Please enable JavaScript to use CodeHS

CSTA 2: 2-NI-05

CodeHS Lessons

Explain how physical and digital security measures protect electronic information.

Standard
9.3 Internet Safety
9.4 Privacy & Security
10.1 Project: Public Service Announcement
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
10.7 Routing
10.8 Packets & Protocols
10.9 Viewing a Webpage
9.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.4 Hash Functions
3.1 Advanced Devices
3.2 Environmental Controls
5.5 Cross-site Scripting
Standard
13.5 Routing
13.6 Packets & Protocols
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Common Security Problems
1.13 Project: Public Service Announcement
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
5.5 Routing
5.6 Packets & Protocols
5.7 Viewing a Webpage
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.8 Project: Public Service Announcement
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
9.7 Routing
9.8 Packets & Protocols
9.9 Viewing a Webpage
6.1 Project: Security Assessment Report
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.7 Advanced Devices
Standard
5.7 Advanced Devices