Please enable JavaScript to use CodeHS

UT 11-12: 11/12.NI.1

CodeHS Lessons

Identify types of security threats, and then compare and contrast measures that can be used to address, resolve, and/or prevent identified threats.

Standard
2.4 Authentication Methods
4.8 Application Security
4.10 System Administration
Standard
1.7 Digital Certificates
5.1 Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
8.2 Assessing Risks
Standard
5.8 Application Security
5.10 System Administration
Standard
1.8 Application Security
1.9 System Administration
Standard
8.3 Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
22.11 Cross-site Scripting
Standard
13.6 Application Security
13.8 System Administration
Standard
4.7 Digital Certificates
6.6 Application Security
6.8 System Administration
12.2 Assessing Risks
Standard
2.4 Authentication Methods
3.6 Application Security
3.8 System Administration
Standard
2.4 Authentication Methods
4.6 Application Security
4.8 System Administration
Standard
10.12 Cross-site Scripting
Standard
1.6 Application Security
1.8 System Administration
Standard
3.6 Application Security
3.8 System Administration
Standard
2.4 Authentication Methods
4.8 Application Security
4.10 System Administration
Standard
8.5 Application Security
Standard
2.4 Authentication Methods
4.8 Application Security
4.10 System Administration
Standard
10.8 Application Security
10.10 System Administration
Standard
5.7 Digital Certificates
7.6 Application Security
7.8 System Administration
8.1 Network Attacks
13.2 Assessing Risks
Standard
9.4 System Administration
Standard
4.8 Digital Certificates
6.6 Application Security
6.8 System Administration
13.1 Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
13.6 Internal Threats
15.2 Assessing Risks
Standard
4.6 Application Security
4.8 System Administration
13.2 Assessing Risks
Standard
1.6 Application Security
1.8 System Administration
Standard
7.6 Application Security
7.8 System Administration