Please enable JavaScript to use CodeHS

Outline


1. Digital Citizenship and Cyber Hygiene
1.1 Welcome to Introduction to Hardware Technology
Notes 1.1.1 Course Introduction
Free Response 1.1.2 Course Goals
1.2 Digital Footprint and Reputation
Video 1.2.1 Digital Footprint and Reputation
Check for Understanding 1.2.2 Digital Footprint and Reputation
Free Response 1.2.3 Building a Positive Digital Footprint
Connection 1.2.4 Right to be Forgotten?
Free Response 1.2.5 Right to be Forgotten
Free Response 1.2.6 What is your Digital Footprint?
1.3 Privacy & Security
Video 1.3.1 What is Data Privacy & Security?
Check for Understanding 1.3.2 Privacy & Security Quiz
Connection 1.3.3 How Strong is your Password?
Free Response 1.3.4 How Strong is your password?
Example 1.3.5 Guess: Password List
Example 1.3.6 Guess: Using an Algorithm
Example 1.3.7 Guess: Brute Force
Connection 1.3.8 Google Privacy Policy Search
Free Response 1.3.9 Google Privacy Policy Search
Resource 1.3.10 Is Your Head in the Cloud?
Example 1.3.11 You Can Be Tracked!
1.4 Creative Credit & Copyright
Video 1.4.1 Creative Credit and Copyright
Check for Understanding 1.4.2 Creative Credit and Copyright
Free Response 1.4.3 Cite!
Connection 1.4.4 Exploring Creative Commons
Free Response 1.4.5 Respond: Creative Commons
Free Response 1.4.6 Finding Images
Free Response 1.4.7 Reflection: Why is Copyright Important?
Free Response 1.4.8 Consequences
1.5 Hacking Ethics
Video 1.5.1 Hacking Ethics & Legality
Check for Understanding 1.5.2 Hacking Ethics & Legality
Connection 1.5.3 Penetration Testing
Free Response 1.5.4 Reflection: Penetration Testing
Connection 1.5.5 Hack the Pentagon?
Free Response 1.5.6 Reflection: Hack the Pentagon
Check for Understanding 1.5.7 Ethical Hacker Agreement
1.6 Common Security Problems
Video 1.6.1 Common Security Problems
Check for Understanding 1.6.2 Common Security Problems
Connection 1.6.3 Meet Security Engineers at Google
Free Response 1.6.4 Security Engineering Reflection
Video 1.6.5 Living in a Digital World
Free Response 1.6.6 Living in a Digital World
1.7 Always Connected
Free Response 1.7.1 Pre-Lesson Reflection
Notes 1.7.2 Time to Do Some Research
Connection 1.7.3 Internet Addiction Pt 1
Connection 1.7.4 Internet Addiction Pt 2
Connection 1.7.5 Cell Phone Addiction
Connection 1.7.6 Video Game Addiction
Presentation 1.7.7 Present Your Findings
2. Operating Systems and Software
2.1 Software vs. Hardware
Video 2.1.1 Software
Check for Understanding 2.1.2 Software Quiz
Connection 2.1.3 Software Explained
Check for Understanding 2.1.4 Hardware Review
Free Response 2.1.5 Hardware vs. Software
Resource 2.1.6 What Do You Suggest?
2.2 Operating Systems
Video 2.2.1 Operating Systems
Check for Understanding 2.2.2 Operating Systems Quiz
Example 2.2.3 Detect My OS
Connection 2.2.4 Upgrading a Mac OS
Example 2.2.5 Windows OS Installation Simulation
Free Response 2.2.6 Installing an OS
2.3 Comparing Operating Systems
Video 2.3.1 Comparing Operating Systems
Check for Understanding 2.3.2 Comparing Operating Systems Quiz
Example 2.3.3 Windows Simulation
Example 2.3.4 MacOS Simulation
Connection 2.3.5 Choose a Linux Distro!
Free Response 2.3.6 Which would you choose?
2.4 File and Folder Management
Connection 2.4.1 File Management, Pt 1
Connection 2.4.2 File Management, Pt 2
Free Response 2.4.3 Organize These Files!
Presentation 2.4.4 Back Up These Files!
2.5 Compatibility
Video 2.5.1 Compatibility
Check for Understanding 2.5.2 Compatibility Quiz
Example 2.5.3 What Processor? Windows
Example 2.5.4 What Processor? Mac
Free Response 2.5.5 What Processor are you running?
Connection 2.5.6 Compatibility Testing
Free Response 2.5.7 Compatibility Reflection
2.6 Software and Applications
Video 2.6.1 Software and Applications
Check for Understanding 2.6.2 Software and Applications Quiz
Example 2.6.3 Spreadsheet Simulation
Example 2.6.4 Messaging Simulation
Example 2.6.5 Kanban Board Simulation
Free Response 2.6.6 Software Simulations
2.7 Software Licenses
Video 2.7.1 Software Licenses
Check for Understanding 2.7.2 Software Licenses Quiz
Free Response 2.7.3 Do I need a Software License?
Free Response 2.7.4 Is This Original?
2.8 Software Development
Video 2.8.1 Development Life Cycle
Check for Understanding 2.8.2 Development Life Cycle
Connection 2.8.3 Scrum Framework
Free Response 2.8.4 SCRUM Response
Connection 2.8.5 Using Flowcharts
Presentation 2.8.6 Project: Mapping an App
2.9 What is Artificial Intelligence?
Video 2.9.1 What is Artificial Intelligence?
Quiz 2.9.2 What is Artificial Intelligence?
Connection 2.9.3 A Day in the Life of AI
Free Response 2.9.4 A Day in the Life of AI
Connection 2.9.5 Guess the Drawing
Connection 2.9.6 Drawing with AI
Free Response 2.9.7 Drawing with AI
2.10 The Ethics of Artificial Intelligence
Video 2.10.1 The Ethics of Artificial Intelligence
Quiz 2.10.2 The Ethics of Artificial Intelligence
Connection 2.10.3 Bias in Facial Recognition Software
Free Response 2.10.4 Bias in Facial Recognition Software
Notes 2.10.5 Testing a Biased Dataset
Free Response 2.10.6 Debating the Ethics of Self Driving Cars
3. Hardware
3.1 Internal Components
Video 3.1.1 Internal Components
Check for Understanding 3.1.2 Internal Components
Connection 3.1.3 Build a Computer
Free Response 3.1.4 Build a Computer
Example 3.1.5 Test Your Brain's RAM!
Free Response 3.1.6 Test Your Brain's RAM! Reflection
Connection 3.1.7 The Machine Instruction Cycle
Connection 3.1.8 Computer Crashes
Free Response 3.1.9 Computer Crashes Reflection
3.2 Storage Options
Video 3.2.1 Storage Options
Check for Understanding 3.2.2 Storage Options Quiz
Connection 3.2.3 Security of Cloud Storage
Free Response 3.2.4 Security of Cloud Storage
Free Response 3.2.5 Storage Suggestions
3.3 Lab: Computer Disassembly
Resource 3.3.1 Lab: Computer Disassembly
Connection 3.3.2 Video: Disassemble a Computer
Connection 3.3.3 Article: Disassemble a Computer
3.4 Peripheral Devices
Video 3.4.1 Peripheral Devices
Check for Understanding 3.4.2 Peripheral Devices
Free Response 3.4.3 Personalized Peripherals
Free Response 3.4.4 IT Help
Free Response 3.4.5 Your Ideal Computer Setup
3.5 Network Devices
Video 3.5.1 Network Devices
Check for Understanding 3.5.2 Network Devices
Connection 3.5.3 Speed Test
Free Response 3.5.4 Speed Test
Connection 3.5.5 Fiber Optics Bend Light!
Free Response 3.5.6 Fiber Optics Bend Light!
Connection 3.5.7 Ethernet Standards
Free Response 3.5.8 Ethernet Standards
Connection 3.5.9 Copper vs. Fiber Optic
Free Response 3.5.10 Copper vs. Fiber Optic
Free Response 3.5.11 Network Troubleshooting
Connection 3.5.12 Troubleshooting Cable Issues
Free Response 3.5.13 Troubleshooting Cable Issues
3.6 Laptops and Tablets
Free Response 3.6.1 Form Factor
Connection 3.6.2 Laptop vs. Tablet
Free Response 3.6.3 Laptop vs. Tablet
Notes 3.6.4 Which is best?
Video 3.6.5 Product Chart
Free Response 3.6.6 Device Comparison
3.7 Mobile Devices
Video 3.7.1 Mobile Devices
Check for Understanding 3.7.2 Mobile Devices Quiz
Connection 3.7.3 How Apple FaceID Works
Free Response 3.7.4 How Apple FaceID Works Response
Free Response 3.7.5 Biometric Data Debate
Connection 3.7.6 BYOD and MDM Concept Map
Free Response 3.7.7 BYOD and MDM Conclusions
3.8 Lab: Mobile Device Connectivity
Connection 3.8.1 Mobile Device Features
Notes 3.8.2 Mobile Device Simulator
Resource 3.8.3 Lab: Mobile Device Connectivity
3.9 The Internet of Things
Connection 3.9.1 Internet of Things
Connection 3.9.2 IoT Deep Dive
Free Response 3.9.3 Smart Devices in Your Life
Free Response 3.9.4 IoT Reflection
4. Project: Troubleshooting
4.1 Methodology
Notes 4.1.1 Troubleshooting Methodology
Free Response 4.1.2 Identify the Problem
Free Response 4.1.3 Research Solutions
Free Response 4.1.4 Establish a Theory
Free Response 4.1.5 Test the Theory
Free Response 4.1.6 Fix the Problem!
Connection 4.1.7 Diagnostic Tools
4.2 Support Practice
Exercise 4.2.1 Signal Strength
Exercise 4.2.2 Interference
5. Networking
5.1 Introduction to the Internet
Video 5.1.1 Welcome to the Internet
Check for Understanding 5.1.2 Intro to the Internet
Connection 5.1.3 Inside Facebook's Connectivity Lab
Free Response 5.1.4 Connectivity Lab Reflection
5.2 Impact of the Internet
Video 5.2.1 Impact of the Internet
Check for Understanding 5.2.2 Impact of the Internet
Connection 5.2.3 What is the Digital Divide?
Free Response 5.2.4 What is the Digital Divide?
5.3 Internet Hardware and Sending Information
Video 5.3.1 Internet Hardware
Check for Understanding 5.3.2 Internet Hardware
Video 5.3.3 Sending Information
Check for Understanding 5.3.4 Sending Information
Connection 5.3.5 The Internet is in the Ocean
Free Response 5.3.6 Internet in the Ocean Reflection
5.4 Internet Addresses
Video 5.4.1 Internet Addresses
Check for Understanding 5.4.2 Internet Addresses
Free Response 5.4.3 The Need for Addresses
Connection 5.4.4 IPv4 vs. IPv6
Free Response 5.4.5 Reflection: IPv4 vs IPv6
5.5 Domain Name System (DNS)
Video 5.5.1 Domain Name System (DNS)
Check for Understanding 5.5.2 Domain Name System
Connection 5.5.3 How Does DNS Work?
Free Response 5.5.4 How Does DNS Work?
5.6 Routing
Video 5.6.1 Routing
Check for Understanding 5.6.2 Routing
Traceroute 5.6.3 Route Tracing
Free Response 5.6.4 Redundancy
5.7 Packets & Protocols
Video 5.7.1 Packets
Check for Understanding 5.7.2 Packets
Video 5.7.3 Protocols
Check for Understanding 5.7.4 Protocols
Connection 5.7.5 How the Internet Works
Free Response 5.7.6 The Journey of an Image
5.8 Protocols and Standards
Video 5.8.1 Protocols
Check for Understanding 5.8.2 Protocols Quiz
Video 5.8.3 Standards
Check for Understanding 5.8.4 Standards Quiz
Connection 5.8.5 The New Wireless Standard
Connection 5.8.6 801.11ax
Connection 5.8.7 Wavelength
Free Response 5.8.8 801.11ax FR
5.9 Viewing a Webpage
Video 5.9.1 Viewing a Webpage
Check for Understanding 5.9.2 Viewing a Webpage
Free Response 5.9.3 Explaining a URL
Connection 5.9.4 Net Neutrality Explained
Connection 5.9.5 FCCs Net Neutrality Rules Officially Repealed
Free Response 5.9.6 Take a Side on Net Neutrality
Connection 5.9.7 Net Neutrality and Cybersecurity
Free Response 5.9.8 Net Neutrality and Cybersecurity Research
5.10 Network Options
Video 5.10.1 Network Options
Check for Understanding 5.10.2 Network Options Quiz
Connection 5.10.3 What is an SSID?
Free Response 5.10.4 What is an SSID?
Connection 5.10.5 Wireless Threats
Free Response 5.10.6 Wireless Threats
Free Response 5.10.7 Wireless Network Setup
5.11 Network Administrator
Video 5.11.1 Advanced Devices
Check for Understanding 5.11.2 Advanced Devices Quiz
Connection 5.11.3 Network Administrator Career
Free Response 5.11.4 Network Administrator Career
Free Response 5.11.5 Choosing the Best Devices
Free Response 5.11.6 Network Diagram
5.12 Network Communication
Video 5.12.1 Network Communication
Check for Understanding 5.12.2 Network Communication Quiz
Example 5.12.3 Setting up a Firewall
Free Response 5.12.4 iptables
Notes 5.12.5 iptables simulation
5.13 Network Management
Notes 5.13.1 Linux/MacOS vs. Windows
Video 5.13.2 Network Management
Check for Understanding 5.13.3 Network Management Quiz
Example 5.13.4 MacOS Terminal Simulation
Example 5.13.5 Windows Command Prompt Simulation
Video 5.13.6 Windows Command Prompt Spy
Free Response 5.13.7 Windows Command Prompt Spy
Notes 5.13.8 SSH Logs
Example 5.13.9 SSH Logs
Free Response 5.13.10 Reading Logs
5.14 Advanced Networking
Connection 5.14.1 The OSI Model and Network Attacks
Free Response 5.14.2 The OSI Model and Network Attacks Response
Connection 5.14.3 Encapsulation
Connection 5.14.4 What is Virtualization?
Free Response 5.14.5 Virtualization Response
Free Response 5.14.6 Baseband vs. Broadband
Free Response 5.14.7 Bit Rate vs. Baud Rate
Resource 5.14.8 CSMA/CD vs. CSMA/CA
6. IT Professionals
6.1 IT Helpdesk
Connection 6.1.1 The Many Jobs at the IT Helpdesk
Free Response 6.1.2 IT Helpdesk Scavenger Hunt
Free Response 6.1.3 Find an IT Job!
6.2 Working with Customers
Connection 6.2.1 What is a CRM System?
Free Response 6.2.2 CRM System Reflection
Connection 6.2.3 Customer Service Skills
Free Response 6.2.4 Customer Service Skills Reflection
Free Response 6.2.5 Act it Out!
Free Response 6.2.6 Log it in the CRM!
6.3 Building a Knowledge Base
Connection 6.3.1 What is a Knowledge Base?
Free Response 6.3.2 Draft a KB Article
Free Response 6.3.3 Share your KB Article
Free Response 6.3.4 Finalize your KB Article
6.4 Star in a Video!
Connection 6.4.1 Instructional Videos
Connection 6.4.2 Example Tutorial
Free Response 6.4.3 Instructional Video Plan
Free Response 6.4.4 Write the Script
Free Response 6.4.5 Create the Storyboard
Free Response 6.4.6 Record Your Video
6.5 Keeping a Database
Video 6.5.1 Databases
Check for Understanding 6.5.2 Databases
Free Response 6.5.3 Personally Identifiable Information (PII)
Connection 6.5.4 FERPA
Notes 6.5.5 What is SQL?
Video 6.5.6 How to Structure Data in SQL
Check for Understanding 6.5.7 How to Structure Data in SQL
Example 6.5.8 SQL Table: Tiktok
Example 6.5.9 Customer List
6.6 Compliance Laws
Connection 6.6.1 IT Compliance
Connection 6.6.2 National Regulation Table
Free Response 6.6.3 Georgia State Regulations
Free Response 6.6.4 Compliance Reflection
6.7 Asset Management
Notes 6.7.1 IT Asset Management
Connection 6.7.2 What is ITAM?
Connection 6.7.3 Diving Deeper into ITAM
Presentation 6.7.4 ITAM Presentation
6.8 Emerging Technology and IT
Connection 6.8.1 What is Cloud Computing?
Connection 6.8.2 Cloud Computing and IT
Free Response 6.8.3 Reflection: Cloud Computing
6.9 Environmental Controls
Video 6.9.1 Environmental Controls
Check for Understanding 6.9.2 Environmental Controls Quiz
Connection 6.9.3 Infographic
Free Response 6.9.4 Infographic FR
Connection 6.9.5 Electrostatic Discharge
Free Response 6.9.6 Your Security Systems
Free Response 6.9.7 Security Design
6.10 Personal Safety
Free Response 6.10.1 Safety Precautions
Free Response 6.10.2 Electrical Hazards
Connection 6.10.3 Fire Suppression
Free Response 6.10.4 Fire Suppression Response
Connection 6.10.5 Emergency Response Plan
7. Project: IT Proposal
7.1 IT Department Proposal
Notes 7.1.1 Project Introduction
Free Response 7.1.2 Find Your Companies
Free Response 7.1.3 Get to Know Your Companies
Free Response 7.1.4 Draft Your Pitch
Presentation 7.1.5 Create Your Presentation
Free Response 7.1.6 Next Steps
8. Cybersecurity
8.1 What is Cybersecurity?
Video 8.1.1 What is Cybersecurity?
Check for Understanding 8.1.2 What is Cybersecurity?
Connection 8.1.3 City Services Ransomware
Free Response 8.1.4 Ransomware Reflection
Example 8.1.5 Ransomware Simulator
Connection 8.1.6 Hackers vs. Smart Homes
Free Response 8.1.7 Connectivity Reflection
8.2 Impact of Cybersecurity
Video 8.2.1 Impact of Cybersecurity
Check for Understanding 8.2.2 Impact of Cybersecurity
Example 8.2.3 Phishing Simulator
Connection 8.2.4 Phishing for Your Info
Free Response 8.2.5 Phishing Reflection
Connection 8.2.6 Cyber Game
Free Response 8.2.7 Cyber Game Reflection
Connection 8.2.8 Cyber Crime Time
Free Response 8.2.9 Cyber Crime Time Reflection
8.3 Network Attacks
Video 8.3.1 Network Attacks Overview
Check for Understanding 8.3.2 Network Attacks Quiz
Notes 8.3.3 Check for Vulnerabilities
Connection 8.3.4 Bug Bounty Hunting
Free Response 8.3.5 Bug Bounty Hunting
Connection 8.3.6 Common Port Targets
Example 8.3.7 Port Scanner Simulation
Free Response 8.3.8 Open Port Reflection
8.4 Malware Types and Prevention
Video 8.4.1 Malware Types and Prevention
Check for Understanding 8.4.2 Malware Types and Prevention
Connection 8.4.3 How Anti-malware Works
Free Response 8.4.4 How Anti-malware Works
Free Response 8.4.5 OS Malware Security
Free Response 8.4.6 Reverse Engineering Malware
8.5 Common Network Attacks
Video 8.5.1 Common Network Attacks
Check for Understanding 8.5.2 Network Attacks
Connection 8.5.3 Social Engineering Hack
Free Response 8.5.4 Social Engineering Reflection
Connection 8.5.5 DDoS Attacks
Example 8.5.6 DDoS Simulation
Free Response 8.5.7 DDoS Reflection
8.6 Additional Attacks
Video 8.6.1 Additional Attacks
Check for Understanding 8.6.2 Additional Attacks Quiz
Connection 8.6.3 Botnet Attacks - Mirai
Connection 8.6.4 Botnet Attacks - 3ve
Connection 8.6.5 Botnet Attacks - 3ve Video
Free Response 8.6.6 Botnet Attacks - Reflection
Connection 8.6.7 Zero-day Exploit: Stuxnet
Notes 8.6.8 Zero-day Exploit: Stuxnet
Free Response 8.6.9 Zero-day Exploit Reflection
Free Response 8.6.10 US-CERT Current Activity
8.7 Internal Threats
Video 8.7.1 Internal Threats
Check for Understanding 8.7.2 Internal Threats
Connection 8.7.3 BIOS/UEFI Attack Example
Notes 8.7.4 Accessing BIOS/UEFI
Connection 8.7.5 Causes of Data Breaches
Free Response 8.7.6 Causes of Data Breaches
Connection 8.7.7 Protecting Data at All Times
Free Response 8.7.8 Protecting Data at All Times
9. Project: Digital Forensics
9.1 Digital Forensics
Video 9.1.1 Digital Forensics
Connection 9.1.2 Student Success Story
Free Response 9.1.3 Student Success Story Response
9.2 Forensic Case 1: Logs
Notes 9.2.1 Network Logs
Example 9.2.2 Network Log Evidence
Free Response 9.2.3 Network Logs Conclusion
9.3 Forensic Case 2: File Metadata
Notes 9.3.1 File Metadata
Example 9.3.2 File Metadata Evidence
Free Response 9.3.3 File Metadata Conclusion
9.4 Forensic Case 3: Exif Data
Notes 9.4.1 Photo Exif
Connection 9.4.2 Exif Using Inspector
Example 9.4.3 Exif Using the CLI
Free Response 9.4.4 Photo Exif Conclusion
10. Computer Science Careers
10.1 Computer Science Careers
Video 10.1.1 Computer Science All Around Us
Quiz 10.1.2 Computer Science All Around Us
Connection 10.1.3 Coding in the Wild
Free Response 10.1.4 Coding in the Wild Response
Connection 10.1.5 Emerging Technologies and Careers
Free Response 10.1.6 The Impact of Emerging Technologies
Resource 10.1.7 Career Research
10.2 Create an Online Portfolio
Free Response 10.2.1 Online Repositories
Connection 10.2.2 What is a Resume?
Free Response 10.2.3 What is a Resume?
Notes 10.2.4 Upload Relevant Documents
10.3 Student Organizations
Notes 10.3.1 What Are They?
Free Response 10.3.2 Their Mission
Free Response 10.3.3 Career Development
Free Response 10.3.4 Additional Opportunities
Free Response 10.3.5 Lifelong Lessons