Please enable JavaScript to use CodeHS

FL CSD: CS-PC.1.4

CodeHS Lessons

Explain the principles of cryptography by examining encryption, digital signatures, and authentication methods (e.g., explain why and how certificates are used with “https” for authentication and encryption).

Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.7 Digital Certificates
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.3 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
4.1 What is Cybersecurity?
4.4 The CIA Triad
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.3 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
4.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
16.2 What is Cybersecurity?
16.4 The CIA Triad
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 What is Cybersecurity?
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
4.1 Cryptography, Cryptology, Cryptanalysis
5.7 Digital Certificates
Standard
9.1 What is Cybersecurity?
9.3 The CIA Triad
Standard
2.1 What is Cybersecurity?
2.2 The CIA Triad
Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
4.1 Cryptography, Cryptology, Cryptanalysis
4.8 Digital Certificates
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
Standard
2.5 The CIA Triad
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
11.2 What is Cybersecurity?
11.4 The CIA Triad