Please enable JavaScript to use CodeHS

AK 9-12: L2.NI.C.01

CodeHS Lessons

Compare and refine ways in which software developers protect devices and information from unauthorized access.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
8.3 Risk Response
Standard
1.12 Common Security Problems
22.10 Types of SQLi and Prevention
Standard
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
13.3 Risk Response
Standard
5.6 Cybersecurity