Please enable JavaScript to use CodeHS

SC CYB: G.3

CodeHS Lessons

Categorize sources/originators of different types of malicious attacks, e.g., nation states, cyber criminals, hacktivists, insiders, etc.

Standard
1.3 Impact of Cybersecurity
Standard
16.1 Advanced Networking
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
5.14 Advanced Networking
8.2 Impact of Cybersecurity
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
Standard
3.5 Cyber Ethics and Laws
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.12 Advanced Networking
Standard
13.3 Impact of Cybersecurity
Standard
5.4 Cyber Ethics and Laws
Standard
11.3 Impact of Cybersecurity
Standard
1.6 Cyber Ethics and Laws
Standard
1.4 Impact of Cybersecurity
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity