Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.7d

CodeHS Lessons

Investigate different career pathways relating to systems security.

Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
8.4 Databases
Standard
4.1 Communication is Key!
Standard
13.9 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
7.1 Communication is Key!
Standard
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
22.3 Databases
Standard
1.11 Hacking Ethics
Standard
8.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
9.4 Databases
21.7 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
10.3 Databases
Standard
2.7 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
6.1 Communication is Key!
Standard
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
23.1 Communication is Key!
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
17.4 Databases
Standard
9.2 Impact of Cybersecurity
Standard
14.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
12.2 Communication is Key!
Standard
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
5.5 Databases
12.1 Communication is Key!
Standard
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics