Please enable JavaScript to use CodeHS

VA CF: 101

CodeHS Lessons

Research career opportunities for cybersecurity professionals

Standard
1.6 Cybersecurity Essentials
4.10 System Administration
6.11 Network Management
7.1 Communication is Key!
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
4.1 Communication is Key!
Standard
13.9 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
12.8 Databases
12.9 Common Security Problems
Standard
5.10 System Administration
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
13.3 Impact of Cybersecurity
Standard
1.9 System Administration
4.2 Impact of Cybersecurity
Standard
1.6 Common Security Problems
6.1 Communication is Key!
Standard
1.6 Common Security Problems
5.13 Network Management
8.2 Impact of Cybersecurity
Standard
1.12 Common Security Problems
22.3 Databases
Standard
1.6 Common Security Problems
6.1 Communication is Key!
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
13.8 System Administration
14.4 Databases
14.9 Common Security Problems
Standard
3.7 Cybersecurity Essentials
Standard
1.3 Impact of Cybersecurity
6.8 System Administration
7.7 Network Management
9.4 Databases
9.9 Common Security Problems
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.6 Cybersecurity Essentials
3.8 System Administration
5.7 Network Management
Standard
1.6 Cybersecurity Essentials
4.8 System Administration
6.7 Network Management
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
10.3 Databases
10.9 Common Security Problems
Standard
1.3 Impact of Cybersecurity
3.8 System Administration
4.12 Network Management
6.1 Communication is Key!
Standard
1.6 Cybersecurity Essentials
Standard
1.6 Cybersecurity Essentials
4.10 System Administration
6.11 Network Management
7.1 Communication is Key!
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
1.6 Cybersecurity Essentials
4.10 System Administration
6.11 Network Management
7.1 Communication is Key!
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity Essentials
10.10 System Administration
12.11 Network Management
Standard
11.3 Impact of Cybersecurity
Standard
22.1 Communication is Key!
Standard
1.4 Impact of Cybersecurity
7.8 System Administration
17.9 Common Security Problems
17.9 Common Security Problems
11.7 Network Management
17.4 Databases
Standard
9.2 Impact of Cybersecurity
9.4 System Administration
11.3 Network Management
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.4 Common Security Problems
11.2 Communication is Key!
Standard
1.3 Impact of Cybersecurity
4.8 System Administration
5.5 Databases
5.10 Common Security Problems
10.7 Network Management
12.1 Communication is Key!
Standard
13.3 Impact of Cybersecurity
Standard
4.6 Cybersecurity Essentials
Standard
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
7.8 System Administration
8.4 Databases
8.9 Common Security Problems
10.7 Network Management
Standard
13.3 Impact of Cybersecurity