Please enable JavaScript to use CodeHS

AL 9-12: 17

CodeHS Lessons

Discuss the ethical ramifications of malicious hacking and its impact on society. Examples: Dissemination of privileged information, ransomware.

Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
9.2 Assessing Risks
Standard
13.9 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
7.7 Ethical Issues Around Data Collection
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.2 Impact of Cybersecurity
1.11 Hacking Ethics
Standard
8.13 Ethical Issues Around Data Collection
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
11.9 Cybersecurity
Standard
1.11 Hacking Ethics
Standard
8.3 Impact of Cybersecurity
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
11.2 Impact of Cybersecurity
12.7 Hacking Ethics
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
3.5 Cyber Ethics and Laws
3.7 Cybersecurity Essentials
Standard
1.3 Impact of Cybersecurity
12.2 Assessing Risks
21.7 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
2.4 Cyber Ethics and Laws
2.6 Common Cyber Attacks and Prevention
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
13.3 Impact of Cybersecurity
Standard
8.10 Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
7.13 Ethical Issues Around Data Collection
Standard
1.3 Impact of Cybersecurity
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
13.3 Impact of Cybersecurity
Standard
5.4 Cyber Ethics and Laws
5.6 Cybersecurity Essentials
5.7 Common Cyber Attacks and Prevention
Standard
11.3 Impact of Cybersecurity
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
13.2 Assessing Risks
Standard
6.10 Cybersecurity
8.2 Impact of Cybersecurity
Standard
1.4 Cyber Ethics and Laws
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
1.4 Cyber Ethics and Laws
Standard
15.3 Impact of Cybersecurity
Standard
7.13 Ethical Issues Around Data Collection
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
15.2 Assessing Risks
Standard
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
13.2 Assessing Risks
Standard
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection
Standard
4.6 Cybersecurity Essentials
4.7 Common Cyber Attacks and Prevention