Please enable JavaScript to use CodeHS

OH 6: NI.C.6.a

CodeHS Lessons

Identify cybersecurity concerns and measures needed to protect electronic information.

Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
11.6 Network Communication
11.7 Network Management
Standard
13.7 Network Attacks
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
21.1 Cryptography, Cryptology, Cryptanalysis
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
2.4 Privacy & Security
5.9 Network Attacks
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
10.6 Network Communication
10.7 Network Management
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?