Please enable JavaScript to use CodeHS

VA CF: 64

CodeHS Lessons

Identify the prevention of and protection against cyber threats

Standard
1.3 Impact of Cybersecurity
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
Standard
5.5 Cross-site Scripting
8.3 Risk Response
8.4 Penetration Testing
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
11.11 Types of SQLi and Prevention
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
Standard
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
14.11 Types of SQLi and Prevention
Standard
1.3 Impact of Cybersecurity
9.11 Types of SQLi and Prevention
12.3 Risk Response
12.4 Penetration Testing
10.1 Project: Security Assessment Report
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.3 Risk Response
13.4 Penetration Testing
9.1 Project: Security Assessment Report
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.6 Types of SQLi and Prevention
14.5 Cross-site Scripting
16.3 Risk Response
16.4 Penetration Testing
8.1 Project: Security Assessment Report
Standard
1.3 Impact of Cybersecurity
5.12 Types of SQLi and Prevention
13.3 Risk Response
13.4 Penetration Testing
6.1 Project: Security Assessment Report
Standard
13.3 Impact of Cybersecurity