Please enable JavaScript to use CodeHS

GA FSIS: MS-CS-FSIS-1.6

CodeHS Lessons

Investigate educational requirements, job responsibilities, employment trends, and opportunities within information technology career pathways using credible sources.

Standard
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
11.1 Methodology
11.2 Support Practice
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
11.4 Clients and Servers
11.8 Databases
11.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
5.1 Methodology
5.2 Support Practice
Standard
1.12 Hacking Ethics
4.1 Methodology
4.2 Support Practice
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.8 Network Administration
3.1 Methodology
3.2 Support Practice
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
4.1 Methodology
4.2 Support Practice
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
22.3 Databases
22.4 Clients and Servers
Standard
1.11 Hacking Ethics
Standard
12.7 Hacking Ethics
14.4 Databases
14.5 Clients and Servers
14.9 Common Security Problems
Standard
8.1 Methodology
8.2 Support Practice
9.4 Databases
9.5 Clients and Servers
9.9 Common Security Problems
21.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.7 Hacking Ethics
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.3 Databases
10.4 Clients and Servers
10.9 Common Security Problems
Standard
2.7 Hacking Ethics
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
5.1 Methodology
5.2 Support Practice
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
12.1 Methodology
12.2 Support Practice
17.4 Databases
17.5 Clients and Servers
Standard
2.3 Clients and Servers
Standard
7.6 Clients and Servers
Standard
2.7 Hacking Ethics
7.1 Clients and Servers
7.4 Common Security Problems
10.1 Methodology
10.2 Support Practice
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.5 Databases
5.6 Clients and Servers
5.10 Common Security Problems
11.1 Methodology
11.2 Support Practice
Standard
3.11 Hacking Ethics