Please enable JavaScript to use CodeHS

Arkansas Cybersecurity Year 2: CSCS.Y2.1.2

CodeHS Lessons

Analyze and utilize multiple representations of problem-solving logic used to solve problems of appropriate complexity

Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
3.1 Create an Escape Room
7.2 Troubleshooting Methodology
13.5 Arrays and Objects
Standard
10.4 Asymmetric Encryption
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
12.7 Filtering Queries in SQL
12.9 Common Security Problems
Standard
2.4 Basic Crypto Systems: Cracking Caesar
Standard
5.7 Filtering Queries in SQL
5.8 Common Security Problems
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.12 Common Security Problems
21.5 Basic Crypto Systems: Cracking Caesar
22.8 Filtering Queries in SQL
Standard
1.6 Common Security Problems
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
14.8 Filtering Queries in SQL
14.9 Common Security Problems
Standard
4.2 Troubleshooting Methodology
Standard
2.4 Basic Crypto Systems: Cracking Caesar
9.8 Filtering Queries in SQL
9.9 Common Security Problems
23.5 Arrays and Objects
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
2.2 Symmetric Encryption
3.1 Create an Escape Room
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
10.4 Basic Crypto Systems: Cracking Caesar
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
10.8 Filtering Queries in SQL
10.9 Common Security Problems
11.5 Basic Crypto Systems: Cracking Caesar
Standard
2.4 Troubleshooting Methodology
Standard
2.4 Troubleshooting Methodology
Standard
2.2 Symmetric Encryption
3.1 Create an Escape Room
7.2 Troubleshooting Methodology
10.5 Arrays and Objects
Standard
2.2 Symmetric Encryption
3.1 Create an Escape Room
7.2 Troubleshooting Methodology
13.5 Arrays and Objects
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
4.4 Basic Crypto Systems: Cracking Caesar
17.8 Filtering Queries in SQL
17.8 Filtering Queries in SQL
17.9 Common Security Problems
17.9 Common Security Problems
16.5 Arrays and Objects
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
Standard
4.4 Basic Crypto Systems: Cracking Caesar
7.4 Common Security Problems
20.5 Arrays and Objects
Standard
5.9 Filtering Queries in SQL
5.10 Common Security Problems
8.4 Basic Crypto Systems: Cracking Caesar
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
4.5 Arrays and Objects
5.4 Basic Crypto Systems: Cracking Caesar
8.8 Filtering Queries in SQL
8.9 Common Security Problems
Standard
5.4 Basic Crypto Systems: Cracking Caesar
Standard
7.2 Troubleshooting Methodology