Please enable JavaScript to use CodeHS

VA 7: 7.7

CodeHS Lessons

The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.3 Internet Safety
2.4 Privacy & Security
7.7 Browser Configuration
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
Standard
6.4 Cybersecurity
6.5 The CIA Triad
7.7 Hacking Ethics
Standard
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
9.3 Internet Safety
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
13.7 Network Attacks
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.6 Internet Safety
1.7 Privacy & Security
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
6.9 Browser Configuration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.2 Storage Options
1.5 Network Communication
2.8 Network Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
3.2 Storage Options
5.12 Network Communication
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
11.3 The CIA Triad
12.3 Internet Safety
12.4 Privacy & Security
13.7 Browser Configuration
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
6.7 Browser Configuration
7.4 Storage Options
7.6 Network Communication
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
21.3 Internet Safety
21.4 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
8.3 Internet Safety
8.4 Privacy & Security
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
16.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.3 Internet Safety
1.4 Privacy & Security
6.9 Network Attacks
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
2.3 Internet Safety
2.4 Privacy & Security
5.9 Network Attacks
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
1.7 Browser Configuration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.7 Browser Configuration
4.6 Storage Options
4.10 Network Communication
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.5 Internet Safety
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.7 Hacking Ethics
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.6 Internet Safety
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.3 Internet Safety
2.4 Privacy & Security
7.7 Browser Configuration
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
11.4 Storage Options
11.6 Network Communication
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.3 The CIA Triad
Standard
1.3 Internet Safety
2.1 What is Cybersecurity?
2.2 The CIA Triad
Standard
10.3 Internet Safety
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
6.7 Browser Configuration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.3 Internet Safety
2.4 Privacy & Security
4.7 Browser Configuration
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
10.4 Storage Options
10.6 Network Communication
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
6.4 Storage Options
6.8 Browser Configuration
Standard
7.4 Storage Options
7.8 Browser Configuration
Standard
4.4 Cybersecurity
4.5 The CIA Triad
6.7 Hacking Ethics
Standard
1.7 Browser Configuration
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
3.5 Internet Safety
3.6 Privacy & Security
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
2.7 Hacking Ethics