Please enable JavaScript to use CodeHS

SC 9-12: HS1.NI.2.2

CodeHS Lessons

Identify best practices of software development that improve computer security and protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).

Standard
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
8.2 Assessing Risks
6.1 Project Security Assessment Report
Standard
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
2.8 Network Administration
Standard
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
Standard
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
15.2 Assessing Risks
Standard
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks