Please enable JavaScript to use CodeHS

Georgia Intro to Hardware Technology: IT-IHT-9.9

CodeHS Lessons

Identify criminal activity in relationship to cybercrime, the Internet, and Internet trafficking. a. Common internet crimes, techniques to identify criminal activity and prevention actions related to cybercrime.

Standard
1.3 Impact of Cybersecurity
Standard
5.2 Malware Types and Prevention
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
8.4 Malware Types and Prevention
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
8.2 Malware Types and Prevention
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
13.2 Malware Types and Prevention
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity