Please enable JavaScript to use CodeHS

VA 7: 7.7

CodeHS Lessons

The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.

Standard
9.3 Internet Safety
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
7.7 Browser Configuration
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
11.4 Storage Options
11.6 Network Communication
Standard
13.7 Network Attacks
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
2.3 Internet Safety
2.4 Privacy & Security
5.9 Network Attacks
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.6 Internet Safety
1.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
4.7 Browser Configuration
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
6.4 Storage Options
6.8 Browser Configuration
Standard
7.4 Storage Options
7.8 Browser Configuration