- What is CodeHS?
 - Curriculum
 - Platform
 - Assignments
 - Classroom Management
 - Grading
 - Gradebook
 - Progress Tracking
 - Lesson Plans
 - Offline Handouts
 - Problem Guides
 - Practice
 - Create
 - Problem Bank
 - Playlist Bank
 - Quiz Scores
 - Rostering
 - Integrations
 - Professional Development
 - Stories
 - Standards
 - States
 - Alabama
 - Alaska
 - Arizona
 - Arkansas
 - California
 - Colorado
 - Connecticut
 - D.C.
 - Delaware
 - Florida
 - Georgia
 - Hawaii
 - Idaho
 - Illinois
 - Indiana
 - Iowa
 - Kansas
 - Kentucky
 - Louisiana
 - Maine
 - Maryland
 - Massachusetts
 - Michigan
 - Minnesota
 - Mississippi
 - Missouri
 - Montana
 - Nebraska
 - Nevada
 - New Hampshire
 - New Jersey
 - New Mexico
 - New York
 - North Carolina
 - North Dakota
 - Ohio
 - Oklahoma
 - Oregon
 - Pennsylvania
 - Rhode Island
 - South Carolina
 - South Dakota
 - Tennessee
 - Texas
 - Utah
 - Vermont
 - Virginia
 - Washington
 - West Virginia
 - Wisconsin
 - Wyoming
 - State Standards
 - Plans
 - Resources
 - Districts
 - Share
 - Contact Us
 - Company
 
    
    SC 9-12: HS3.NI.2.1
CodeHS Lessons
Research security measures (i.e., hardware, software, and practices that control access to data and systems) to combat a variety of cybersecurity vulnerabilities (CSTA, 2017).
| Standard | 
| 4.8 Application Security | 
| 4.9 Browser Configuration | 
| 4.10 System Administration | 
| 6.10 Network Communication | 
| 6.11 Network Management | 
| Standard | 
| 3.2 Malware Types and Prevention | 
| 3.5 Cross-site Scripting | 
| 9.2 Assessing Risks | 
| Standard | 
| 13.7 Network Attacks | 
| Standard | 
| 9.4 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.7 Privacy & Security | 
| 12.9 Common Security Problems | 
| 12.10 SQL Injection Overview | 
| 12.11 Types of SQLi and Prevention | 
| Standard | 
| 5.8 Application Security | 
| 5.9 Browser Configuration | 
| 5.10 System Administration | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 11.6 Application Security | 
| 11.7 System Administration | 
| Standard | 
| 1.6 Privacy & Security | 
| 4.15 Network Management | 
| Standard | 
| 1.6 Privacy & Security | 
| 3.15 Network Management | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 7.8 Common Security Problems | 
| 7.9 SQL Injection Overview | 
| 7.10 Types of SQLi and Prevention | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 2.8 Application Security | 
| 2.9 Browser Configuration | 
| 2.10 System Administration | 
| 4.10 Network Communication | 
| 4.11 Network Management | 
| Standard | 
| 6.8 Network Communication | 
| Standard | 
| 1.9 Application Security | 
| 1.10 System Administration | 
| 3.11 Network Communication | 
| 3.12 Network Management | 
| Standard | 
| 1.9 Application Security | 
| 1.11 System Administration | 
| 3.14 Network Communication | 
| 3.15 Network Management | 
| Standard | 
| 1.9 Application Security | 
| 1.11 System Administration | 
| 3.11 Network Communication | 
| 3.12 Network Management | 
| Standard | 
| 1.9 Application Security | 
| 1.11 System Administration | 
| 3.11 Network Communication | 
| 3.12 Network Management | 
| Standard | 
| 1.5 Network Communication | 
| 1.8 Application Security | 
| 1.9 System Administration | 
| 2.8 Network Administration | 
| 4.5 Privacy & Security | 
| Standard | 
| 1.3 Privacy & Security | 
| 1.6 Common Security Problems | 
| Standard | 
| 1.3 Privacy & Security | 
| 1.6 Common Security Problems | 
| 5.12 Network Communication | 
| 5.13 Network Management | 
| 8.4 Malware Types and Prevention | 
| Standard | 
| 1.6 Privacy & Security | 
| 1.12 Common Security Problems | 
| 8.7 Network Attacks | 
| 22.9 SQL Injection Overview | 
| 22.10 Types of SQLi and Prevention | 
| 22.11 Cross-site Scripting | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 12.4 Privacy & Security | 
| 13.6 Application Security | 
| 13.7 Browser Configuration | 
| 13.8 System Administration | 
| 14.9 Common Security Problems | 
| 14.10 SQL Injection Overview | 
| 14.11 Types of SQLi and Prevention | 
| Standard | 
| 2.9 Application Security | 
| 2.10 System Administration | 
| 3.9 Network Communication | 
| 3.10 Network Management | 
| Standard | 
| 6.6 Application Security | 
| 6.7 Browser Configuration | 
| 6.8 System Administration | 
| 7.6 Network Communication | 
| 7.7 Network Management | 
| 9.9 Common Security Problems | 
| 9.10 SQL Injection Overview | 
| 9.11 Types of SQLi and Prevention | 
| 12.2 Assessing Risks | 
| 21.4 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 3.6 Application Security | 
| 3.7 Browser Configuration | 
| 3.8 System Administration | 
| 5.6 Network Communication | 
| 5.7 Network Management | 
| Standard | 
| 4.5 Application Security | 
| 4.6 Browser Configuration | 
| Standard | 
| 4.6 Application Security | 
| 4.7 Browser Configuration | 
| 4.8 System Administration | 
| 6.6 Network Communication | 
| 6.7 Network Management | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 8.4 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.4 Privacy & Security | 
| 6.9 Network Attacks | 
| 6.10 Network Administration | 
| 10.9 Common Security Problems | 
| 10.10 SQL Injection Overview | 
| 10.11 Types of SQLi and Prevention | 
| 10.12 Cross-site Scripting | 
| Standard | 
| 2.4 Privacy & Security | 
| 5.9 Network Attacks | 
| 5.10 Network Administration | 
| 14.11 System Administration | 
| 14.4 Network Communication | 
| 14.12 Network Management | 
| Standard | 
| 1.6 Application Security | 
| 1.7 Browser Configuration | 
| 1.8 System Administration | 
| Standard | 
| 2.1 Privacy & Security | 
| 3.6 Application Security | 
| 3.7 Browser Configuration | 
| 3.8 System Administration | 
| 4.10 Network Communication | 
| 4.12 Network Management | 
| Standard | 
| 5.6 Privacy & Security | 
| 5.8 Browser Configuration | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.8 Application Security | 
| 4.9 Browser Configuration | 
| 4.10 System Administration | 
| 6.10 Network Communication | 
| 6.11 Network Management | 
| Standard | 
| 8.5 Application Security | 
| Standard | 
| 4.8 Application Security | 
| 4.9 Browser Configuration | 
| 4.10 System Administration | 
| 6.10 Network Communication | 
| 6.11 Network Management | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 10.8 Application Security | 
| 10.9 Browser Configuration | 
| 10.10 System Administration | 
| 12.10 Network Communication | 
| 12.11 Network Management | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.4 Privacy & Security | 
| Standard | 
| 1.4 Privacy & Security | 
| Standard | 
| 1.7 Privacy & Security | 
| Standard | 
| 2.4 Privacy & Security | 
| 7.6 Application Security | 
| 7.7 Browser Configuration | 
| 7.8 System Administration | 
| 8.2 Malware Types and Prevention | 
| 17.9 Common Security Problems | 
| 17.9 Common Security Problems | 
| 17.10 SQL Injection Overview | 
| 17.10 SQL Injection Overview | 
| 17.11 Types of SQLi and Prevention | 
| 17.11 Types of SQLi and Prevention | 
| 11.6 Network Communication | 
| 11.7 Network Management | 
| 13.2 Assessing Risks | 
| Standard | 
| 8.4 System Administration | 
| 10.3 Network Management | 
| Standard | 
| 5.8 Application Security | 
| 5.9 Browser Configuration | 
| 5.10 System Administration | 
| Standard | 
| 3.6 Application Security | 
| 3.8 Browser Configuration | 
| 3.9 System Administration | 
| 5.10 Network Communication | 
| 5.11 Network Management | 
| Standard | 
| 10.4 Privacy & Security | 
| Standard | 
| 1.6 Application Security | 
| 1.7 Browser Configuration | 
| 1.8 System Administration | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.5 Privacy & Security | 
| Standard | 
| 2.4 Privacy & Security | 
| 6.6 Application Security | 
| 6.7 Browser Configuration | 
| 6.8 System Administration | 
| 7.4 Common Security Problems | 
| 7.5 SQL Injection Overview | 
| 7.6 Types of SQLi and Prevention | 
| 9.6 Network Communication | 
| 9.7 Network Management | 
| 13.2 Malware Types and Prevention | 
| 13.5 Cross-site Scripting | 
| 15.2 Assessing Risks | 
| Standard | 
| 1.3 Privacy & Security | 
| Standard | 
| 2.4 Privacy & Security | 
| 4.6 Application Security | 
| 4.7 Browser Configuration | 
| 4.8 System Administration | 
| 5.10 Common Security Problems | 
| 5.11 SQL Injection Overview | 
| 5.12 Types of SQLi and Prevention | 
| 10.6 Network Communication | 
| 10.7 Network Management | 
| 13.2 Assessing Risks | 
| Standard | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 6.8 Browser Configuration | 
| Standard | 
| 7.8 Browser Configuration | 
| Standard | 
| 9.4 System Administration | 
| 11.3 Network Management | 
| Standard | 
| 5.7 Privacy & Security | 
| Standard | 
| 3.4 Privacy & Security | 
- What is CodeHS?
 - Curriculum
 - Platform
 - Assignments
 - Classroom Management
 - Grading
 - Gradebook
 - Progress Tracking
 - Lesson Plans
 - Offline Handouts
 - Problem Guides
 - Practice
 - Create
 - Problem Bank
 - Playlist Bank
 - Quiz Scores
 - Rostering
 - Integrations
 - Professional Development
 - Stories
 - Standards
 - States
 - Alabama
 - Alaska
 - Arizona
 - Arkansas
 - California
 - Colorado
 - Connecticut
 - D.C.
 - Delaware
 - Florida
 - Georgia
 - Hawaii
 - Idaho
 - Illinois
 - Indiana
 - Iowa
 - Kansas
 - Kentucky
 - Louisiana
 - Maine
 - Maryland
 - Massachusetts
 - Michigan
 - Minnesota
 - Mississippi
 - Missouri
 - Montana
 - Nebraska
 - Nevada
 - New Hampshire
 - New Jersey
 - New Mexico
 - New York
 - North Carolina
 - North Dakota
 - Ohio
 - Oklahoma
 - Oregon
 - Pennsylvania
 - Rhode Island
 - South Carolina
 - South Dakota
 - Tennessee
 - Texas
 - Utah
 - Vermont
 - Virginia
 - Washington
 - West Virginia
 - Wisconsin
 - Wyoming
 - State Standards
 - Plans
 - Resources
 - Districts
 - Share
 - Contact Us
 - Company