Please enable JavaScript to use CodeHS

NV Tech 6-8: 6-8.DC.D.1

CodeHS Lessons

Demonstrate an understanding of what personal data is and how to keep it private and secure, including the awareness of terms such as encryption, HTTPS, password strength, cookies, phishing, and computer viruses; understand the limitations of data management and how data-collection technologies work.

Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
13.9 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
1.12 Common Security Problems
21.1 Cryptography, Cryptology, Cryptanalysis
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
2.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity