Please enable JavaScript to use CodeHS

SC 9-12: HS1.NI.2.2

CodeHS Lessons

Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).

Standard
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
8.2 Assessing Risks
6.1 Project Security Assessment Report
Standard
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks