Please enable JavaScript to use CodeHS

CSTA 3B: 3B-NI-04

CodeHS Lessons

Compare ways software developers protect devices and information from unauthorized access.

Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
Standard
41.1 Cryptography
31.1 Practice PT: Steganography
Standard
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
10.1 Project: Public Service Announcement
15.4 The CIA Triad
Standard
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
8.1 Inside Web Apps
8.2 Developer Tools
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
10.8 Packets & Protocols
9.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.4 Hash Functions
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
13.8 The CIA Triad
13.6 Packets & Protocols
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.2 History of Cryptography
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Common Security Problems
1.13 Project: Public Service Announcement
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
8.4 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
5.6 Packets & Protocols
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.8 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.2 Inside Web Apps
5.3 Developer Tools
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
8.2 History of Cryptography
9.8 Packets & Protocols
13.2 Assessing Risks
6.1 Project: Security Assessment Report
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.4 The CIA Triad
Standard
5.6 Cybersecurity