Please enable JavaScript to use CodeHS

Points

Activity Points
What is Cybersecurity?
1.1 Module Overview - Cybersecurity
1.1.1 Video: Welcome to Cybersecurity 1
1.1.2 Check for Understanding: Welcome to Cybersecurity 2
1.1.3 Example: Intruder Alert! 1
1.1.4 Free Response: Cybersecurity and You 5
1.1.5 Free Response: Course Goals 5
1.2 What is Cybersecurity?
1.2.1 Video: What is Cybersecurity? 1
1.2.2 Check for Understanding: What is Cybersecurity? 3
1.2.3 Connection: WannaCry Ransomware Attack 1
1.2.4 Free Response: WannaCry Reflection 5
1.2.5 Example: Ransomware Simulator 1
1.2.6 Connection: Internet of Things 1
1.2.7 Connection: Cybersecurity and Connected Cars 1
1.2.8 Free Response: Internet of Things Reflection 5
1.3 Impact of Cybersecurity
1.3.1 Video: Impact of Cybersecurity 1
1.3.2 Check for Understanding: Impact of Cybersecurity 2
1.3.3 Example: Phishing Simulator 1
1.3.4 Connection: Yahoo! Attack 1
1.3.5 Free Response: Yahoo! Reflection 5
1.3.6 Connection: Fighting Cyber Crime 1
1.3.7 Free Response: Cyber Crime Reflection 5
1.3.8 Connection: FBI Cyber Crime 1
1.3.9 Free Response: FBI Reflection 5
1.4 The CIA Triad
1.4.1 Video: CIA Triad 1
1.4.2 Check for Understanding: CIA Triad 2
1.4.3 Free Response: Which part of the CIA Triad? 5
1.4.4 Free Response: Which part of the CIA Triad? 5
1.4.5 Free Response: Breach of Confidentiality 5
1.4.6 Free Response: Breach of Availability 5
1.4.7 Free Response: CIA Connections 5
1.5 What is Cybersecurity? Quiz
1.5.1 Unit Quiz: What is Cybersecurity? Quiz 15
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
2.1.1 Video: Digital Footprint and Reputation 1
2.1.2 Check for Understanding: Digital Footprint and Reputation 3
2.1.3 Example: Social Media Clean-up 1
2.1.4 Free Response: Building a Positive Digital Footprint 5
2.1.5 Connection: Right to be Forgotten? 1
2.1.6 Free Response: Right to be Forgotten 5
2.1.7 Free Response: What is your Digital Footprint? 5
2.2 Cyberbullying
2.2.1 Video: Cyberbullying 1
2.2.2 Check for Understanding: Cyberbullying 3
2.2.3 Free Response: Scenario: Student Ranking 5
2.2.4 Free Response: Scenario: Singled Out 5
2.2.5 Notes: United Against Cyberbullying: A Fictional Story 5
2.2.6 Free Response: Reflection: United Against Cyberbullying 5
2.2.7 Free Response: Stopping Cyberbullying 5
2.3 Internet Safety
2.3.1 Video: Internet Safety 1
2.3.2 Check for Understanding: Internet Safety 2
2.3.3 Free Response: Scenario: School Stranger 5
2.3.4 Free Response: Scenario: Vacation Pals 5
2.3.5 Free Response: Staying Safe 5
2.4 Privacy & Security
2.4.1 Video: What is Data Privacy & Security? 1
2.4.2 Check for Understanding: Privacy & Security Quiz 2
2.4.3 Connection: Google Privacy Policy Search 1
2.4.4 Free Response: Google Privacy Policy Search 5
2.4.5 Example: Guess: Password List 1
2.4.6 Example: Guess: Using an Algorithm 1
2.4.7 Example: Guess: Brute Force 1
2.4.8 Connection: How Strong is your Password? 1
2.4.9 Free Response: How Strong is your password? 5
2.5 Information Literacy
2.5.1 Video: Information Literacy 1
2.5.2 Check for Understanding: Information Literacy 2
2.5.3 Free Response: Effective Internet Searches 5
2.5.4 Connection: Evaluate the Source 1 1
2.5.5 Free Response: Respond: Evaluate the Source 1 5
2.5.6 Notes: Evaluate the Source 2 1
2.5.7 Free Response: Respond: Evaluate the Source 2 5
2.5.8 Connection: Hero Pig? 1
2.5.9 Free Response: Respond: Hero Pig? 5
2.6 Creative Credit & Copyright
2.6.1 Video: Creative Credit and Copyright 1
2.6.2 Check for Understanding: Creative Credit and Copyright 2
2.6.3 Free Response: Cite! 5
2.6.4 Connection: Exploring Creative Commons 1
2.6.5 Free Response: Respond: Creative Commons 5
2.6.6 Free Response: Task: Finding Images 5
2.6.7 Free Response: Reflection: Why is Copyright Important? 5
2.7 Hacking Ethics
2.7.1 Video: Hacking Ethics & Legality 1
2.7.2 Check for Understanding: Hacking Ethics & Legality 4
2.7.3 Free Response: Reflection: White Hat vs Black Hat Hacking 5
2.7.4 Connection: Penetration Testing 1
2.7.5 Free Response: Reflection: Penetration Testing 5
2.7.6 Connection: Hack the Pentagon? 1
2.7.7 Free Response: Reflection: Hack the Pentagon 5
2.7.8 Check for Understanding: Ethical Hacker Agreement 1
2.8 Digital Citizenship and Cybersecurity Quiz
2.8.1 Unit Quiz: Digital Citizenship and Cyber Hygiene Quiz 20
Project: Public Service Announcement
3.1 Project: Public Service Announcement
3.1.1 Free Response: Pick a Topic 5
3.1.2 Free Response: Research 5
3.1.3 Free Response: Choose Your Audience 5
3.1.4 Free Response: What kind of PSA? 5
3.1.5 Free Response: Draft your PSA 5
3.1.6 Free Response: Finalize your PSA! 15
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
4.1.1 Video: Cryptography, Cryptology, Cryptanalysis 1
4.1.2 Check for Understanding: Cryptography, Cryptology, Cryptanalysis 2
4.1.3 Example: Cryptogram Game! 1
4.1.4 Video: Why encrypt? 1
4.1.5 Check for Understanding: Why encrypt? 2
4.1.6 Example: Encrypt/Decrypt 1
4.2 History of Cryptography
4.2.1 Video: Cryptography: A Brief History 1
4.2.2 Check for Understanding: Cryptography History Quiz 2
4.2.3 Connection: How the Enigma Worked 1
4.2.4 Free Response: How the Enigma Worked 5
4.2.5 Connection: Unknown Languages and the Future of Cryptography 1
4.2.6 Free Response: The Future of Cybersecurity 5
4.3 Basic Crypto Systems: Caesar Cipher
4.3.1 Video: Caesar Cipher 1
4.3.2 Check for Understanding: Caesar Cipher 2
4.3.3 Example: Caesar Cipher Encryption 1
4.3.4 Example: Decrypt Caesar's Cipher! 1
4.4 Basic Crypto Systems: Cracking Caesar
4.4.1 Video: Cracking Caesar Cipher 1
4.4.2 Check for Understanding: Cracking Caesar Cipher 2
4.4.3 Example: Cracking Caesar with Brute Force 1
4.4.4 Example: Letter Frequency and Caesar 1
4.4.5 Free Response: Examining Caesar Cipher 5
4.5 Basic Crypto Systems: Vigenere Cipher
4.5.1 Video: Vigenere Cipher 1
4.5.2 Check for Understanding: Vigenere Cipher 1
4.5.3 Example: Vigenere Cipher Example 1
4.5.4 Example: Letter Frequency and Vigenere Cipher 1
4.5.5 Free Response: Examining Vigenere Cipher 5
4.5.6 Example: Improving Vigenere 1
4.6 Hash Functions
4.6.1 Video: Hash Functions 1
4.6.2 Check for Understanding: Hash Functions 3
4.6.3 Connection: Google Shattered Crypto Algorithm 1
4.6.4 Free Response: Hash Functions in the News 5
4.6.5 Video: What is a Checksum? 5
4.6.6 Connection: Using a Hash Generator 1
4.6.7 Free Response: Hash Generator 5
4.6.8 Connection: Password Salting 1
4.6.9 Free Response: Password Salting 5
4.7 Hash Function Development
4.7.1 Video: Hash Function Development 1
4.7.2 Check for Understanding: Hash Function Development 2
4.7.3 Example: Modulo Math Calculator 1
4.7.4 Example: Understanding Modulo Math 1
4.7.5 Example: Modulo Game! 1
4.7.6 Exercise: Develop a Simple Hash Function 5
4.8 Digital Certificates
4.8.1 Video: Symmetric vs Asymmetric Encryption 1
4.8.2 Notes: RSA 5
4.8.3 Video: Digital Certificates 1
4.8.4 Check for Understanding: Digital Certificates 4
4.8.5 Connection: SSL Explained 1
4.8.6 Free Response: SSL Explained 5
4.8.7 Free Response: SSL Connection 5
4.8.8 Connection: In The News 1
4.8.9 Free Response: In The News Response 5
4.8.10 Free Response: Become a Certificate Authority! 10
4.9 The ABCs of Cryptography Quiz
4.9.1 Unit Quiz: The ABCs of Cryptography Quiz 15
Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
5.1.1 Notes: Overview 1
5.1.2 Notes: Investigate a Classic Cipher 1
5.1.3 Free Response: Write the Script and Rehearse 5
5.1.4 Free Response: Newscast Presentation 15
System Administration
6.1 Operating Systems
6.1.1 Video: Operating Systems 1
6.1.2 Check for Understanding: Operating Systems Quiz 5
6.1.3 Example: Detect My OS 1
6.1.4 Example: Windows OS Installation Simulation 1
6.1.5 Free Response: Installing an OS 5
6.1.6 Connection: Upgrading a Mac OS 1
6.2 Comparing Operating Systems
6.2.1 Video: Comparing Operating Systems 1
6.2.2 Check for Understanding: Comparing Operating Systems Quiz 5
6.2.3 Example: Windows Simulation 1
6.2.4 Example: MacOS Simulation 1
6.2.5 Connection: Choose a Linux Distro! 1
6.2.6 Free Response: Which would you choose? 5
6.3 Compatibility
6.3.1 Video: Compatibility 1
6.3.2 Check for Understanding: Compatibility Quiz 3
6.3.3 Example: What Processor? Windows 1
6.3.4 Example: What Processor? Mac 1
6.3.5 Free Response: What Processor are you running? 5
6.4 Software and Applications
6.4.1 Video: Software and Applications 1
6.4.2 Check for Understanding: Software and Applications Quiz 2
6.4.3 Example: Spreadsheet Simulation 1
6.4.4 Example: Messaging Simulation 1
6.4.5 Example: Kanban Board Simulation 1
6.4.6 Free Response: Software Simulations 5
6.5 Software Licenses
6.5.1 Video: Software Licenses 1
6.5.2 Check for Understanding: Software Licenses Quiz 3
6.5.3 Free Response: Do I need a Software License? 5
6.5.4 Free Response: Is This Original? 5
6.6 Application Security
6.6.1 Video: Application Security 1
6.6.2 Check for Understanding: Application Security 5
6.6.3 Example: Windows Updates 1
6.6.4 Connection: Windows Defender Antivirus 1
6.6.5 Free Response: Windows Defender Antivirus 5
6.6.6 Free Response: CodeHS System Restore 5
6.7 Browser Configuration
6.7.1 Video: Browser Configuration 1
6.7.2 Check for Understanding: Browser Configuration 5
6.7.3 Connection: Cached CodeHS 1
6.7.4 Free Response: Cached CodeHS 5
6.7.5 Example: Is Your Popup Blocker On? 1
6.7.6 Free Response: Browser Extensions Lab 5
6.8 System Administration
6.8.1 Video: User Accounts 1
6.8.2 Check for Understanding: User Accounts Quiz 2
6.8.3 Free Response: User Accounts 5
6.8.4 Free Response: Shared Folders and Files 5
6.8.5 Video: Host Security 1
6.8.6 Check for Understanding: Host Security Quiz 3
6.8.7 Free Response: Security Baseline 5
6.9 Command Line Interface
6.9.1 Notes: Linux/MacOS vs. Windows 1
6.9.2 Video: Command Line Interface 1
6.9.3 Check for Understanding: Command Line Interface Quiz 5
6.9.4 Resource: Command Equivalents 1
6.9.5 Video: Windows Command Prompt 1
6.9.6 Free Response: Windows Command Prompt 5
6.9.7 Free Response: Directory Directions 5
6.9.8 Connection: Neural Interface? 1
6.9.9 Free Response: Neural Interface? 5
6.10 System Administration Quiz
6.10.1 Survey: Mindsets 1
6.10.2 Unit Quiz: System Administration Quiz 20
Software Security
7.1 Clients and Servers
7.1.1 Video: Clients and Servers 1
7.1.2 Check for Understanding: Clients and Servers 2
7.1.3 Connection: Inside a Google Data Center 1
7.1.4 Free Response: Inside a Google Data Center 5
7.1.5 Connection: Cloud Vulnerabilities 1
7.1.6 Free Response: Cloud Vulnerabilities Response 5
7.1.7 Video: Client-Server Model 1
7.1.8 Check for Understanding: Client-Server Model 2
7.1.9 Connection: The Future of User Privacy 1
7.1.10 Free Response: The Future of User Privacy 5
7.2 What is SQL?
7.2.1 Notes: What is SQL Overview 1
7.2.2 Video: Intro to SQL 1
7.2.3 Check for Understanding: Quiz: What is SQL? 1
7.2.4 Video: How to Structure Data in SQL 1
7.2.5 Check for Understanding: How to Structure Data in SQL 3
7.2.6 Example: SQL Tables 1
7.2.7 Free Response: SQL Tables Response 5
7.3 Basic Querying in SQL
7.3.1 Video: The SELECT Statement 1
7.3.2 Check for Understanding: Basic Querying in SQL 1
7.3.3 Example: Our First SELECT Statement 1
7.3.4 Exercise: Your First SELECT Statement 5
7.3.5 Video: More SELECT Statement 1
7.3.6 Check for Understanding: More SELECT Statement 1
7.3.7 Example: Selecting Specific Columns 1
7.3.8 Exercise: Harry Potter Names 5
7.4 Common Security Problems
7.4.1 Video: Common Security Problems 1
7.4.2 Check for Understanding: Common Security Problems 1
7.4.3 Connection: Meet Security Engineers at Google 1
7.4.4 Free Response: Security Engineering Reflection 5
7.4.5 Video: Living in a Digital World 1
7.4.6 Free Response: Living in a Digital World 5
7.5 SQL Injection Overview
7.5.1 Video: SQL Injection Overview 1
7.5.2 Check for Understanding: SQL Injection Overview 2
7.5.3 Connection: Equifax Security Breach 1
7.5.4 Connection: Equifax Exposed Millions 1
7.5.5 Free Response: Equifax SQL Injection Attack 5
7.5.6 Example: SQLi 1
7.6 Types of SQLi and Prevention
7.6.1 Video: Types of SQLi 1
7.6.2 Check for Understanding: Types of SQLi 3
7.6.3 Video: Preventing SQLi 1
7.6.4 Check for Understanding: Preventing SQLi 2
7.6.5 Connection: Mitigating SQL Injection 1
7.6.6 Free Response: Reflection: Mitigating SQL Injection 5
7.6.7 Connection: SQL Injection 1
7.7 Software Security Quiz
7.7.1 Unit Quiz: Software Security Quiz 15
Project: Security Assessment Report (SQLi)
8.1 Project: Security Assessment Report
8.1.1 Notes: Project Requirements 1
8.1.2 Connection: Supercar Showdown Website 1
8.1.3 Free Response: SQL Injection Testing 5
8.1.4 Resource: SQLi Testing Handout 1
8.1.5 Free Response: Security Assessment Report 15
8.1.6 Free Response: Project Reflection 5
Networking Fundamentals
9.1 Introduction to the Internet
9.1.1 Video: Welcome to the Internet 1
9.1.2 Check for Understanding: Intro to the Internet 3
9.1.3 Connection: Inside Facebook's Connectivity Lab 1
9.1.4 Free Response: Connectivity Lab Reflection 5
9.2 Notational Systems
9.2.1 Video: Number Systems 1
9.2.2 Check for Understanding: Number Systems Quiz 2
9.2.3 Notes: Number Base Tool 1
9.2.4 Video: Decimal to Binary 1
9.2.5 Check for Understanding: Decimal to Binary Quiz 3
9.2.6 Exercise: Binary Game 5
9.3 Data Representation
9.3.1 Video: Hexadecimal 1
9.3.2 Check for Understanding: Hexadecimal Quiz 2
9.3.3 Exercise: Binary to Hex Game 5
9.3.4 Video: Encoding Text with Binary 1
9.3.5 Check for Understanding: Encoding Text with Binary Quiz 2
9.3.6 Example: Custom Encoding 1
9.3.7 Example: Bits to ASCII 1
9.3.8 Exercise: Hello World in Bits 5
9.4 Internet Hardware and Sending Information
9.4.1 Video: Internet Hardware 1
9.4.2 Check for Understanding: Internet Hardware 2
9.4.3 Video: Sending Information 1
9.4.4 Check for Understanding: Sending Information 3
9.4.5 Connection: The Internet is in the Ocean 1
9.4.6 Free Response: Internet in the Ocean Reflection 5
9.5 Internet Addresses
9.5.1 Video: Internet Addresses 1
9.5.2 Check for Understanding: Internet Addresses 2
9.5.3 Free Response: The Need for Addresses 5
9.5.4 Connection: IPv4 vs. IPv6 1
9.5.5 Free Response: Reflection: IPv4 vs IPv6 5
9.6 Domain Name System (DNS)
9.6.1 Video: Domain Name System (DNS) 1
9.6.2 Check for Understanding: Domain Name System 2
9.6.3 Connection: How Does DNS Work? 1
9.6.4 Free Response: How Does DNS Work? 5
9.7 Routing
9.7.1 Video: Routing 1
9.7.2 Check for Understanding: Routing 3
9.7.3 Free Response: Redundancy 5
9.8 Packets & Protocols
9.8.1 Video: Packets 1
9.8.2 Check for Understanding: Packets 2
9.8.3 Video: Protocols 1
9.8.4 Check for Understanding: Protocols 3
9.8.5 Connection: How the Internet Works 1
9.8.6 Free Response: The Journey of an Image 5
9.9 Protocols and Standards
9.9.1 Video: Protocols 1
9.9.2 Check for Understanding: Protocols Quiz 3
9.9.3 Video: Standards 1
9.9.4 Check for Understanding: Standards Quiz 2
9.9.5 Connection: The New Wireless Standard 1
9.9.6 Connection: 801.11ax 1
9.9.7 Free Response: 801.11ax FR 5
9.10 Viewing a Webpage
9.10.1 Video: Viewing a Webpage 1
9.10.2 Check for Understanding: Viewing a Webpage 2
9.10.3 Free Response: Explaining a URL 5
9.10.4 Connection: Net Neutrality Explained 1
9.10.5 Connection: FCCs Net Neutrality Rules Officially Repealed 1
9.10.6 Free Response: Take a Side on Net Neutrality 5
9.10.7 Connection: Net Neutrality and Cybersecurity 1
9.10.8 Free Response: Net Neutrality and Cybersecurity Research 5
9.11 Access Control
9.11.1 Video: Access Control 1
9.11.2 Check for Understanding: Access Control 4
9.11.3 Example: Multifactor Authentication 1
9.11.4 Example: Two Factor Authentication 1
9.11.5 Free Response: Two Factor Authentication Reflection 5
9.11.6 Connection: RADIUS Overview with AAA Protocol 1
9.11.7 Connection: RADIUS Server Access Control 1
9.11.8 Free Response: RADIUS Reflection 5
9.12 Impact of the Internet
9.12.1 Video: Impact of the Internet 1
9.12.2 Check for Understanding: Impact of the Internet 3
9.12.3 Connection: What is the Digital Divide? 1
9.12.4 Free Response: What is the Digital Divide? 5
9.13 Networking Fundamentals Quiz
9.13.1 Survey: Mindsets 1
9.13.2 Unit Quiz: Networking Fundamentals Quiz 15
IT Infrastructure
10.1 Internal Components
10.1.1 Video: Internal Components 1
10.1.2 Check for Understanding: Internal Components 5
10.1.3 Connection: Build a Computer 1
10.1.4 Free Response: Build a Computer 5
10.1.5 Example: Test Your Brain's RAM! 1
10.1.6 Free Response: Test Your Brain's RAM! Reflection 5
10.2 Peripheral Devices
10.2.1 Video: Peripheral Devices 1
10.2.2 Check for Understanding: Peripheral Devices 5
10.2.3 Free Response: Personalized Peripherals 5
10.2.4 Free Response: IT Help 5
10.2.5 Free Response: Your Ideal Computer Setup 5
10.3 Network Devices
10.3.1 Video: Network Devices 1
10.3.2 Check for Understanding: Network Devices 5
10.3.3 Connection: Speed Test 1
10.3.4 Free Response: Speed Test 5
10.3.5 Connection: Fiber Optics Bend Light! 1
10.3.6 Free Response: Fiber Optics Bend Light! 5
10.3.7 Connection: Ethernet Standards 1
10.3.8 Free Response: Ethernet Standards 5
10.3.9 Free Response: Network Troubleshooting 5
10.4 Storage Options
10.4.1 Video: Storage Options 1
10.4.2 Check for Understanding: Storage Options Quiz 5
10.4.3 Connection: Security of Cloud Storage 1
10.4.4 Free Response: Security of Cloud Storage 5
10.4.5 Free Response: Storage Suggestions 5
10.5 Network Options
10.5.1 Video: Network Options 1
10.5.2 Check for Understanding: Network Options Quiz 5
10.5.3 Connection: What is an SSID? 1
10.5.4 Free Response: What is an SSID? 5
10.5.5 Connection: Wireless Threats 1
10.5.6 Free Response: Wireless Threats 5
10.5.7 Free Response: Wireless Network Setup 5
10.6 Network Communication
10.6.1 Video: Network Communication 1
10.6.2 Check for Understanding: Network Communication Quiz 2
10.6.3 Example: Setting up a Firewall 1
10.6.4 Free Response: iptables 5
10.6.5 Notes: iptables simulation 1
10.7 Network Management
10.7.1 Notes: Linux/MacOS vs. Windows 1
10.7.2 Video: Network Management 1
10.7.3 Check for Understanding: Network Management Quiz 3
10.7.4 Example: MacOS Terminal Simulation 1
10.7.5 Example: Windows Command Prompt Simulation 1
10.7.6 Video: Windows Command Prompt Spy 5
10.7.7 Free Response: Windows Command Prompt Spy 5
10.8 Private Networks
10.8.1 Video: IP and MAC Addresses 1
10.8.2 Check for Understanding: IP and MAC Addresses Quiz 2
10.8.3 Example: Intranet Permissions 1
10.8.4 Free Response: Coffee Shop: Design an Intranet 5
10.8.5 Video: DMZs and VPNs 1
10.8.6 Check for Understanding: DMZs and VPNs Quiz 3
10.8.7 Connection: Protecting Privacy with VPNs 1
10.8.8 Free Response: Protecting Privacy with VPNs 5
10.8.9 Free Response: Coffee Shop: Network Plan 5
10.8.10 Free Response: Coffee Shop: Network Diagram 5
10.8.11 Video: SOHO Network 1
10.8.12 Example: Network Topologies 1
10.9 IT Infrastructure Quiz
10.9.1 Unit Quiz: IT Infrastructure Quiz 20
Project: Troubleshooting
11.1 Methodology
11.1.1 Notes: Troubleshooting Methodology 1
11.1.2 Free Response: Identify the Problem 5
11.1.3 Free Response: Research Solutions 5
11.1.4 Free Response: Establish a Theory 5
11.1.5 Free Response: Test the Theory 5
11.1.6 Free Response: Fix the Problem! 5
11.2 Support Practice
11.2.1 Exercise: Signal Strength 10
11.2.2 Exercise: Interference 10
Project: IT Professional
12.1 Building a Resume
12.1.1 Connection: What is a Resume? 5
12.1.2 Free Response: What is a Resume? 5
12.1.3 Connection: Explore Resume Layouts 5
12.1.4 Free Response: Explore Resume Layouts 5
12.1.5 Free Response: Draft Your Resume 5
12.2 Communication is Key!
12.2.1 Notes: Do you have what it takes? 5
12.2.2 Free Response: Cybersecurity Careers 5
12.2.3 Free Response: Internships Exploration 5
12.2.4 Connection: Customer Service Skills 1
12.2.5 Free Response: Customer Service Skills 5
12.2.6 Free Response: Act it Out! 15
12.3 Building a Knowledge Base
12.3.1 Connection: What is a Knowledge Base? 1
12.3.2 Free Response: Draft a KB Article 5
12.3.3 Free Response: Share your KB Article 5
12.3.4 Free Response: Finalize your KB Article 15
12.4 Star in a Video!
12.4.1 Connection: Instructional Videos 1
12.4.2 Free Response: Instructional Video Plan 5
12.4.3 Free Response: Write the Script 5
12.4.4 Free Response: Create the Storyboard 5
12.4.5 Free Response: Record Your Video 5
Project: Digital Forensics
13.1 Digital Forensics
13.1.1 Video: Digital Forensics 1
13.1.2 Connection: Student Success Story 1
13.1.3 Free Response: Student Success Story Response 5
13.2 Forensic Case 1: Logs
13.2.1 Notes: Network Logs 1
13.2.2 Example: Network Log Evidence 1
13.2.3 Free Response: Network Logs Conclusion 5
13.3 Forensic Case 2: File Metadata
13.3.1 Notes: File Metadata 1
13.3.2 Example: File Metadata Evidence 1
13.3.3 Free Response: File Metadata Conclusion 5
13.4 Forensic Case 3: Exif Data
13.4.1 Notes: Photo Exif 1
13.4.2 Connection: Exif Using Inspector 1
13.4.3 Example: Exif Using the CLI 1
13.4.4 Free Response: Photo Exif Conclusion 5
Cyber Defense
14.1 Network Attacks
14.1.1 Video: Network Attacks Overview 1
14.1.2 Check for Understanding: Network Attacks Quiz 4
14.1.3 Notes: Check for Vulnerabilities 1
14.1.4 Connection: Bug Bounty Hunting 1
14.1.5 Free Response: Bug Bounty Hunting 5
14.1.6 Connection: Common Port Targets 1
14.1.7 Example: Port Scanner Simulation 1
14.1.8 Free Response: Open Port Reflection 5
14.2 Malware Types and Prevention
14.2.1 Video: Malware Types and Prevention 1
14.2.2 Check for Understanding: Malware Types and Prevention 5
14.2.3 Connection: How Anti-malware Works 1
14.2.4 Free Response: How Anti-malware Works 5
14.2.5 Free Response: OS Malware Security 5
14.2.6 Free Response: Reverse Engineering Malware 5
14.2.7 Connection: Cyberterrorism 1
14.2.8 Free Response: Cyberterrorism Response 5
14.3 Common Network Attacks
14.3.1 Video: Common Network Attacks 1
14.3.2 Check for Understanding: Network Attacks 3
14.3.3 Connection: Social Engineering Hack 1
14.3.4 Free Response: Social Engineering Reflection 5
14.3.5 Connection: DDoS Attacks 1
14.3.6 Example: DDoS Simulation 1
14.3.7 Free Response: DDoS Reflection 5
14.4 Additional Attacks
14.4.1 Video: Additional Attacks 1
14.4.2 Check for Understanding: Additional Attacks Quiz 5
14.4.3 Connection: Botnet Attacks - Mirai 1
14.4.4 Connection: Botnet Attacks - 3ve 1
14.4.5 Connection: Botnet Attacks - 3ve Video 1
14.4.6 Free Response: Botnet Attacks - Reflection 5
14.4.7 Connection: Zero-day Exploit: Stuxnet 5
14.4.8 Notes: Zero-day Exploit: Stuxnet 5
14.4.9 Free Response: Zero-day Exploit Reflection 5
14.4.10 Free Response: US-CERT Current Activity 5
14.5 Cross-site Scripting
14.5.1 Video: Cross-site Scripting 1
14.5.2 Check for Understanding: Cross-site Scripting 2
14.5.3 Connection: XSS Bug in Yahoo Mail 1
14.5.4 Free Response: XSS Bug in Yahoo Mail 5
14.5.5 Notes: XSS Demo Overview 1
14.5.6 Connection: Hacksplaining XSS Demo 1
14.5.7 Connection: Google's Tutorial for XSS 1
14.5.8 Free Response: XSS Reflection 5
14.6 Internal Threats
14.6.1 Video: Internal Threats 1
14.6.2 Check for Understanding: Internal Threats 5
14.6.3 Connection: BIOS/UEFI Attack Example 1
14.6.4 Notes: Accessing BIOS/UEFI 1
14.6.5 Connection: Causes of Data Breaches 5
14.6.6 Free Response: Causes of Data Breaches 5
14.6.7 Connection: Protecting Data at All Times 1
14.6.8 Free Response: Protecting Data at All Times 5
14.6.9 Connection: Air Gapped Computers 1
14.6.10 Free Response: Air Gapped Computers Response 5
14.7 Cyber Defense Quiz
14.7.1 Unit Quiz: Cyber Defense Quiz 20
Project: Put it in Writing!
15.1 Level 1: Entry Event
15.1.1 Free Response: Company Development 5
15.1.2 Free Response: Level 1: Attack! 5
15.1.3 Video: Level 1: Project Overview 1
15.1.4 Connection: Put It In Writing! Rubric 5
15.2 Level 2: User Training
15.2.1 Free Response: User Training Policy Development 5
15.2.2 Free Response: Challenge: Employee Negligence 1 5
15.2.3 Free Response: Challenge: Employee Negligence 2 5
15.2.4 Free Response: Level 2 Debrief 5
15.3 Level 3: Incident Response
15.3.1 Connection: Incident Response Plan Template 5
15.3.2 Free Response: Incident Response Plan Link 5
15.3.3 Free Response: Challenge: Cyber Attack! 5
15.3.4 Free Response: Level 3 Debrief 5
15.4 Level 4: Data and Licenses
15.4.1 Video: Data and Licenses 5
15.4.2 Connection: FTC Data Security Guide 5
15.4.3 Connection: Data Policy Template 5
15.4.4 Free Response: Data Policy Link 5
15.4.5 Free Response: Challenge: Data Breach 1 5
15.4.6 Free Response: Challenge: Data Breach 2 5
15.4.7 Free Response: Challenge: Data Breach 3 5
15.4.8 Free Response: Level 4 Debrief 5
15.5 Level 5: Change Management
15.5.1 Video: Change Management 5
15.5.2 Connection: Change Management Plan 5
15.5.3 Free Response: Change Management Plan Link 5
Risk Management
16.1 Identifying Risks
16.1.1 Video: Identifying Risks 1
16.1.2 Check for Understanding: Identifying Risks Quiz 5
16.1.3 Connection: What is a Honeypot? 1
16.1.4 Connection: Honeypot Attacks 1
16.1.5 Free Response: Honeypot Attacks 5
16.1.6 Connection: Whois 1
16.1.7 Free Response: Whois 5
16.1.8 Connection: Packet Sniffing 1
16.1.9 Free Response: Packet Sniffing Response 5
16.1.10 Free Response: Breach Trends 5
16.2 Assessing Risks
16.2.1 Notes: Assessing Risks 1
16.2.2 Free Response: Malware Risk Assessment 5
16.2.3 Free Response: Poor Password Assessment 5
16.2.4 Free Response: Social Engineering Assessment 5
16.2.5 Video: Assessing Risks 1
16.2.6 Check for Understanding: Assessing Risks Quiz 5
16.2.7 Connection: End-of-Life OS 1
16.2.8 Free Response: End-of-Life Proposal 5
16.2.9 Example: Input Handling 1
16.2.10 Free Response: Input Handling Responses 5
16.2.11 Example: Input Validation 1
16.2.12 Free Response: Input Validation Responses 5
16.3 Risk Response
16.3.1 Video: Risk Response 1
16.3.2 Check for Understanding: Risk Response 5
16.3.3 Free Response: Defense in Depth Risk Mitigation 5
16.3.4 Connection: Sample Risk Assessment Report 5
16.3.5 Free Response: Sample Risk Assessment Reflection 5
16.3.6 Connection: Delta Outage Video 5
16.3.7 Free Response: Delta Outage Reflection 5
16.3.8 Connection: What Happens When Your Servers Go Down 5
16.3.9 Free Response: What Happens When Your Servers Go Down Reflection 5
16.3.10 Free Response: Server Upgrade Memo 5
16.4 Penetration Testing
16.4.1 Video: Penetration Testing 1
16.4.2 Check for Understanding: Penetration Testing 5
16.4.3 Connection: Penetration Test Report 5
16.4.4 Free Response: Penetration Test Report 5
16.4.5 Notes: Chaos Engineering 5
16.4.6 Free Response: Chaos Engineering Reflection 5
16.4.7 Resource: Pen Test Simulation Handout 5
16.4.8 Exercise: Pen Test Simulation: Active Recon 5
16.4.9 Exercise: Pen Test Simulation: Exploit Vulnerabilities 5
16.5 Risk Management Quiz
16.5.1 Unit Quiz: Risk Management Quiz 20
Project: The Game of Risk
17.1 The Game of Risk
17.1.1 Notes: Group Project Intro 1
17.1.2 Free Response: Brainstorm: SLE 5
17.1.3 Free Response: Brainstorm: Materials 5
17.1.4 Free Response: Prototype Game and Instructions 5
17.1.5 Free Response: Test Your Game! 5
17.1.6 Resource: Testing Feedback Form 1
17.1.7 Free Response: Create Your Final Version! 20
Final Exam
18.1 Final Exam
18.1.1 Final: Final Exam 25
Introduction to Cybersecurity Pretest
19.1 Introduction to Cybersecurity Pretest
19.1.1 Notes: About the Pretest 1
19.1.2 Survey: Mindsets 1
19.1.3 Quiz: Introduction to Cybersecurity Knowledge & Skills 15
Introduction to Cybersecurity Posttest
20.1 Introduction to Cybersecurity Posttest
20.1.1 Notes: About the Posttest 1
20.1.2 Survey: Mindsets 1
20.1.3 Quiz: Introduction to Cybersecurity Knowledge & Skills 15
Programming Fundamentals
21.1 Programming Concepts
21.1.1 Video: Programming Concepts 1
21.1.2 Check for Understanding: Programming Concepts Quiz 5
21.1.3 Connection: Compilers vs. Interpreters 1
21.1.4 Free Response: Compilers vs. Interpreters 5
21.1.5 Example: Variables in Action 1
21.1.6 Example: Data Types using Typeof 1
21.1.7 Example: Basic Variables 1
21.1.8 Exercise: Daily Activities 5
21.2 Programming with Karel
21.2.1 Notes: Learning to Program 1
21.2.2 Video: Programming With Karel 1
21.2.3 Check for Understanding: Quiz: Karel Commands 1
21.2.4 Example: Our First Karel Program 1
21.2.5 Exercise: Your First Karel Program 5
21.2.6 Video: Functions in Karel 1
21.2.7 Check for Understanding: Functions in Karel Quiz 1
21.2.8 Example: Turn Around 1
21.2.9 Example: Digging Karel 1
21.2.10 Exercise: Backflip 5
21.3 Looping
21.3.1 Video: For Loops 1
21.3.2 Check for Understanding: For Loops Quiz 1
21.3.3 Example: Take 'em All 1
21.3.4 Example: For Loop Square 1
21.3.5 Exercise: Lots of Hurdles 5
21.3.6 Video: While Loops in Karel 1
21.3.7 Check for Understanding: While Loops in Karel Quiz 2
21.3.8 Example: Move to Wall 1
21.3.9 Example: Big Tower 1
21.3.10 Exercise: Follow The Yellow Ball Road 5
21.4 Branching
21.4.1 Video: If/Else Statements 1
21.4.2 Check for Understanding: If/Else Statements Quiz 2
21.4.3 Example: If/Else Statements 1
21.4.4 Example: One Ball in Each Spot 1
21.4.5 Exercise: Right Side Up 5
21.4.6 Badge: Programming with Karel Badge 5
21.5 Arrays and Objects
21.5.1 Notes: More JS Topics 1
21.5.2 Video: Arrays and Objects 1
21.5.3 Check for Understanding: Arrays and Objects 5
21.5.4 Example: Making an Array 1
21.5.5 Exercise: List of Places to Travel 5
21.5.6 Exercise: List of Prime Numbers 5
21.5.7 Example: Phonebook 1
21.5.8 Exercise: Sidekicks 5
21.6 Organizational Techniques
21.6.1 Video: Organizational Techniques 1
21.6.2 Check for Understanding: Organizational Techniques Quiz 4
21.6.3 Example: Hurdle Karel 1
21.6.4 Exercise: One Ball in Each Spot 5
21.6.5 Exercise: The Two Towers 5
21.6.6 Example: Interactive Sequence Diagram 1
21.7 Programming Fundamentals Quiz
21.7.1 Survey: Mindsets 1
21.7.2 Unit Quiz: Programming Fundamentals Quiz 15
Cryptocurrency
22.1 What is Currency?
22.1.1 Video: What is Currency? 1
22.1.2 Check for Understanding: What is Currency? 2
22.1.3 Connection: What Gives Paper Money Its Actual Value 1
22.1.4 Free Response: What Gives Money Its Value 5
22.1.5 Resource: Money: What is it Good For? 1
22.2 What is Cryptocurrency?
22.2.1 Video: Cryptocurrency Basics 1
22.2.2 Check for Understanding: Cryptocurrency Basics 5
22.2.3 Video: Cryptocurrency Module Overview 1
22.2.4 Connection: Cryptocurrencies Might Help Developing Countries 1
22.2.5 Free Response: Cryptocurrencies are Helping Developing Countries 5
22.2.6 Resource: Show Me the Money 1
22.2.7 Free Response: American Currency Exhibit 5
22.3 Intro to Blockchain
22.3.1 Video: Intro to Blockchain 1
22.3.2 Check for Understanding: Intro to Blockchain 3
22.3.3 Connection: CryptoKitties 1
22.3.4 Free Response: CryptoKitties 5
22.4 Hashing
22.4.1 Video: Hashing 1
22.4.2 Check for Understanding: Hashing 3
22.4.3 Connection: SHA256 Hash Generator 1
22.4.4 Free Response: Using the SHA256 Hash Generator 5
22.5 Proof of Work
22.5.1 Video: Proof of Work 1
22.5.2 Check for Understanding: Proof of Work 3
22.5.3 Video: Mining the Block 1
22.5.4 Check for Understanding: Mining the Block 3
22.5.5 Connection: PoW vs. Proof of Stake 1
22.5.6 Free Response: PoW vs. PoS 5
22.5.7 Resource: Checking Proof of Work 1
22.6 Advanced Blockchain
22.6.1 Video: Advanced Blockchain (part 1) 1
22.6.2 Check for Understanding: Advanced Blockchain (part 1) 3
22.6.3 Connection: Blockchain Buzz 1
22.6.4 Free Response: Blockchain Buzz 5
22.6.5 Video: Advanced Blockchain (part 2) 1
22.6.6 Free Response: Advanced Blockchain (part 2) 5
22.6.7 Resource: Make a Blockchain 1
22.6.8 Connection: SUPPLEMENTARY: How to TimeStamp a Document 1
22.7 Cryptocurrencies
22.7.1 Video: Cryptocurrencies 1
22.7.2 Check for Understanding: Cryptocurrencies 3
22.7.3 Free Response: Shiny Toy Phenomenon 5
22.7.4 Connection: Walmart Using Blockchain to Stop Spread of Disease 1
22.7.5 Free Response: Walmart Use of Blockchain 5
22.8 Bitcoin
22.8.1 Video: Bitcoin 1
22.8.2 Check for Understanding: Bitcoin 3
22.8.3 Connection: 51% Attack Explained 1
22.8.4 Free Response: 51% Attack 5
22.8.5 Connection: Why the Bitcoin Bubble will Burst in 2018 1
22.8.6 Free Response: Bitcoin Bust 5
22.8.7 Resource: Explore the Bitcoin Blockchain 1
22.9 Pros, Cons, and Future of Cryptocurrencies
22.9.1 Video: Pros, Cons, and Future of Cryptocurrencies 1
22.9.2 Check for Understanding: Pros, Cons and Future of Cryptocurrencies 3
22.9.3 Free Response: Pros, Cons and future of Cryptocurrencies 5
22.9.4 Connection: Cryptocurrency Pros and Cons 1
22.9.5 Free Response: Crypto Pros and Cons 5
22.9.6 Connection: What is HODL? 1
22.9.7 Free Response: What is HODL? 5
22.9.8 Free Response: Pros, Cons, and Future of Cryptocurrencies 5
22.10 Project: Cryptocurrency Expert Panel Talk
22.10.1 Free Response: Overview 5
22.10.2 Free Response: Preview Sample Expert Panels 5
22.10.3 Free Response: Investigate a Cryptocurrency Topic 5
22.10.4 Free Response: Write an Outline and Rehearse 5
22.10.5 Free Response: Expert Panel Talk (Presentation) 5
22.11 Cryptocurrency Quiz
22.11.1 Unit Quiz: Cryptocurrency Quiz 10
22.11.2 Badge: Cryptocurrency Badge 0
Final Course Project
23.1 Final Course Project
23.1.1 Notes: Choose Your Own Adventure 1
23.1.2 Free Response: Choose Your Adventure 5
23.1.3 Free Response: Research 5
23.1.4 Free Response: Choose Your Target Audience 5
23.1.5 Free Response: Draft Your Presentation 5
23.1.6 Free Response: Draft Your Flyer 5
23.1.7 Free Response: Make Your Presentation with Handout! 5
SQL Part II: The SQL
24.1 More Filtering Practice
24.1.1 Exercise: Initials 5
24.1.2 Exercise: Compound Queries with BETWEEN 5
24.1.3 Exercise: Gryffindors With G Names 5
24.1.4 Exercise: R First Names 5
24.1.5 Exercise: FF Houses 5
24.2 Ordering Results
24.2.1 Video: The ORDER BY Keyword 1
24.2.2 Notes: ORDER BY 1
24.2.3 Example: ORDER BY First Name 1
24.2.4 Example: Reverse Order 1
24.2.5 Example: Order By Multiple Fields 1
24.2.6 Exercise: House Ordering 5
24.2.7 Exercise: Sort the P Names 5
24.3 Renaming Fields
24.3.1 Notes: Renaming Fields with AS 1
24.3.2 Example: Renaming in the House Table 1
24.3.3 Exercise: Changing Column Names 5
24.4 Joining Tables
24.4.1 Video: The JOIN command 1
24.4.2 Notes: Basic Joining 1
24.4.3 Example: Letters and Numbers 1
24.4.4 Example: Person and House 1
24.4.5 Example: Person and House (Correct) 1
24.4.6 Example: Person and House (with namespacing) 1
24.4.7 Exercise: List All Gryffindors 5
24.4.8 Video: JOIN With Yourself 1
24.4.9 Notes: Renaming Tables 1
24.4.10 Example: Quidditch Matchups 1
24.4.11 Exercise: Quidditch Matchups: Ravenclaw Away Games 5
24.5 More Joining Tables
24.5.1 Example: The Course Table 1
24.5.2 Exercise: Courses and Professors 5
24.5.3 Exercise: Courses, Professors, and Houses 5
24.5.4 Exercise: Courses Taught By Gryffindors 5
24.5.5 Example: The Enrollment Table 1
24.5.6 Exercise: Students Taking Potions 5
24.5.7 Exercise: Non-Slytherins Taking Potions 5
24.5.8 Exercise: Defense Students by House 5
24.5.9 Exercise: Neville's Courses 5
Web Development
25.1 Introduction to HTML
25.1.1 Video: Introduction to HTML 1
25.1.2 Check for Understanding: Introduction to HTML Quiz 1
25.1.3 Example: Our First HTML Page 1
25.1.4 Exercise: Say Hello! 5
25.2 Structure of an HTML Page
25.2.1 Video: Structure of an HTML Page 1
25.2.2 Check for Understanding: Structure of an HTML Page Quiz 1
25.2.3 Example: HTML Template 1
25.2.4 Example: Hello World Page 1
25.2.5 Exercise: The <title> Tag 5
25.2.6 Exercise: Your First HTML Page 5
25.2.7 Badge: Structure Badge 1
25.3 Formatting Text
25.3.1 Video: Formatting Text 1
25.3.2 Check for Understanding: Formatting Text Quiz 1
25.3.3 Example: Dictionary 1
25.3.4 Exercise: That's Bold 5
25.3.5 Exercise: Artificial Intelligence 5
25.3.6 Exercise: State Capitals 5
25.4 Links
25.4.1 Video: Links 1
25.4.2 Check for Understanding: Links Quiz 1
25.4.3 Example: The <a> Tag 1
25.4.4 Exercise: Simple Link 5
25.4.5 Exercise: My Favorite Websites 5
25.5 Images
25.5.1 Video: Images 1
25.5.2 Check for Understanding: Images Quiz 1
25.5.3 Example: The <img> Tag 1
25.5.4 Example: Building the CodeHS Homepage 1
25.5.5 Exercise: Collage on a Theme 5
25.5.6 Exercise: Linking an Image 5
25.5.7 Exercise: Personal Library 5
25.5.8 Badge: Images Badge 1
25.6 HTML Lists
25.6.1 Video: HTML Lists 1
25.6.2 Check for Understanding: HTML Lists Quiz 1
25.6.3 Example: Grocery Shopping 1
25.6.4 Exercise: Favorite Things 5
25.6.5 Exercise: To-Do List 5
25.6.6 Exercise: List Article 5
25.7 HTML Tables
25.7.1 Video: HTML Tables 1
25.7.2 Check for Understanding: HTML Tables Quiz 3
25.7.3 Example: Address Book 1
25.7.4 Exercise: Favorite Songs 5
25.7.5 Exercise: Calendar 5
25.8 HTML Styling
25.8.1 Video: HTML Styling 1
25.8.2 Check for Understanding: HTML Styling Quiz 1
25.8.3 Example: Stylish Address Book 1
25.8.4 Exercise: Background Colors 5
25.8.5 Exercise: Style Your To-Do List 5
25.9 Introduction to CSS
25.9.1 Video: Introduction to CSS 1
25.9.2 Check for Understanding: Introduction to CSS Quiz 2
25.9.3 Example: Styling Your H1s 1
25.9.4 Exercise: First Style with CSS 5
25.9.5 Exercise: List Styling 5
25.10 CSS Select by Tag
25.10.1 Video: CSS Select by Tag 1
25.10.2 Check for Understanding: CSS Select by Tag Quiz 1
25.10.3 Example: Rainbow 1
25.10.4 Example: Dog Styling 1
25.10.5 Exercise: Restaurant Menu 5
25.10.6 Exercise: Put Karel Together 5
25.11 CSS Select by Class
25.11.1 Video: CSS Select by Class 1
25.11.2 Check for Understanding: CSS Select by Class Quiz 1
25.11.3 Example: Simple Checkerboard 1
25.11.4 Exercise: Tic Tac Toe 5
25.11.5 Exercise: Music Library 5
25.12 CSS Select by ID
25.12.1 Video: CSS Select by ID 1
25.12.2 Check for Understanding: CSS Select by ID Quiz 1
25.12.3 Example: Logo 1
25.12.4 Exercise: Favorite Dog 5
25.12.5 Exercise: Bingo 5
25.12.6 Badge: CSS Badge 1
25.13 Viewing Websites
25.13.1 Video: Viewing Websites 1
25.13.2 Check for Understanding: Viewing Websites Quiz 5
25.13.3 Free Response: Explaining a URL 5
25.14 Web Development Quiz
25.14.1 Unit Quiz: Web Development Quiz 15
25.15 Your First Website
25.15.1 Challenge: Set Up Your codehs.me Website 10
25.15.2 Challenge: Practice PT: Your First Website 10
25.15.3 Badge: Website Badge 1
Midterm
26.1 Midterm
26.1.1 Midterm: Midterm 15
Extra
27.1 Lesson 1
27.1.1 Example: Compound Queries 5
Embedded Correlations
28.1 Embedded Correlations
28.1.1 Article: Embedded Correlations 5