Please enable JavaScript to use CodeHS

AK 9-12: L1.NI.C.02

CodeHS Lessons

Illustrate how sensitive data can be affected by attacks.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
8.4 Databases
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
8.1 Identifying Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
1.12 Common Security Problems
22.3 Databases
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
5.5 Databases
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.1 Identifying Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration