Please enable JavaScript to use CodeHS

VA CF: 63

CodeHS Lessons

Describe the characteristics of vulnerabilities

Standard
1.6 Cybersecurity Essentials
4.8 Application Security
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.1 Identifying Risks
8.2 Assessing Risks
Standard
13.7 Network Attacks
Standard
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
5.8 Application Security
Standard
1.8 Application Security
Standard
8.7 Network Attacks
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
13.6 Application Security
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
3.7 Cybersecurity Essentials
Standard
6.6 Application Security
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.1 Identifying Risks
12.2 Assessing Risks
Standard
1.6 Cybersecurity Essentials
3.6 Application Security
Standard
1.6 Cybersecurity Essentials
4.6 Application Security
Standard
6.9 Network Attacks
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
5.9 Network Attacks
Standard
1.6 Application Security
Standard
3.6 Application Security
Standard
1.6 Cybersecurity Essentials
Standard
1.6 Cybersecurity Essentials
4.8 Application Security
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.5 Application Security
Standard
1.6 Cybersecurity Essentials
4.8 Application Security
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
5.6 Cybersecurity Essentials
10.8 Application Security
Standard
7.6 Application Security
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
Standard
6.6 Application Security
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
15.1 Identifying Risks
15.2 Assessing Risks
Standard
4.6 Application Security
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
Standard
4.6 Cybersecurity Essentials
Standard
1.6 Application Security
Standard
7.6 Application Security
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention