Please enable JavaScript to use CodeHS

VA CF: 104

CodeHS Lessons

Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters

Standard
1.6 Cybersecurity Essentials
7.1 Communication is Key!
Standard
4.1 Communication is Key!
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
12.8 Databases
12.9 Common Security Problems
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
1.6 Common Security Problems
6.1 Communication is Key!
Standard
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.12 Common Security Problems
22.3 Databases
Standard
1.6 Common Security Problems
6.1 Communication is Key!
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
14.4 Databases
14.9 Common Security Problems
Standard
3.7 Cybersecurity Essentials
Standard
1.3 Impact of Cybersecurity
9.4 Databases
9.9 Common Security Problems
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
10.3 Databases
10.9 Common Security Problems
Standard
1.3 Impact of Cybersecurity
6.1 Communication is Key!
9.1 After Fundamentals of Cybersecurity
Standard
1.6 Cybersecurity Essentials
7.1 Communication is Key!
Standard
1.6 Cybersecurity Essentials
7.1 Communication is Key!
10.1 After Fundamentals of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity Essentials
Standard
11.3 Impact of Cybersecurity
Standard
25.1 Communication is Key!
Standard
1.4 Impact of Cybersecurity
17.9 Common Security Problems
17.9 Common Security Problems
15.1 After Fundamentals of Cybersecurity
17.4 Databases
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.4 Common Security Problems
11.2 Communication is Key!
Standard
1.3 Impact of Cybersecurity
5.5 Databases
5.10 Common Security Problems
12.1 Communication is Key!
Standard
13.3 Impact of Cybersecurity
Standard
4.6 Cybersecurity Essentials
Standard
1.3 Impact of Cybersecurity
8.4 Databases
8.9 Common Security Problems
13.1 After Fundamentals of Cybersecurity