Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.7a

CodeHS Lessons

Identify examples of threats to systems and data.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
5.5 Cross-site Scripting
7.4 Level 4: Data and Licenses
8.1 Identifying Risks
8.2 Assessing Risks
Standard
13.7 Network Attacks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.7 Identifying Risks
Standard
6.6 Application Security
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
11.4 Level 4: Data and Licenses
12.1 Identifying Risks
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.9 Network Attacks
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
5.9 Network Attacks
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
19.4 Level 4: Data and Licenses
Standard
7.9 Cybersecurity
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Application Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
14.5 Cross-site Scripting
16.1 Identifying Risks
16.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
7.4 Level 4: Data and Licenses
13.1 Identifying Risks
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.6 Privacy & Security