Please enable JavaScript to use CodeHS

VA CF: 27

CodeHS Lessons

Examine principles of technology that underlie an industry/organization.

Standard
6.4 Storage Options
6.7 Network Options
6.10 Network Communication
7.1 Communication is Key!
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
10.2 Level 2: User Training
Standard
6.4 Storage Options
6.7 Network Options
6.8 Network Communication
Standard
1.2 Storage Options
1.4 Network Options
1.5 Network Communication
2.8 Network Administration
Standard
6.1 Communication is Key!
Standard
3.2 Storage Options
5.10 Network Options
5.12 Network Communication
Standard
6.1 Communication is Key!
Standard
3.8 Network Options
3.9 Network Communication
4.1 Communication is Key!
Standard
7.4 Storage Options
7.5 Network Options
7.6 Network Communication
11.2 Level 2: User Training
Standard
5.4 Storage Options
5.5 Network Options
5.6 Network Communication
10.7 Risky Business
10.6 Checking for Vulnerabilities
10.3 Security in Coding
Standard
6.4 Storage Options
6.5 Network Options
6.6 Network Communication
11.3 Security in Coding
11.6 Checking for Vulnerabilities
11.7 Risky Business
Standard
6.10 Network Administration
7.1 Project: Secure the Company's Network
Standard
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
2.4 Level 2: User Training
4.6 Storage Options
4.7 Network Options
4.10 Network Communication
6.1 Communication is Key!
Standard
6.4 Storage Options
6.7 Network Options
6.10 Network Communication
7.1 Communication is Key!
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
6.4 Storage Options
6.7 Network Options
6.10 Network Communication
7.1 Communication is Key!
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
12.4 Storage Options
12.7 Network Options
12.10 Network Communication
Standard
22.1 Communication is Key!
Standard
11.4 Storage Options
11.5 Network Options
11.6 Network Communication
19.2 Level 2: User Training
Standard
8.3 Security in Coding
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
5.4 Storage Options
5.6 Network Options
5.10 Network Communication
7.3 Security in Coding
7.6 Checking for Vulnerabilities
7.7 Risky Business
Standard
9.4 Storage Options
9.5 Network Options
9.6 Network Communication
11.2 Communication is Key!
14.2 Level 2: User Training
Standard
7.2 Level 2: User Training
10.4 Storage Options
10.5 Network Options
10.6 Network Communication
12.1 Communication is Key!
Standard
6.4 Storage Options
6.5 Network Options
Standard
7.4 Storage Options
7.5 Network Options
Standard
10.4 Storage Options
10.5 Network Options
10.6 Network Communication
Standard
4.4 Storage Options
4.7 Network Options
4.10 Network Communication
6.3 Security in Coding
6.6 Checking for Vulnerabilities
6.7 Risky Business
7.1 Communication is Key!
Standard
4.1 Communication is Key!
7.2 Level 2: User Training