Please enable JavaScript to use CodeHS

WY L2: L2.AP.PD.06

CodeHS Lessons

Explain security issues that might lead to compromised computer programs.

1.8 Application Security
1.9 System Administration
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.2 Malware Types and Prevention
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
13.2 Assessing Risks
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
14.2 Malware Types and Prevention
14.5 Cross-site Scripting
16.2 Assessing Risks
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
5.6 Cybersecurity
7.8 Browser Configuration
5.6 Cybersecurity
6.8 Browser Configuration
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
5.2 Malware Types and Prevention
5.5 Cross-site Scripting
8.2 Assessing Risks