Please enable JavaScript to use CodeHS

WY L1: L1.NI.C.03

CodeHS Lessons

Compare various security measures, considering trade-offs between the usability and security of a computing system.

Standard
11.9 Cybersecurity
Standard
14.1 Introduction to Cybersecurity
14.2 CIA Triad
14.3 Identity Crisis
14.4 Let Me In
14.5 Introduction to Networking
14.6 OSI model activity
14.7 Network Attacks
14.8 Basic Cybersecurity Risk Concepts
14.10 Cybersecurity Risk Model-Vulnerabilities
14.11 Cybersecurity Risk Model-Security Controls
Standard
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
Standard
5.4 Additional Attacks
8.2 Assessing Risks
Standard
2.1 Introduction to Cybersecurity
2.2 CIA Triad
5.1 Identity Crisis
5.2 Let Me In
8.1 Introduction to Networking
8.2 OSI model activity
8.3 Network Attacks
10.1 Basic Cybersecurity Risk Concepts
10.3 Cybersecurity Risk Model-Vulnerabilities
10.4 Cybersecurity Risk Model-Security Controls
Standard
2.1 Introduction to Cybersecurity
2.2 CIA Triad
5.1 Identity Crisis
5.2 Let Me In
8.1 Introduction to Networking
8.2 OSI model activity
8.3 Network Attacks
10.1 Basic Cybersecurity Risk Concepts
10.3 Cybersecurity Risk Model-Vulnerabilities
10.4 Cybersecurity Risk Model-Security Controls
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
1.5 Network Communication
1.9 System Administration
Standard
5.12 Network Communication
8.6 Additional Attacks
Standard
11.9 Cybersecurity
Standard
13.7 Browser Configuration
13.8 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
12.2 Assessing Risks
Standard
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
Standard
8.10 Cybersecurity
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
Standard
5.8 Browser Configuration
Standard
10.9 Browser Configuration
10.10 System Administration
12.10 Network Communication
Standard
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
13.2 Assessing Risks
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
13.4 Additional Attacks
15.2 Assessing Risks
Standard
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
13.2 Assessing Risks
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
10.9 Cybersecurity