Please enable JavaScript to use CodeHS

VA CF: 83

CodeHS Lessons

Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)

Standard
2.4 Authentication Methods
4.8 Application Security
4.10 System Administration
6.10 Network Communication
Standard
5.5 Cross-site Scripting
7.4 Level 4: Data and Licenses
8.2 Assessing Risks
Standard
12.11 Types of SQLi and Prevention
Standard
5.8 Application Security
5.10 System Administration
Standard
1.5 Network Communication
1.8 Application Security
1.9 System Administration
Standard
5.12 Network Communication
Standard
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
13.6 Application Security
13.8 System Administration
14.11 Types of SQLi and Prevention
Standard
6.6 Application Security
6.8 System Administration
7.6 Network Communication
9.11 Types of SQLi and Prevention
11.4 Level 4: Data and Licenses
12.2 Assessing Risks
10.1 Project: Security Assessment Report
Standard
2.4 Authentication Methods
3.6 Application Security
3.8 System Administration
5.6 Network Communication
Standard
2.4 Authentication Methods
4.6 Application Security
4.8 System Administration
6.6 Network Communication
Standard
7.1 Project: Secure the Company's Network
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
Standard
2.6 Level 4: Data and Licenses
3.6 Application Security
3.8 System Administration
4.10 Network Communication
Standard
2.4 Authentication Methods
4.8 Application Security
4.10 System Administration
6.10 Network Communication
Standard
8.5 Application Security
Standard
2.4 Authentication Methods
4.8 Application Security
4.10 System Administration
6.10 Network Communication
Standard
10.8 Application Security
10.10 System Administration
12.10 Network Communication
Standard
7.6 Application Security
7.8 System Administration
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
11.6 Network Communication
13.2 Assessing Risks
9.1 Project: Security Assessment Report
19.4 Level 4: Data and Licenses
Standard
9.4 System Administration
Standard
6.6 Application Security
7.6 Types of SQLi and Prevention
9.6 Network Communication
13.5 Cross-site Scripting
14.4 Level 4: Data and Licenses
15.2 Assessing Risks
Standard
4.6 Application Security
4.8 System Administration
5.12 Types of SQLi and Prevention
7.4 Level 4: Data and Licenses
10.6 Network Communication
13.2 Assessing Risks
6.1 Project: Security Assessment Report
Standard
1.6 Application Security
1.8 System Administration
Standard
7.6 Application Security
7.8 System Administration
8.11 Types of SQLi and Prevention
10.6 Network Communication
14.1 Project: Security Assessment Report