Please enable JavaScript to use CodeHS

AL 7: 10

CodeHS Lessons

Explain social engineering, including countermeasures, and its impact on a digital society. Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
8.9 Common Security Problems
Standard
6.4 Cybersecurity
7.1 Digital Footprint and Reputation
7.2 Cyberbullying
7.3 Internet Safety
7.4 Privacy & Security
7.5 Information Literacy
Standard
5.1 Digital Footprint and Reputation
5.2 Cyberbullying
5.3 Internet Safety
5.4 Privacy & Security
5.5 Information Literacy
Standard
2.4 Cybersecurity
Standard
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
1.5 Information Literacy
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
11.9 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.12 Common Security Problems
8.7 Network Attacks
Standard
1.1 What is Cybersecurity?
Standard
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
14.9 Common Security Problems
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.9 Common Security Problems
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
6.9 Network Attacks
10.9 Common Security Problems
Standard
5.9 Network Attacks
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
Standard
5.1 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
1.5 Information Literacy
4.4 Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
17.9 Common Security Problems
17.9 Common Security Problems
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.4 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
5.10 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
4.4 Cybersecurity
6.1 Digital Footprint and Reputation
6.2 Cyberbullying
6.3 Internet Safety
6.4 Privacy & Security
6.5 Information Literacy
Standard
3.1 What is Cybersecurity?
Standard
2.4 Cybersecurity
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy