Please enable JavaScript to use CodeHS

MO 9-10: NI.C.04

CodeHS Lessons

Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise and government.

Standard
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
13.7 Network Attacks
Standard
1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
Standard
5.9 Network Attacks
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
13.3 Risk Response
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration