Please enable JavaScript to use CodeHS

TN 6-8: CCP.12

CodeHS Lessons

Explain how encryption can be used to safeguard data that is sent across a network.

Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
6.4 Cybersecurity
6.6 Encryption
Standard
2.4 Cybersecurity
2.6 Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
21.3 Why encrypt?
21.2 History of Cryptography
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
10.2 History of Cryptography
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
Standard
4.4 Cybersecurity
4.6 Encryption
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.4 Cybersecurity
4.6 Encryption
Standard
2.4 Cybersecurity
2.6 Encryption