Please enable JavaScript to use CodeHS

VA CF: 62

CodeHS Lessons

Identify the perpetrators of different types of malicious hacking

Standard
1.3 Impact of Cybersecurity
8.10 SQL Injection Overview
Standard
3.2 Environmental Controls
5.6 Internal Threats
Standard
15.3 Impact of Cybersecurity
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
11.10 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
6.9 Environmental Controls
8.2 Impact of Cybersecurity
8.7 Internal Threats
Standard
8.7 Network Attacks
22.9 SQL Injection Overview
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
14.10 SQL Injection Overview
Standard
3.7 Cybersecurity Essentials
Standard
1.3 Impact of Cybersecurity
9.10 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
6.9 Network Attacks
10.10 SQL Injection Overview
Standard
5.9 Network Attacks
Standard
1.3 Impact of Cybersecurity
1.4 Environmental Controls
Standard
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity Essentials
Standard
11.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
17.10 SQL Injection Overview
17.10 SQL Injection Overview
18.2 Environmental Controls
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.5 SQL Injection Overview
13.6 Internal Threats
Standard
1.3 Impact of Cybersecurity
5.11 SQL Injection Overview
Standard
13.3 Impact of Cybersecurity
Standard
4.6 Cybersecurity Essentials