Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.7a

CodeHS Lessons

Identify examples of threats to systems and data.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
5.5 Cross-site Scripting
7.4 Level 4: Data and Licenses
8.1 Identifying Risks
8.2 Assessing Risks
Standard
13.7 Network Attacks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Privacy & Security
5.9 Network Attacks
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
7.4 Level 4: Data and Licenses
13.1 Identifying Risks
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity