Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.7d

CodeHS Lessons

Investigate different career pathways relating to systems security.

Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
8.4 Databases
Standard
4.1 Communication is Key!
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.11 Hacking Ethics
11.8 Databases
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
1.12 Hacking Ethics
12.3 Computer Science Careers
Standard
1.12 Hacking Ethics
14.3 Computer Science Careers
Standard
1.11 Hacking Ethics
12.1 Computer Science Careers
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
13.1 Computer Science Careers
Standard
5.1 Computer Science Careers
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
Standard
1.1 Computer Science Careers
Standard
1.5 Hacking Ethics
6.1 Communication is Key!
Standard
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
22.3 Databases
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.7 Hacking Ethics
14.4 Databases
Standard
1.17 Computer Science Careers
Standard
1.17 Computer Science Careers
Standard
1.17 Computer Science Careers
Standard
1.3 Impact of Cybersecurity
9.4 Databases
21.7 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
10.3 Databases
Standard
2.7 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
6.1 Communication is Key!
Standard
4.1 Computer Science Careers
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
10.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
11.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
9.1 Computer Science Careers
23.1 Communication is Key!
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
17.4 Databases
Standard
9.2 Impact of Cybersecurity
Standard
1.7 Computer Science Careers
2.4 Hacking Ethics
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
11.2 Communication is Key!
Standard
1.1 Computer Science Careers
Standard
1.8 Hacking Ethics
11.1 Computer Science Careers
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
5.5 Databases
12.1 Communication is Key!
Standard
1.11 Hacking Ethics
11.1 Computer Science Careers
Standard
13.3 Impact of Cybersecurity
Standard
9.1 Computer Science Careers
Standard
17.1 Computer Science Careers
Standard
8.1 Computer Science Careers
Standard
3.11 Hacking Ethics