Please enable JavaScript to use CodeHS

AL 9-12: 36

CodeHS Lessons

Explain the tradeoffs when selecting and implementing cybersecurity recommendations. Examples: Two-factor authentication, password requirements, geolocation requirements.

Standard
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
9.2 Assessing Risks
9.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
5.9 Browser Configuration
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Common Cyber Attacks and Prevention
2.8 Application Security
2.9 Browser Configuration
2.10 System Administration
Standard
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Common Cyber Attacks and Prevention
Standard
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
Standard
1.7 Common Cyber Attacks and Prevention
2.9 Application Security
2.10 System Administration
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Common Cyber Attacks and Prevention
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
2.6 Common Cyber Attacks and Prevention
4.5 Application Security
4.6 Browser Configuration
Standard
1.7 Common Cyber Attacks and Prevention
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
8.5 Application Security
Standard
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Common Cyber Attacks and Prevention
10.8 Application Security
10.9 Browser Configuration
10.10 System Administration
Standard
4.4 Privacy & Security
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
Standard
6.10 Cybersecurity
8.4 System Administration
Standard
1.7 Common Cyber Attacks and Prevention
5.8 Application Security
5.9 Browser Configuration
5.10 System Administration
Standard
3.6 Application Security
3.8 Browser Configuration
3.9 System Administration
7.8 Risk Response
Standard
10.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
4.7 Common Cyber Attacks and Prevention