Please enable JavaScript to use CodeHS

SC FCS: K.3

CodeHS Lessons

Explain the importance of data security and physical security.

Standard
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.7 Privacy & Security
11.9 Common Security Problems
Standard
6.8 Application Security
6.9 Browser Configuration
6.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.6 Privacy & Security
1.12 Common Security Problems
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
14.9 Common Security Problems
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.9 Common Security Problems
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.4 Privacy & Security
10.9 Common Security Problems
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
17.9 Common Security Problems
17.9 Common Security Problems
Standard
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
3.6 Privacy & Security