Please enable JavaScript to use CodeHS

NV CS&A: 9-12.DC.B.2

CodeHS Lessons

Distinguish potential dangers while online (e.g., malicious actors, phishing, impersonation) to prevent, detect, and combat cybersecurity threats while practicing safe and secure techniques, tactics, and practices recognizing cybersecurity is everyone's responsibility.

Standard
9.3 Internet Safety
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.7 Browser Configuration
Standard
5.2 Malware Types and Prevention
5.4 Additional Attacks
8.1 Identifying Risks
8.2 Assessing Risks
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
2.8 Securing a Network
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
8.4 Malware Types and Prevention
8.6 Additional Attacks
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
8.7 Network Attacks
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
3.7 Identifying Risks
Standard
1.3 Impact of Cybersecurity
6.7 Browser Configuration
12.1 Identifying Risks
12.2 Assessing Risks
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
6.9 Network Attacks
6.10 Securing a Network
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
5.9 Network Attacks
5.10 Securing a Network
Standard
1.7 Browser Configuration
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.7 Browser Configuration
Standard
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
7.7 Browser Configuration
8.2 Malware Types and Prevention
13.1 Identifying Risks
13.2 Assessing Risks
Standard
9.2 Impact of Cybersecurity
Standard
10.3 Internet Safety
10.4 Privacy & Security
14.3 Impact of Cybersecurity
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.7 Browser Configuration
Standard
1.5 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
6.7 Browser Configuration
14.2 Malware Types and Prevention
14.4 Additional Attacks
16.1 Identifying Risks
16.2 Assessing Risks
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
4.7 Browser Configuration
13.1 Identifying Risks
13.2 Assessing Risks
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.3 Impact of Cybersecurity
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics