Please enable JavaScript to use CodeHS

WY L1: L1.NI.C.02

CodeHS Lessons

Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
11.9 Cybersecurity
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
6.11 Network Management
Standard
5.4 Additional Attacks
8.2 Assessing Risks
Standard
13.1 Introduction to Cybersecurity
13.2 CIA Triad
13.3 Identity Crisis
13.4 Let Me In
13.5 Introduction to Networking
13.6 OSI model activity
13.7 Network Attacks
13.8 Basic Cybersecurity Risk Concepts
13.9 Cybersecurity Risk Model-Assessing Risk
13.10 Cybersecurity Risk Model-Vulnerabilities
13.11 Cybersecurity Risk Model-Security Controls
Standard
2.1 Introduction to Cybersecurity
2.2 CIA Triad
5.1 Identity Crisis
5.2 Let Me In
8.1 Introduction to Networking
8.2 OSI model activity
8.3 Network Attacks
10.1 Basic Cybersecurity Risk Concepts
10.2 Cybersecurity Risk Model-Assessing Risk
10.3 Cybersecurity Risk Model-Vulnerabilities
10.4 Cybersecurity Risk Model-Security Controls
Standard
2.1 Introduction to Cybersecurity
2.2 CIA Triad
5.1 Identity Crisis
5.2 Let Me In
8.1 Introduction to Networking
8.2 OSI model activity
8.3 Network Attacks
10.1 Basic Cybersecurity Risk Concepts
10.2 Cybersecurity Risk Model-Assessing Risk
10.3 Cybersecurity Risk Model-Vulnerabilities
10.4 Cybersecurity Risk Model-Security Controls
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
1.5 Network Communication
1.9 System Administration
Standard
5.12 Network Communication
5.13 Network Management
8.6 Additional Attacks
Standard
11.9 Cybersecurity
Standard
22.12 Project: Security Assessment Report
Standard
13.7 Browser Configuration
13.8 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
12.2 Assessing Risks
10.1 Project: Security Assessment Report
Standard
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
5.7 Network Management
Standard
4.7 Browser Configuration
4.8 System Administration
6.6 Network Communication
6.7 Network Management
Standard
8.10 Cybersecurity
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
Standard
5.8 Browser Configuration
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
6.11 Network Management
Standard
7.9 Cybersecurity
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
6.11 Network Management
Standard
10.9 Browser Configuration
10.10 System Administration
12.10 Network Communication
12.11 Network Management
Standard
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
9.1 Project: Security Assessment Report
Standard
7.9 Cybersecurity
9.4 System Administration
11.3 Network Management
Standard
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
9.7 Network Management
13.4 Additional Attacks
15.2 Assessing Risks
Standard
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
6.1 Project: Security Assessment Report
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
10.7 Network Management
14.1 Project: Security Assessment Report