Please enable JavaScript to use CodeHS

CA 9-12: 9-12.NI.6

CodeHS Lessons

Compare and contrast security measures to address various security threats.

Standard
11.9 Cybersecurity
Standard
2.4 Authentication Methods
6.10 Network Communication
6.11 Network Management
Standard
1.6 Asymmetric Encryption
1.7 Digital Certificates
3.4 Private Networks
3.6 Access Control
5.2 Malware Types and Prevention
5.6 Internal Threats
8.2 Assessing Risks
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
4.15 Network Management
Standard
1.6 Privacy & Security
3.15 Network Management
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
5.12 Network Communication
5.13 Network Management
8.4 Malware Types and Prevention
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
4.6 Asymmetric Encryption
4.7 Digital Certificates
7.6 Network Communication
7.7 Network Management
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Authentication Methods
5.6 Network Communication
5.7 Network Management
Standard
2.4 Authentication Methods
6.6 Network Communication
6.7 Network Management
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
2.4 Privacy & Security
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
2.1 Privacy & Security
4.10 Network Communication
4.12 Network Management
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
2.4 Authentication Methods
6.10 Network Communication
6.11 Network Management
Standard
7.9 Cybersecurity
Standard
2.4 Authentication Methods
6.10 Network Communication
6.11 Network Management
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
12.10 Network Communication
12.11 Network Management
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
5.6 Asymmetric Encryption
5.7 Digital Certificates
18.6 Access Control
18.6 Access Control
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
11.6 Network Communication
11.7 Network Management
18.4 Private Networks
18.4 Private Networks
13.2 Assessing Risks
Standard
7.9 Cybersecurity
11.3 Network Management
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.8 Digital Certificates
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.11 Access Control
9.6 Network Communication
9.7 Network Management
9.8 Private Networks
13.2 Malware Types and Prevention
13.6 Internal Threats
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.5 Private Networks
5.6 Cybersecurity
Standard
5.5 Private Networks
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity
Standard
2.4 Privacy & Security
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security