Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 1

CodeHS Lessons

Drawing from various resources, analyze current legislation that governs computer related crimes. For example, create a presentation discussing common computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and trademark ethics pertaining to images, videos, and recorded sounds.

Standard
11.10 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
Standard
7.4 Level 4: Data and Licenses
Standard
9.6 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
6.6 Software Licenses
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.9 Creative Credit & Copyright
Standard
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
5.5 Software Licenses
Standard
1.5 Hacking Ethics
2.7 Software Licenses
Standard
11.11 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
12.6 Creative Credit & Copyright
12.7 Hacking Ethics
13.5 Software Licenses
Standard
14.5 Software Licenses
Standard
6.5 Software Licenses
11.4 Level 4: Data and Licenses
21.7 Hacking Ethics
21.6 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
8.12 Creative Credit & Copyright
Standard
8.12 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
1.5 Software Licenses
2.10 Creative Credit & Copyright
Standard
2.2 Creative Credit & Copyright
2.6 Level 4: Data and Licenses
3.5 Software Licenses
Standard
5.11 Creative Credit & Copyright
5.12 Software Licenses
5.13 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
5.8 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
19.4 Level 4: Data and Licenses
Standard
7.11 Creative Credit & Copyright
Standard
1.4 Creative Credit & Copyright
2.4 Hacking Ethics
Standard
10.6 Creative Credit & Copyright
Standard
1.7 Software Licenses
4.6 Creative Credit & Copyright
Standard
1.7 Creative Credit & Copyright
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
6.5 Software Licenses
15.4 Level 4: Data and Licenses
Standard
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
4.5 Software Licenses
7.4 Level 4: Data and Licenses
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.5 Software Licenses
2.10 Creative Credit & Copyright
Standard
3.10 Creative Credit & Copyright
3.11 Hacking Ethics