Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.7b

CodeHS Lessons

Describe the process by which intruders gain entry into a production system (e.g., reconnaissance).

Standard
8.3 Security in Coding
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
9.4 Penetration Testing
Standard
12.4 Penetration Testing
Standard
10.3 Security in Coding
10.6 Checking for Vulnerabilities
10.4 Dev Tools Capture the Flag
Standard
11.3 Security in Coding
11.4 Dev Tools Capture the Flag
11.6 Checking for Vulnerabilities
Standard
8.3 Security in Coding
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
8.3 Security in Coding
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
13.4 Penetration Testing
Standard
8.3 Security in Coding
8.4 Dev Tools Capture the Flag
8.6 Checking for Vulnerabilities
Standard
7.3 Security in Coding
7.4 Dev Tools Capture the Flag
7.6 Checking for Vulnerabilities
Standard
15.4 Penetration Testing
Standard
13.4 Penetration Testing
Standard
6.3 Security in Coding
6.4 Dev Tools Capture the Flag
6.6 Checking for Vulnerabilities