Please enable JavaScript to use CodeHS

MS 11-12: AP.3B.11

CodeHS Lessons

Explain security issues that might lead to compromised computer programs

Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
13.9 The Impact of the Internet
41.1 Cryptography
Standard
2.5 Future of Computing
7.7 The Impact of the Internet
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
1.7 Digital Certificates
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
Standard
12.7 The Impact of the Internet
10.5 Future of Computing
Standard
12.7 The Impact of the Internet
10.5 Future of Computing
13.7 Network Attacks
Standard
3.7 The Impact of the Internet
Standard
2.5 Future of Computing
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
4.5 Future of Computing
Standard
1.6 Privacy & Security
1.12 Common Security Problems
4.5 Future of Computing
8.7 Network Attacks
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Securing a Network
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
2.5 Future of Computing
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet