Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-2.1

CodeHS Lessons

Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.

Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.10 SQL Injection Overview
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks
Standard
13.9 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
2.4 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.11 SQL Injection Overview
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration