Please enable JavaScript to use CodeHS

KS 6-8: 8.NI.C.01

CodeHS Lessons

Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7)

Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
6.4 Cybersecurity
7.7 Hacking Ethics
Standard
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
13.7 Network Attacks
Standard
1.7 Hacking Ethics
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.7 Privacy & Security
11.9 Common Security Problems
11.11 Types of SQLi and Prevention
Standard
6.8 Application Security
6.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
2.8 Network Administration
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.4 Privacy & Security
13.6 Application Security
13.8 System Administration
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
6.8 System Administration
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
3.6 Application Security
3.8 System Administration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Network Administration
Standard
1.6 Application Security
1.8 System Administration
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.6 Application Security
3.8 System Administration
Standard
5.6 Privacy & Security
Standard
1.7 Hacking Ethics
4.4 Cybersecurity
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
10.10 System Administration
Standard
4.4 Privacy & Security
11.3 Impact of Cybersecurity
Standard
1.7 Privacy & Security
Standard
1.4 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
Standard
9.2 Impact of Cybersecurity
9.4 System Administration
Standard
10.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
6.6 Application Security
6.8 System Administration
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.6 Application Security
4.8 System Administration
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
4.4 Cybersecurity
6.7 Hacking Ethics
Standard
1.6 Application Security
1.8 System Administration
Standard
3.6 Privacy & Security
Standard
2.4 Cybersecurity
Standard
2.7 Hacking Ethics