configuration