Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-2.1

CodeHS Lessons

Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.

Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.10 SQL Injection Overview
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks
Standard
13.9 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
1.6 Privacy & Security
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.10 SQL Injection Overview
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
10.10 SQL Injection Overview
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
1.4 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.2 Assessing Risks
Standard
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
10.4 Privacy & Security
14.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.5 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.5 SQL Injection Overview
14.1 Network Attacks
14.2 Malware Types and Prevention
14.3 Common Network Attacks
14.4 Additional Attacks
14.5 Cross-site Scripting
14.6 Internal Threats
16.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
5.11 SQL Injection Overview
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.6 Privacy & Security