Please enable JavaScript to use CodeHS

AK 6-8: 6.NI.C.01

CodeHS Lessons

Identify existing cybersecurity concerns with the Internet and systems it uses.

Standard
2.5 Future of Computing
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
8.10 SQL Injection Overview
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
2.5 Future of Computing
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
12.3 Future of Computing
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
4.5 Future of Computing
Standard
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
5.4 Future of Computing
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
Standard
1.6 Privacy & Security
4.5 Future of Computing
22.9 SQL Injection Overview
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
9.10 SQL Injection Overview
21.4 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
10.10 SQL Injection Overview
13.7 The Impact of the Internet
14.1 Project: The Effects of the Internet
Standard
2.4 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.7 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
2.5 Future of Computing
Standard
1.4 Impact of Cybersecurity
2.4 Privacy & Security
17.10 SQL Injection Overview
17.10 SQL Injection Overview
Standard
2.6 Future of Computing
9.2 Impact of Cybersecurity
Standard
4.5 Future of Computing
7.7 The Impact of the Internet
10.4 Privacy & Security
14.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
3.7 The Impact of the Internet
7.8 Future of Computing
13.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.5 SQL Injection Overview
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.11 SQL Injection Overview
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
14.3 Future of Computing