Please enable JavaScript to use CodeHS

CA Networking: B8.1

CodeHS Lessons

Identify and define command network security threats: hackers, crackers, viruses, worms, and Trojan horses.

Standard
1.2 What is Cybersecurity?
7.6 Application Security
8.10 SQL Injection Overview
Standard
5.2 Malware Types and Prevention
8.1 Identifying Risks
Standard
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
6.8 Application Security
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.8 Application Security
4.1 What is Cybersecurity?
Standard
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
22.9 SQL Injection Overview
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
13.6 Application Security
14.10 SQL Injection Overview
Standard
3.7 Identifying Risks
Standard
3.7 Identifying Risks
Standard
1.2 What is Cybersecurity?
6.6 Application Security
9.10 SQL Injection Overview
12.1 Identifying Risks
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
10.10 SQL Injection Overview
Standard
1.2 What is Cybersecurity?
3.6 Application Security
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
10.8 Application Security
Standard
11.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
7.6 Application Security
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.1 Identifying Risks
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
4.6 Application Security
5.11 SQL Injection Overview
13.1 Identifying Risks
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
5.6 Cybersecurity
Standard
1.6 Application Security
Standard
3.1 What is Cybersecurity?