Please enable JavaScript to use CodeHS

VA CF: 18

CodeHS Lessons

Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.

Standard
13.3 Data Collection & Limitations
Standard
16.3 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
6.1 Project: Classic Cipher Newscast
7.8 System Administration
8.1 Inside Web Apps
8.2 Developer Tools
8.4 Databases
8.10 SQL Injection Overview
9.8 Packets & Protocols
9.9 Viewing a Webpage
10.7 Network Management
11.1 Methodology
11.2 Support Practice
Standard
4.1 Communication is Key!
4.2 Building a Knowledge Base
4.3 Star in a Video!
Standard
13.6 Packets & Protocols
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
11.1 Inside Web Apps
11.2 Developer Tools
11.8 Databases
11.10 SQL Injection Overview
Standard
6.10 System Administration
Standard
1.9 Data Collection & Limitations
Standard
1.9 Data Collection & Limitations
4.15 Network Management
5.1 Methodology
5.2 Support Practice
Standard
1.9 Data Collection & Limitations
3.15 Network Management
4.1 Methodology
4.2 Support Practice
Standard
1.9 Data Collection & Limitations
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
1.9 System Administration
2.6 Packets & Protocols
2.8 Network Administration
3.1 Methodology
3.2 Support Practice
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
Standard
4.1 Methodology
4.2 Support Practice
5.7 Packets & Protocols
5.9 Viewing a Webpage
5.13 Network Management
6.3 Building a Knowledge Base
6.4 Star in a Video!
Standard
13.3 Data Collection & Limitations
Standard
1.9 Data Collection & Limitations
21.10 Project: Classic Cipher Newscast
22.3 Databases
22.9 SQL Injection Overview
22.2 Developer Tools
22.1 Inside Web Apps
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
9.3 Data Collection & Limitations
13.8 System Administration
14.1 Inside Web Apps
14.2 Developer Tools
14.4 Databases
14.10 SQL Injection Overview
15.8 Packets & Protocols
15.9 Viewing a Webpage
Standard
3.7 Cybersecurity Essentials
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
3.1 Project: Classic Cipher Newscast
6.8 System Administration
7.7 Network Management
8.1 Methodology
8.2 Support Practice
9.1 Inside Web Apps
9.2 Developer Tools
9.4 Databases
9.10 SQL Injection Overview
24.8 Packets & Protocols
24.9 Viewing a Webpage
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Cybersecurity Essentials
3.8 System Administration
5.7 Network Management
5.8 Methodology
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
10.3 Data Collection & Limitations
Standard
10.3 Data Collection & Limitations
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
6.6 Packets & Protocols
6.7 Viewing a Webpage
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.2 Developer Tools
10.3 Databases
10.10 SQL Injection Overview
11.1 Cryptography, Cryptology, Cryptanalysis
12.1 Project: Classic Cipher Newscast
Standard
5.6 Packets & Protocols
5.7 Viewing a Webpage
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
2.8 Packets & Protocols
2.9 Viewing a Webpage
Standard
3.8 System Administration
4.12 Network Management
5.1 Methodology
5.2 Support Practice
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
7.8 Packets & Protocols
7.10 Viewing a Webpage
Standard
5.10 Data Collection & Limitations
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
1.10 Data Collection & Limitations
23.1 Communication is Key!
23.2 Building a Knowledge Base
23.3 Star in a Video!
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
7.8 System Administration
17.10 SQL Injection Overview
17.10 SQL Injection Overview
10.8 Packets & Protocols
10.9 Viewing a Webpage
11.7 Network Management
12.1 Methodology
12.2 Support Practice
17.4 Databases
17.2 Developer Tools
17.1 Inside Web Apps
Standard
9.4 System Administration
10.3 Data Collection & Limitations
11.3 Network Management
Standard
3.5 Data Collection & Limitations
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
5.1 Project: Classic Cipher Newscast
7.5 SQL Injection Overview
8.8 Packets & Protocols
8.10 Viewing a Webpage
10.1 Methodology
10.2 Support Practice
11.2 Communication is Key!
11.3 Building a Knowledge Base
11.4 Star in a Video!
Standard
4.8 System Administration
5.2 Inside Web Apps
5.3 Developer Tools
5.5 Databases
5.11 SQL Injection Overview
8.1 Cryptography, Cryptology, Cryptanalysis
9.8 Packets & Protocols
9.9 Viewing a Webpage
10.7 Network Management
11.1 Methodology
11.2 Support Practice
12.1 Communication is Key!
12.2 Building a Knowledge Base
12.3 Star in a Video!
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.6 Cybersecurity Essentials
Standard
1.8 System Administration
2.8 Packets & Protocols
2.9 Viewing a Webpage
Standard
3.9 Data Collection & Limitations