Please enable JavaScript to use CodeHS

AL 9-12: 14

CodeHS Lessons

Compare ways to protect devices, software, and data.

Standard
7.7 Ethical Issues Around Data Collection
Standard
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
Standard
8.1 Identifying Risks
8.2 Assessing Risks
8.3 Risk Response
Standard
13.7 Network Attacks
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.12 Common Security Problems
8.7 Network Attacks
Standard
5.9 Network Attacks
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
13.1 Identifying Risks
13.2 Assessing Risks
13.3 Risk Response
Standard
6.8 Browser Configuration
14.7 Ethical Issues Around Data Collection
Standard
7.8 Browser Configuration
13.7 Ethical Issues Around Data Collection