Please enable JavaScript to use CodeHS

RI 9-12: 3-CY-S-2

CodeHS Lessons

Explain tradeoffs when selecting and implementing cybersecurity recommendations.

Standard
11.9 Cybersecurity
Standard
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
10.6 Network Communication
Standard
3.5 Mobile Devices
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
6.8 Application Security
6.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.8 Application Security
1.9 System Administration
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
3.7 Mobile Devices
5.12 Network Communication
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.8 System Administration
Standard
6.6 Application Security
6.8 System Administration
7.6 Network Communication
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.10 Network Administration
7.1 Project: Secure the Company's Network
Standard
2.4 Privacy & Security
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
1.8 System Administration
Standard
2.1 Privacy & Security
3.6 Application Security
3.8 System Administration
4.10 Network Communication
4.14 Mobile Devices
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
11.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
18.5 Mobile Devices
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.8 System Administration
10.6 Network Communication
16.2 Assessing Risks
16.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.8 System Administration
4.10 Mobile Devices
10.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
3.6 Privacy & Security