Please enable JavaScript to use CodeHS

VA CF: 17

CodeHS Lessons

Maintain working knowledge of current information-technology (IT) systems.

Standard
11.7 Sequential, Parallel & Distributed Computing
Standard
13.8 Sequential, Parallel & Distributed Computing
Standard
6.1 Project: Classic Cipher Newscast
8.1 Inside Web Apps
8.2 Developer Tools
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
10.7 Network Management
11.1 Methodology
11.2 Support Practice
Standard
3.3 Protocols and Standards
3.4 Private Networks
4.2 Building a Knowledge Base
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
13.7 Network Attacks
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
11.1 Inside Web Apps
11.2 Developer Tools
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
1.1 Intro to the Internet
1.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.5 Internet Hardware
4.15 Network Management
5.1 Methodology
5.2 Support Practice
Standard
3.1 Intro to the Internet
3.5 Internet Hardware
3.15 Network Management
4.1 Methodology
4.2 Support Practice
Standard
5.1 Intro to the Internet
5.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
5.1 Intro to the Internet
5.2 Internet Hardware
5.7 Sequential, Parallel & Distributed Computing
Standard
2.8 Network Administration
3.1 Methodology
3.2 Support Practice
Standard
1.6 Common Security Problems
6.2 Building a Knowledge Base
Standard
1.6 Common Security Problems
4.1 Methodology
4.2 Support Practice
5.8 Protocols and Standards
5.13 Network Management
6.3 Building a Knowledge Base
Standard
11.8 Sequential, Parallel & Distributed Computing
Standard
1.12 Common Security Problems
8.1 Intro to the Internet
8.2 Internet Hardware
8.7 Network Attacks
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.9 SQL Injection Overview
22.11 Cross-site Scripting
22.2 Developer Tools
22.1 Inside Web Apps
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
14.1 Inside Web Apps
14.2 Developer Tools
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
3.1 Project: Classic Cipher Newscast
7.7 Network Management
8.1 Methodology
8.2 Support Practice
9.1 Inside Web Apps
9.2 Developer Tools
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
2.4 Authentication Methods
4.6 Routing and Packets
5.7 Network Management
5.8 Methodology
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
6.9 Network Attacks
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.2 Developer Tools
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
12.1 Project: Classic Cipher Newscast
Standard
5.9 Network Attacks
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
4.12 Network Management
5.1 Methodology
5.2 Support Practice
6.2 Building a Knowledge Base
7.9 Protocols and Standards
Standard
8.1 Intro to the Internet
8.2 Internet Hardware
Standard
3.1 Intro to the Internet
3.2 Internet Hardware
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
5.1 Intro to the Internet
5.2 Internet Hardware
23.2 Building a Knowledge Base
Standard
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
11.7 Network Management
18.4 Private Networks
18.4 Private Networks
12.1 Methodology
12.2 Support Practice
13.2 Assessing Risks
17.2 Developer Tools
17.1 Inside Web Apps
18.3 Protocols and Standards
Standard
7.8 Sequential, Parallel & Distributed Computing
11.3 Network Management
Standard
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.9 Protocols and Standards
9.8 Private Networks
10.1 Methodology
10.2 Support Practice
11.3 Building a Knowledge Base
13.5 Cross-site Scripting
15.2 Assessing Risks
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
5.2 Inside Web Apps
5.3 Developer Tools
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
10.7 Network Management
11.1 Methodology
11.2 Support Practice
12.2 Building a Knowledge Base
13.2 Assessing Risks
Standard
4.1 Intro to the Internet
4.2 Internet Hardware
Standard
5.4 Protocols and Standards
5.5 Private Networks
6.9 Sequential, Parallel & Distributed Computing
Standard
5.4 Protocols and Standards
5.5 Private Networks
7.9 Sequential, Parallel & Distributed Computing
Standard
2.4 Computer Processing and Algorithms
Standard
4.1 Intro to the Internet
4.2 Internet Hardware