Please enable JavaScript to use CodeHS

SC FCS: C.7

CodeHS Lessons

Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.

Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
2.7 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration