Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.1

CodeHS Lessons

Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.

Standard
10.8 Ethical and Social Implications of Computing
Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
Standard
6.3 Private Networks
6.4 Mobile Devices
6.5 Access Control
10.4 Level 4: Data and Licenses
Standard
13.1 What is Cybersecurity?
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
9.3 Copyright Rules
Standard
4.2 Quality Datasets
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.1 What is Cybersecurity?
1.7 Privacy & Security
Standard
5.8 Application Security
7.10 Ethical and Social Implications of Computing
8.13 Ethical Issues Around Data Collection
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.8 Application Security
4.1 What is Cybersecurity?
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
3.7 Mobile Devices
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.4 Privacy & Security
13.6 Application Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.9 Application Security
Standard
3.3 Personal Data and Collection
3.6 Personal Data Security
8.7 Quality Datasets
Standard
1.2 What is Cybersecurity?
2.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
3.6 Application Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.6 Application Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
4.14 Mobile Devices
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
Standard
7.9 Cybersecurity
8.5 Application Security
10.7 Quality Datasets
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.2 Personal Data and Collection
5.5 Personal Data Security
5.7 Common Cyber Attacks and Prevention
10.8 Application Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
11.2 What is Cybersecurity?
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
18.6 Access Control
18.6 Access Control
18.4 Private Networks
18.4 Private Networks
19.4 Level 4: Data and Licenses
18.5 Mobile Devices
Standard
6.10 Cybersecurity
8.1 What is Cybersecurity?
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
5.8 Application Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
3.6 Application Security
5.13 Private Networks
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
8.11 Access Control
9.8 Private Networks
14.4 Level 4: Data and Licenses
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
4.6 Application Security
4.10 Mobile Devices
7.4 Level 4: Data and Licenses
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
5.5 Private Networks
5.6 Cybersecurity
11.10 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
5.5 Private Networks
5.6 Cybersecurity
11.10 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
Standard
4.2 Personal Data and Collection
4.5 Personal Data Security
4.7 Common Cyber Attacks and Prevention
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
6.19 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
10.9 Cybersecurity
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.8 Application Security
6.8 Private Networks
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
Standard
3.2 Personal Data and Collection
3.5 Personal Data Security
3.7 Common Cyber Attacks and Prevention
Standard
3.4 Private Networks
3.5 Mobile Devices
3.6 Access Control
7.4 Level 4: Data and Licenses