Please enable JavaScript to use CodeHS

SC FCS: C.7

CodeHS Lessons

Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.

Standard
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics
Standard
1.8 Application Security
1.9 System Administration
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
21.7 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.2 What is Cybersecurity?
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.7 Hacking Ethics
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
9.1 What is Cybersecurity?
9.3 The CIA Triad
9.4 System Administration
Standard
14.2 What is Cybersecurity?
14.4 The CIA Triad
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.7 Hacking Ethics
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.11 Hacking Ethics
Standard
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.12 Hacking Ethics