Please enable JavaScript to use CodeHS

VA CF: 82

CodeHS Lessons

Discuss how data can be compromised, corrupted, or lost

Standard
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
Standard
5.5 Cross-site Scripting
7.4 Level 4: Data and Licenses
Standard
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.9 SQL Injection Overview
22.12 Project: Security Assessment Report
Standard
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
11.4 Level 4: Data and Licenses
10.1 Project: Security Assessment Report
Standard
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
2.6 Level 4: Data and Licenses
Standard
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
19.4 Level 4: Data and Licenses
Standard
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
14.5 Cross-site Scripting
15.4 Level 4: Data and Licenses
8.1 Project: Security Assessment Report
Standard
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
7.4 Level 4: Data and Licenses
6.1 Project: Security Assessment Report