Please enable JavaScript to use CodeHS

WV M: CS.M.44

CodeHS Lessons

Explain principles of network security and techniques that protect stored and transmitted data (e.g., encryption, cryptography, and authentication).

Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
1.2 Encryption Algorithms
1.3 Advanced Cryptography
1.4 Hash Functions
1.6 Asymmetric Encryption
1.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
Standard
8.10 Cryptography
Standard
21.1 Cryptography, Cryptology, Cryptanalysis
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
4.2 Encryption Algorithms
4.3 Advanced Cryptography
4.4 Hash Functions
4.6 Asymmetric Encryption
4.7 Digital Certificates
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
7.7 Cryptography
Standard
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
11.1 Cryptography, Cryptology, Cryptanalysis
11.7 Advanced Cryptography
11.8 Hash Functions
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.3 Asymmetric Encryption
2.4 Authentication Methods
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
5.2 Encryption Algorithms
5.3 Advanced Cryptography
5.4 Hash Functions
5.6 Asymmetric Encryption
5.7 Digital Certificates
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.6 Hash Functions
4.8 Digital Certificates
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis