Please enable JavaScript to use CodeHS

SC DCS: C.7

CodeHS Lessons

Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.

Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.3 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.3 The CIA Triad
12.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
21.7 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
16.2 What is Cybersecurity?
16.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.13 Hacking Ethics
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.7 Hacking Ethics
Standard
9.1 What is Cybersecurity?
9.3 The CIA Triad
Standard
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.4 Hacking Ethics
Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
3.11 Hacking Ethics
Standard
2.5 The CIA Triad