# WV M: CS.M.44

## CodeHS Lessons

Explain principles of network security and techniques that protect stored and transmitted data (e.g., encryption, cryptography, and authentication).

 Standard 8.10 Cryptography
 Standard 41.1 Cryptography
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 1.2 Encryption Algorithms 1.3 Advanced Cryptography 1.4 Hash Functions 1.6 Asymmetric Encryption 1.7 Digital Certificates
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 2.1 Cryptography, Cryptology, Cryptanalysis
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 4.6 Cryptography, Cryptology, Cryptanalysis 4.7 Hash Functions
 Standard 8.10 Cryptography
 Standard 21.1 Cryptography, Cryptology, Cryptanalysis 21.3 Why encrypt? 21.7 Advanced Cryptography 21.8 Hash Functions
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 2.1 Cryptography, Cryptology, Cryptanalysis 4.2 Encryption Algorithms 4.3 Advanced Cryptography 4.4 Hash Functions 4.6 Asymmetric Encryption 4.7 Digital Certificates
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 7.7 Cryptography
 Standard 7.7 Cryptography
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 11.1 Cryptography, Cryptology, Cryptanalysis 11.7 Advanced Cryptography 11.8 Hash Functions
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis
 Standard 4.1 Cryptography, Cryptology, Cryptanalysis 5.2 Encryption Algorithms 5.3 Advanced Cryptography 5.4 Hash Functions 5.6 Asymmetric Encryption 5.7 Digital Certificates
 Standard 4.1 Cryptography, Cryptology, Cryptanalysis 4.6 Hash Functions 4.8 Digital Certificates
 Standard 8.1 Cryptography, Cryptology, Cryptanalysis
 Standard 5.1 Cryptography, Cryptology, Cryptanalysis