Please enable JavaScript to use CodeHS

WV M: CS.M.44

CodeHS Lessons

Explain principles of network security and techniques that protect stored and transmitted data (e.g., encryption, cryptography, and authentication).

Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 Encryption Algorithms
1.3 Advanced Cryptography
1.4 Hash Functions
1.6 Asymmetric Encryption
1.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
Standard
8.10 Cryptography
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
4.2 Encryption Algorithms
4.3 Advanced Cryptography
4.4 Hash Functions
4.6 Asymmetric Encryption
4.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
7.7 Cryptography
Standard
7.7 Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.7 Advanced Cryptography
11.8 Hash Functions
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
5.2 Encryption Algorithms
5.3 Advanced Cryptography
5.4 Hash Functions
5.6 Asymmetric Encryption
5.7 Digital Certificates
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.6 Hash Functions
4.8 Digital Certificates
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis