Please enable JavaScript to use CodeHS

WY L1: L1.NI.C.04

CodeHS Lessons

Explain trade-offs when selecting and implementing cybersecurity recommendations.

Standard
11.9 Cybersecurity
Standard
5.4 Additional Attacks
8.2 Assessing Risks
Standard
13.2 CIA Triad
13.6 OSI model activity
13.8 Basic Cybersecurity Risk Concepts
13.10 Cybersecurity Risk Model-Vulnerabilities
13.11 Cybersecurity Risk Model-Security Controls
Standard
2.2 CIA Triad
8.2 OSI model activity
10.1 Basic Cybersecurity Risk Concepts
10.3 Cybersecurity Risk Model-Vulnerabilities
10.4 Cybersecurity Risk Model-Security Controls
Standard
2.2 CIA Triad
8.2 OSI model activity
10.1 Basic Cybersecurity Risk Concepts
10.3 Cybersecurity Risk Model-Vulnerabilities
10.4 Cybersecurity Risk Model-Security Controls
Standard
8.6 Additional Attacks
Standard
11.9 Cybersecurity
Standard
12.2 Assessing Risks
Standard
8.10 Cybersecurity
Standard
7.9 Cybersecurity
Standard
13.2 Assessing Risks
Standard
7.9 Cybersecurity
Standard
13.4 Additional Attacks
15.2 Assessing Risks
Standard
13.2 Assessing Risks
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity