Please enable JavaScript to use CodeHS

Montana 9-12: CS.NI.9-12.5

CodeHS Lessons

give examples to illustrate how sensitive data can be affected by malware and other attacks;

Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
4.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
11.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
Standard
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
7.8 Cryptography
10.9 Cybersecurity
10.10 The Impact of the Internet
Standard
3.1 What is Cybersecurity?