Please enable JavaScript to use CodeHS

GA ADVCYB: IT-ACS-2.2

CodeHS Lessons

Investigate potential abuse and unethical uses of computers and networks.

Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
8.10 SQL Injection Overview
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.10 SQL Injection Overview
12.2 Assessing Risks
21.7 Hacking Ethics
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
10.10 SQL Injection Overview
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
8.1 Network Attacks
8.2 Malware Types and Prevention
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.2 Assessing Risks
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
10.4 Privacy & Security
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
7.5 SQL Injection Overview
14.1 Network Attacks
14.2 Malware Types and Prevention
14.3 Common Network Attacks
14.4 Additional Attacks
14.5 Cross-site Scripting
14.6 Internal Threats
16.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
5.11 SQL Injection Overview
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics