Please enable JavaScript to use CodeHS

AL 8: 10

CodeHS Lessons

Analyze different modes of social engineering and their effectiveness. Examples: Phishing, hoaxes, impersonation, baiting, spoofing.

Standard
6.4 Cybersecurity
7.7 Hacking Ethics
Standard
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
13.1 What is Cybersecurity?
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Cybersecurity
5.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
4.6 Cybersecurity
Standard
7.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.1 What is Cybersecurity?
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.4 Privacy & Security
Standard
2.4 Cybersecurity
Standard
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
8.4 Privacy & Security
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
Standard
1.7 Hacking Ethics
4.4 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.6 Cybersecurity
5.7 Hacking Ethics
Standard
4.6 Cybersecurity
5.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
2.4 Privacy & Security
Standard
8.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
8.7 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
4.4 Cybersecurity
6.7 Hacking Ethics
Standard
4.4 Cybersecurity
Standard
4.5 Cybersecurity
5.7 Hacking Ethics
Standard
5.5 Cybersecurity
6.7 Hacking Ethics
Standard
6.5 Cybersecurity
7.7 Hacking Ethics
Standard
9.5 Cybersecurity
10.7 Hacking Ethics
Standard
3.2 Cybersecurity
3.7 Hacking Ethics