Please enable JavaScript to use CodeHS

AL 9-12: 36

CodeHS Lessons

Explain the tradeoffs when selecting and implementing cybersecurity recommendations. Examples: Two-factor authentication, password requirements, geolocation requirements.

Standard
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration