Please enable JavaScript to use CodeHS

SC FCS: K.6

CodeHS Lessons

Explain the concept of encryption and how it is used on a daily basis.

Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
4.7 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.1 What is Cybersecurity?
4.4 The CIA Triad
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.3 The CIA Triad
12.4 Privacy & Security
Standard
2.5 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
16.2 What is Cybersecurity?
16.4 The CIA Triad
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.4 Privacy & Security
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.6 Privacy & Security
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
11.2 What is Cybersecurity?
11.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
Standard
8.1 What is Cybersecurity?
8.3 The CIA Triad
Standard
2.1 What is Cybersecurity?
2.2 The CIA Triad
Standard
2.5 The CIA Triad
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.4 Privacy & Security
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
4.5 The CIA Triad