Please enable JavaScript to use CodeHS

IL 11-12: 11-12.AP.21

CodeHS Lessons

Explain security issues that might lead to compromised computer programs.

Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
4.8 Application Security
Standard
5.2 Malware Types and Prevention
8.2 Assessing Risks
Standard
8.8 Data Compression
8.9 Lossy Compression
41.1 Cryptography
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.4 Malware Types and Prevention
Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
Standard
6.6 Application Security
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
3.6 Application Security
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.8 Application Security
Standard
6.8 Data Compression
6.9 Lossy Compression
6.10 Cryptography
7.9 Cybersecurity
8.5 Application Security
Standard
4.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.2 Malware Types and Prevention
13.2 Assessing Risks
Standard
6.7 Data Compression
6.8 Lossy Compression
7.9 Cybersecurity
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
13.2 Malware Types and Prevention
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
4.7 Data Compression
4.8 Lossy Compression
5.6 Cybersecurity
Standard
4.7 Data Compression
4.8 Lossy Compression
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
Standard
7.6 Data Compression
7.7 Lossy Compression
7.8 Cryptography
10.9 Cybersecurity
Standard
2.4 Privacy & Security
7.6 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security