Please enable JavaScript to use CodeHS

SC CYB: I.4

CodeHS Lessons

Identify vulnerabilities and common attack methods.

Standard
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
9.2 Assessing Risks
Standard
12.2 Assessing Risks
Standard
10.3 Security in Coding
10.6 Checking for Vulnerabilities
10.7 Risky Business
Standard
11.3 Security in Coding
11.6 Checking for Vulnerabilities
11.7 Risky Business
Standard
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
13.2 Assessing Risks
Standard
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
7.3 Security in Coding
7.6 Checking for Vulnerabilities
7.7 Risky Business
Standard
15.2 Assessing Risks
Standard
13.2 Assessing Risks
Standard
6.3 Security in Coding
6.6 Checking for Vulnerabilities
6.7 Risky Business
Standard
8.2 Assessing Risks