Please enable JavaScript to use CodeHS

VA CF: 18

CodeHS Lessons

Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.

Standard
13.3 Data Collection & Limitations
Standard
16.3 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
6.1 Project: Classic Cipher Newscast
8.1 Inside Web Apps
8.2 Developer Tools
8.4 Databases
8.10 SQL Injection Overview
10.8 Packets & Protocols
10.9 Viewing a Webpage
12.1 Methodology
12.2 Support Practice
Standard
4.1 Communication is Key!
4.2 Building a Knowledge Base
4.3 Star in a Video!
Standard
13.6 Packets & Protocols
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
1.9 Data Collection & Limitations
21.10 Project: Classic Cipher Newscast
22.3 Databases
22.9 SQL Injection Overview
22.2 Developer Tools
22.1 Inside Web Apps
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.6 Packets & Protocols
5.7 Viewing a Webpage
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.9 Data Collection & Limitations
Standard
1.10 Data Collection & Limitations
23.1 Communication is Key!
23.2 Building a Knowledge Base
23.3 Star in a Video!
Standard
5.2 Inside Web Apps
5.3 Developer Tools
5.5 Databases
5.11 SQL Injection Overview
8.1 Cryptography, Cryptology, Cryptanalysis
9.8 Packets & Protocols
9.9 Viewing a Webpage
11.1 Methodology
11.2 Support Practice
12.1 Communication is Key!
12.2 Building a Knowledge Base
12.3 Star in a Video!
Standard
1.9 Data Collection & Limitations
Standard
5.1 Cryptography, Cryptology, Cryptanalysis