Please enable JavaScript to use CodeHS

VA CF: 62

CodeHS Lessons

Identify the perpetrators of different types of malicious hacking

Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
8.10 SQL Injection Overview
Standard
3.2 Environmental Controls
5.6 Internal Threats
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
8.7 Network Attacks
22.9 SQL Injection Overview
Standard
8.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
5.9 Network Attacks
Standard
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
5.11 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity