Please enable JavaScript to use CodeHS

TN CI: C10H14.15

CodeHS Lessons

Document the security risks associated with new applications and evaluate the severity of the risk involved in each, including but not limited to: a. Identifying threats to information systems facilities, data communications systems, and other applications b. Adhering to federal and state legislation pertaining to computer crime, fraud, and abuse c. Providing means for preserving confidentiality and encryption of sensitive data d. Detailing steps to recover from routine errors or catastrophic failures, such as might be caused by a malicious computer virus

Standard
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
Standard
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
Standard
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
Standard
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
Standard
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report