Please enable JavaScript to use CodeHS

WA 3B: 3B-AP-18

CodeHS Lessons

Explain security issues that might lead to compromised computer programs.

Standard
11.9 Cybersecurity
Standard
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.10 SQL Injection Overview
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
13.7 Network Attacks
13.7 Network Attacks
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.7 Network Attacks
8.7 Network Attacks
21.2 History of Cryptography
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
22.9 SQL Injection Overview
21.1 Cryptography, Cryptology, Cryptanalysis
22.2 Developer Tools
22.1 Inside Web Apps
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
21.8 Hash Functions
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
22.9 SQL Injection Overview
21.7 Advanced Cryptography
22.2 Developer Tools
22.1 Inside Web Apps
21.10 Project: Classic Cipher Newscast
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.9 Network Attacks
5.9 Network Attacks
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
Standard
1.8 Hacking Ethics
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.2 Inside Web Apps
5.2 Inside Web Apps
5.3 Developer Tools
5.3 Developer Tools
5.10 Common Security Problems
5.10 Common Security Problems
5.11 SQL Injection Overview
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
13.2 Assessing Risks
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration