Please enable JavaScript to use CodeHS

VA CF: 18

CodeHS Lessons

Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.

Standard
13.3 Data Collection & Limitations
Standard
1.6 Cybersecurity Essentials
4.10 System Administration
6.11 Network Management
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
4.1 Communication is Key!
4.2 Building a Knowledge Base
4.3 Star in a Video!
Standard
15.3 Data Collection & Limitations
Standard
13.6 Packets & Protocols
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
12.1 Inside Web Apps
12.2 Developer Tools
12.8 Databases
12.10 SQL Injection Overview
Standard
5.10 System Administration
Standard
1.9 Data Collection & Limitations
Standard
1.9 Data Collection & Limitations
4.15 Network Management
5.1 Methodology
5.2 Support Practice
Standard
1.9 Data Collection & Limitations
3.15 Network Management
4.1 Methodology
4.2 Support Practice
Standard
1.9 Data Collection & Limitations
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
1.9 System Administration
2.6 Packets & Protocols
2.8 Network Administration
3.1 Methodology
3.2 Support Practice
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
Standard
4.1 Methodology
4.2 Support Practice
5.7 Packets & Protocols
5.9 Viewing a Webpage
5.13 Network Management
6.3 Building a Knowledge Base
6.4 Star in a Video!
Standard
13.3 Data Collection & Limitations
Standard
1.9 Data Collection & Limitations
21.10 Project: Classic Cipher Newscast
22.3 Databases
22.9 SQL Injection Overview
22.2 Developer Tools
22.1 Inside Web Apps
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
9.3 Data Collection & Limitations
13.8 System Administration
14.1 Inside Web Apps
14.2 Developer Tools
14.4 Databases
14.10 SQL Injection Overview
15.8 Packets & Protocols
15.9 Viewing a Webpage
Standard
3.7 Cybersecurity Essentials
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
3.1 Project: Classic Cipher Newscast
6.8 System Administration
7.7 Network Management
8.1 Methodology
8.2 Support Practice
9.1 Inside Web Apps
9.2 Developer Tools
9.4 Databases
9.10 SQL Injection Overview
24.8 Packets & Protocols
24.9 Viewing a Webpage
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Cybersecurity Essentials
3.8 System Administration
5.7 Network Management
5.8 Methodology
Standard
1.6 Cybersecurity Essentials
4.8 System Administration
6.7 Network Management
7.1 Methodology
7.2 Support Practice
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
10.3 Data Collection & Limitations
Standard
10.3 Data Collection & Limitations
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
6.6 Packets & Protocols
6.7 Viewing a Webpage
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.2 Developer Tools
10.3 Databases
10.10 SQL Injection Overview
11.1 Cryptography, Cryptology, Cryptanalysis
12.1 Project: Classic Cipher Newscast
Standard
5.6 Packets & Protocols
5.7 Viewing a Webpage
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
2.8 Packets & Protocols
2.9 Viewing a Webpage
Standard
3.8 System Administration
4.12 Network Management
5.1 Methodology
5.2 Support Practice
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
7.8 Packets & Protocols
7.10 Viewing a Webpage
Standard
5.10 Data Collection & Limitations
Standard
1.6 Cybersecurity Essentials
Standard
1.9 Data Collection & Limitations
Standard
2.4 Troubleshooting Methodology
Standard
2.4 Troubleshooting Methodology
Standard
1.6 Cybersecurity Essentials
4.10 System Administration
6.11 Network Management
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
11.2 Data Collection & Limitations
Standard
1.6 Cybersecurity Essentials
4.10 System Administration
6.11 Network Management
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.6 Cybersecurity Essentials
10.10 System Administration
12.11 Network Management
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.10 Data Collection & Limitations
22.1 Communication is Key!
22.2 Building a Knowledge Base
22.3 Star in a Video!
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
7.8 System Administration
17.10 SQL Injection Overview
17.10 SQL Injection Overview
10.8 Packets & Protocols
10.9 Viewing a Webpage
11.7 Network Management
12.1 Methodology
12.2 Support Practice
17.4 Databases
17.2 Developer Tools
17.1 Inside Web Apps
Standard
9.4 System Administration
10.3 Data Collection & Limitations
11.3 Network Management
Standard
3.5 Data Collection & Limitations
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
5.1 Project: Classic Cipher Newscast
7.5 SQL Injection Overview
8.8 Packets & Protocols
8.10 Viewing a Webpage
10.1 Methodology
10.2 Support Practice
11.2 Communication is Key!
11.3 Building a Knowledge Base
11.4 Star in a Video!
Standard
4.8 System Administration
5.2 Inside Web Apps
5.3 Developer Tools
5.5 Databases
5.11 SQL Injection Overview
8.1 Cryptography, Cryptology, Cryptanalysis
9.8 Packets & Protocols
9.9 Viewing a Webpage
10.7 Network Management
11.1 Methodology
11.2 Support Practice
12.1 Communication is Key!
12.2 Building a Knowledge Base
12.3 Star in a Video!
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.6 Cybersecurity Essentials
Standard
1.8 System Administration
2.8 Packets & Protocols
2.9 Viewing a Webpage
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
6.1 Project: Classic Cipher Newscast
7.8 System Administration
8.1 Inside Web Apps
8.2 Developer Tools
8.4 Databases
8.10 SQL Injection Overview
9.8 Packets & Protocols
9.9 Viewing a Webpage
10.7 Network Management
11.1 Methodology
11.2 Support Practice
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations