Please enable JavaScript to use CodeHS

AK 6-8: 8.GCEI.SLE.01

CodeHS Lessons

Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.

Standard
4.6 Ethics and Legal Considerations
6.4 Cybersecurity
Standard
3.6 Ethics and Legal Considerations
Standard
2.4 Cybersecurity
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
Standard
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
15.3 Impact of Cybersecurity
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
1.8 The Impact of the Internet
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.7 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
Standard
2.4 Cybersecurity
Standard
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
21.7 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
3.8 The Impact of the Internet
16.3 Impact of Cybersecurity
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
13.7 The Impact of the Internet
14.1 Project: The Effects of the Internet
Standard
2.7 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
Standard
5.13 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
4.4 Cybersecurity
Standard
4.6 Ethics and Legal Considerations
Standard
1.11 Hacking Ethics
Standard
2.9 Ethics and Legal Considerations
4.6 Cybersecurity
Standard
2.9 Ethics and Legal Considerations
4.6 Cybersecurity
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
9.7 The Impact of the Internet
11.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
9.2 Impact of Cybersecurity
Standard
7.7 The Impact of the Internet
15.3 Impact of Cybersecurity
Standard
3.7 The Impact of the Internet
13.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
2.7 Ethics and Legal Considerations
4.4 Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
4.6 Cybersecurity