Please enable JavaScript to use CodeHS

MS 11-12: NI.3B.2

CodeHS Lessons

Compare ways software developers protect devices and information from unauthorized access

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
2.3 Software
9.4 Privacy & Security
Standard
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
1.3 Advanced Cryptography
8.2 Assessing Risks
Standard
10.3 Software
Standard
10.3 Software
Standard
2.3 Software
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
4.3 Software
Standard
1.6 Privacy & Security
1.12 Common Security Problems
4.3 Software
21.1 Cryptography, Cryptology, Cryptanalysis
21.7 Advanced Cryptography
22.10 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
2.3 Software
Standard
1.2 Software
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
2.3 Software
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.6 Cybersecurity