Activity | Points |
---|---|
Digital Citizenship and Cyber Hygiene | |
1.1 Welcome to Introduction to Hardware Technology | |
1.1.1 Course Introduction | 5 |
1.1.2 Course Goals | 5 |
1.2 Digital Footprint and Reputation | |
1.2.1 Digital Footprint and Reputation | 1 |
1.2.2 Digital Footprint and Reputation | 5 |
1.2.3 Building a Positive Digital Footprint | 5 |
1.2.4 Right to be Forgotten? | 1 |
1.2.5 Right to be Forgotten | 5 |
1.2.6 What is your Digital Footprint? | 5 |
1.3 Privacy & Security | |
1.3.1 What is Data Privacy & Security? | 1 |
1.3.2 Privacy & Security Quiz | 5 |
1.3.3 How Strong is your Password? | 1 |
1.3.4 How Strong is your password? | 5 |
1.3.5 Guess: Password List | 1 |
1.3.6 Guess: Using an Algorithm | 1 |
1.3.7 Guess: Brute Force | 1 |
1.3.8 Google Privacy Policy Search | 1 |
1.3.9 Google Privacy Policy Search | 5 |
1.3.10 Is Your Head in the Cloud? | 5 |
1.3.11 You Can Be Tracked! | 1 |
1.4 Creative Credit & Copyright | |
1.4.1 Creative Credit and Copyright | 1 |
1.4.2 Creative Credit and Copyright | 5 |
1.4.3 Cite! | 5 |
1.4.4 Exploring Creative Commons | 1 |
1.4.5 Respond: Creative Commons | 5 |
1.4.6 Finding Images | 5 |
1.4.7 Reflection: Why is Copyright Important? | 5 |
1.4.8 Consequences | 5 |
1.5 Hacking Ethics | |
1.5.1 Hacking Ethics & Legality | 1 |
1.5.2 Hacking Ethics & Legality | 5 |
1.5.3 Penetration Testing | 1 |
1.5.4 Reflection: Penetration Testing | 5 |
1.5.5 Hack the Pentagon? | 1 |
1.5.6 Reflection: Hack the Pentagon | 5 |
1.5.7 Ethical Hacker Agreement | 1 |
1.6 Common Security Problems | |
1.6.1 Common Security Problems | 1 |
1.6.2 Common Security Problems | 5 |
1.6.3 Meet Security Engineers at Google | 1 |
1.6.4 Security Engineering Reflection | 5 |
1.6.5 Living in a Digital World | 1 |
1.6.6 Living in a Digital World | 5 |
1.7 Always Connected | |
1.7.1 Pre-Lesson Reflection | 5 |
1.7.2 Time to Do Some Research | 5 |
1.7.3 Internet Addiction Pt 1 | 5 |
1.7.4 Internet Addiction Pt 2 | 5 |
1.7.5 Cell Phone Addiction | 5 |
1.7.6 Video Game Addiction | 5 |
1.7.7 Present Your Findings | 5 |
Operating Systems and Software | |
2.1 Software vs. Hardware | |
2.1.1 Software | 1 |
2.1.2 Software Quiz | 2 |
2.1.3 Software Explained | 1 |
2.1.4 Hardware Review | 4 |
2.1.5 Hardware vs. Software | 5 |
2.1.6 What Do You Suggest? | 5 |
2.2 Operating Systems | |
2.2.1 Operating Systems | 1 |
2.2.2 Operating Systems Quiz | 5 |
2.2.3 Detect My OS | 1 |
2.2.4 Upgrading a Mac OS | 1 |
2.2.5 Windows OS Installation Simulation | 1 |
2.2.6 Installing an OS | 5 |
2.3 Comparing Operating Systems | |
2.3.1 Comparing Operating Systems | 1 |
2.3.2 Comparing Operating Systems Quiz | 5 |
2.3.3 Windows Simulation | 1 |
2.3.4 MacOS Simulation | 1 |
2.3.5 Choose a Linux Distro! | 1 |
2.3.6 Which would you choose? | 5 |
2.4 File and Folder Management | |
2.4.1 File Management, Pt 1 | 5 |
2.4.2 File Management, Pt 2 | 5 |
2.4.3 Organize These Files! | 5 |
2.4.4 Back Up These Files! | 5 |
2.5 Compatibility | |
2.5.1 Compatibility | 1 |
2.5.2 Compatibility Quiz | 5 |
2.5.3 What Processor? Windows | 1 |
2.5.4 What Processor? Mac | 1 |
2.5.5 What Processor are you running? | 5 |
2.5.6 Compatibility Testing | 5 |
2.5.7 Compatibility Reflection | 5 |
2.6 Software and Applications | |
2.6.1 Software and Applications | 1 |
2.6.2 Software and Applications Quiz | 5 |
2.6.3 Spreadsheet Simulation | 1 |
2.6.4 Messaging Simulation | 1 |
2.6.5 Kanban Board Simulation | 1 |
2.6.6 Software Simulations | 5 |
2.7 Software Licenses | |
2.7.1 Software Licenses | 1 |
2.7.2 Software Licenses Quiz | 5 |
2.7.3 Do I need a Software License? | 5 |
2.7.4 Is This Original? | 5 |
2.8 Software Development | |
2.8.1 Development Life Cycle | 1 |
2.8.2 Development Life Cycle | 3 |
2.8.3 Scrum Framework | 1 |
2.8.4 SCRUM Response | 5 |
2.8.5 Using Flowcharts | 5 |
2.8.6 Project: Mapping an App | 5 |
2.9 What is Artificial Intelligence? | |
2.9.1 What is Artificial Intelligence? | 5 |
2.9.2 What is Artificial Intelligence? | 5 |
2.9.3 A Day in the Life of AI | 5 |
2.9.4 A Day in the Life of AI | 5 |
2.9.5 Guess the Drawing | 5 |
2.9.6 Drawing with AI | 5 |
2.9.7 Drawing with AI | 5 |
2.10 The Ethics of Artificial Intelligence | |
2.10.1 The Ethics of Artificial Intelligence | 5 |
2.10.2 The Ethics of Artificial Intelligence | 5 |
2.10.3 Bias in Facial Recognition Software | 5 |
2.10.4 Bias in Facial Recognition Software | 5 |
2.10.5 Testing a Biased Dataset | 5 |
2.10.6 Debating the Ethics of Self Driving Cars | 5 |
Hardware | |
3.1 Internal Components | |
3.1.1 Internal Components | 1 |
3.1.2 Internal Components | 5 |
3.1.3 Build a Computer | 1 |
3.1.4 Build a Computer | 5 |
3.1.5 Test Your Brain's RAM! | 1 |
3.1.6 Test Your Brain's RAM! | 5 |
3.1.7 The Machine Instruction Cycle | 5 |
3.1.8 Computer Crashes | 5 |
3.1.9 Computer Crashes Reflection | 5 |
3.2 Storage Options | |
3.2.1 Storage Options | 1 |
3.2.2 Storage Options Quiz | 5 |
3.2.3 Security of Cloud Storage | 1 |
3.2.4 Security of Cloud Storage | 5 |
3.2.5 Storage Suggestions | 5 |
3.3 Lab: Computer Disassembly | |
3.3.1 Lab: Computer Disassembly | 5 |
3.3.2 Video: Disassemble a Computer | 1 |
3.3.3 Article: Disassemble a Computer | 5 |
3.4 Peripheral Devices | |
3.4.1 Peripheral Devices | 1 |
3.4.2 Peripheral Devices | 5 |
3.4.3 Personalized Peripherals | 5 |
3.4.4 IT Help | 5 |
3.4.5 Your Ideal Computer Setup | 5 |
3.5 Network Devices | |
3.5.1 Network Devices | 1 |
3.5.2 Network Devices | 5 |
3.5.3 Speed Test | 1 |
3.5.4 Speed Test | 5 |
3.5.5 Fiber Optics Bend Light! | 1 |
3.5.6 Fiber Optics Bend Light! | 5 |
3.5.7 Ethernet Standards | 1 |
3.5.8 Ethernet Standards | 5 |
3.5.9 Copper vs. Fiber Optic | 1 |
3.5.10 Copper vs. Fiber Optic | 5 |
3.5.11 Network Troubleshooting | 5 |
3.5.12 Troubleshooting Cable Issues | 1 |
3.5.13 Troubleshooting Cable Issues | 5 |
3.6 Laptops and Tablets | |
3.6.1 Form Factor | 5 |
3.6.2 Laptop vs. Tablet | 1 |
3.6.3 Laptop vs. Tablet | 5 |
3.6.4 Which is best? | 1 |
3.6.5 Product Chart | 5 |
3.6.6 Device Comparison | 5 |
3.7 Mobile Devices | |
3.7.1 Mobile Devices | 1 |
3.7.2 Mobile Devices Quiz | 5 |
3.7.3 How Apple FaceID Works | 1 |
3.7.4 How Apple FaceID Works Response | 5 |
3.7.5 Biometric Data Debate | 5 |
3.7.6 BYOD and MDM Concept Map | 1 |
3.7.7 BYOD and MDM Conclusions | 5 |
3.8 Lab: Mobile Device Connectivity | |
3.8.1 Mobile Device Features | 1 |
3.8.2 Mobile Device Simulator | 1 |
3.8.3 Lab: Mobile Device Connectivity | 5 |
3.9 The Internet of Things | |
3.9.1 Internet of Things | 1 |
3.9.2 IoT Deep Dive | 5 |
3.9.3 Smart Devices in Your Life | 5 |
3.9.4 IoT Reflection | 5 |
Project: Troubleshooting | |
4.1 Methodology | |
4.1.1 Troubleshooting Methodology | 1 |
4.1.2 Identify the Problem | 5 |
4.1.3 Research Solutions | 5 |
4.1.4 Establish a Theory | 5 |
4.1.5 Test the Theory | 5 |
4.1.6 Fix the Problem! | 5 |
4.1.7 Diagnostic Tools | 5 |
4.2 Support Practice | |
4.2.1 Signal Strength | 10 |
4.2.2 Interference | 10 |
Networking | |
5.1 Introduction to the Internet | |
5.1.1 Welcome to the Internet | 1 |
5.1.2 Intro to the Internet | 5 |
5.1.3 Inside Facebook's Connectivity Lab | 1 |
5.1.4 Connectivity Lab Reflection | 5 |
5.2 Impact of the Internet | |
5.2.1 Impact of the Internet | 1 |
5.2.2 Impact of the Internet | 5 |
5.2.3 What is the Digital Divide? | 1 |
5.2.4 What is the Digital Divide? | 5 |
5.3 Internet Hardware and Sending Information | |
5.3.1 Internet Hardware | 1 |
5.3.2 Internet Hardware | 2 |
5.3.3 Sending Information | 1 |
5.3.4 Sending Information | 3 |
5.3.5 The Internet is in the Ocean | 1 |
5.3.6 Internet in the Ocean Reflection | 5 |
5.4 Internet Addresses | |
5.4.1 Internet Addresses | 1 |
5.4.2 Internet Addresses | 5 |
5.4.3 The Need for Addresses | 5 |
5.4.4 IPv4 vs. IPv6 | 1 |
5.4.5 Reflection: IPv4 vs IPv6 | 5 |
5.5 Domain Name System (DNS) | |
5.5.1 Domain Name System (DNS) | 1 |
5.5.2 Domain Name System | 5 |
5.5.3 How Does DNS Work? | 1 |
5.5.4 How Does DNS Work? | 5 |
5.6 Routing | |
5.6.1 Routing | 1 |
5.6.2 Routing | 5 |
5.6.3 Route Tracing | 1 |
5.6.4 Redundancy | 5 |
5.7 Packets & Protocols | |
5.7.1 Packets | 1 |
5.7.2 Packets | 2 |
5.7.3 Protocols | 1 |
5.7.4 Protocols | 3 |
5.7.5 How the Internet Works | 1 |
5.7.6 The Journey of an Image | 5 |
5.8 Protocols and Standards | |
5.8.1 Protocols | 1 |
5.8.2 Protocols Quiz | 3 |
5.8.3 Standards | 1 |
5.8.4 Standards Quiz | 2 |
5.8.5 The New Wireless Standard | 1 |
5.8.6 801.11ax | 1 |
5.8.7 Wavelength | 1 |
5.8.8 801.11ax FR | 5 |
5.9 Viewing a Webpage | |
5.9.1 Viewing a Webpage | 1 |
5.9.2 Viewing a Webpage | 5 |
5.9.3 Explaining a URL | 5 |
5.9.4 Net Neutrality Explained | 1 |
5.9.5 FCCs Net Neutrality Rules Officially Repealed | 1 |
5.9.6 Take a Side on Net Neutrality | 5 |
5.9.7 Net Neutrality and Cybersecurity | 1 |
5.9.8 Net Neutrality and Cybersecurity Research | 5 |
5.10 Network Options | |
5.10.1 Network Options | 1 |
5.10.2 Network Options Quiz | 5 |
5.10.3 What is an SSID? | 1 |
5.10.4 What is an SSID? | 5 |
5.10.5 Wireless Threats | 1 |
5.10.6 Wireless Threats | 5 |
5.10.7 Wireless Network Setup | 5 |
5.11 Network Administrator | |
5.11.1 Advanced Devices | 1 |
5.11.2 Advanced Devices Quiz | 5 |
5.11.3 Network Administrator Career | 1 |
5.11.4 Network Administrator Career | 5 |
5.11.5 Choosing the Best Devices | 5 |
5.11.6 Network Diagram | 5 |
5.12 Network Communication | |
5.12.1 Network Communication | 1 |
5.12.2 Network Communication Quiz | 5 |
5.12.3 Setting up a Firewall | 1 |
5.12.4 iptables | 5 |
5.12.5 iptables simulation | 1 |
5.13 Network Management | |
5.13.1 Linux/MacOS vs. Windows | 1 |
5.13.2 Network Management | 1 |
5.13.3 Network Management Quiz | 5 |
5.13.4 MacOS Terminal Simulation | 1 |
5.13.5 Windows Command Prompt Simulation | 1 |
5.13.6 Windows Command Prompt Spy | 5 |
5.13.7 Windows Command Prompt Spy | 5 |
5.13.8 SSH Logs | 1 |
5.13.9 SSH Logs | 1 |
5.13.10 Reading Logs | 5 |
5.14 Advanced Networking | |
5.14.1 The OSI Model and Network Attacks | 1 |
5.14.2 The OSI Model and Network Attacks Response | 5 |
5.14.3 Encapsulation | 1 |
5.14.4 What is Virtualization? | 1 |
5.14.5 Virtualization Response | 5 |
5.14.6 Baseband vs. Broadband | 5 |
5.14.7 Bit Rate vs. Baud Rate | 5 |
5.14.8 CSMA/CD vs. CSMA/CA | 1 |
IT Professionals | |
6.1 IT Helpdesk | |
6.1.1 The Many Jobs at the IT Helpdesk | 5 |
6.1.2 IT Helpdesk Scavenger Hunt | 5 |
6.1.3 Find an IT Job! | 5 |
6.2 Working with Customers | |
6.2.1 What is a CRM System? | 5 |
6.2.2 CRM System Reflection | 5 |
6.2.3 Customer Service Skills | 1 |
6.2.4 Customer Service Skills Reflection | 5 |
6.2.5 Act it Out! | 15 |
6.2.6 Log it in the CRM! | 5 |
6.3 Building a Knowledge Base | |
6.3.1 What is a Knowledge Base? | 1 |
6.3.2 Draft a KB Article | 5 |
6.3.3 Share your KB Article | 5 |
6.3.4 Finalize your KB Article | 15 |
6.4 Star in a Video! | |
6.4.1 Instructional Videos | 1 |
6.4.2 Example Tutorial | 1 |
6.4.3 Instructional Video Plan | 5 |
6.4.4 Write the Script | 5 |
6.4.5 Create the Storyboard | 5 |
6.4.6 Record Your Video | 5 |
6.5 Keeping a Database | |
6.5.1 Databases | 1 |
6.5.2 Databases | 1 |
6.5.3 Personally Identifiable Information (PII) | 5 |
6.5.4 FERPA | 5 |
6.5.5 What is SQL? | 5 |
6.5.6 How to Structure Data in SQL | 1 |
6.5.7 How to Structure Data in SQL | 3 |
6.5.8 SQL Table: Tiktok | 1 |
6.5.9 Customer List | 5 |
6.6 Compliance Laws | |
6.6.1 IT Compliance | 5 |
6.6.2 National Regulation Table | 5 |
6.6.3 Georgia State Regulations | 5 |
6.6.4 Compliance Reflection | 5 |
6.7 Asset Management | |
6.7.1 IT Asset Management | 5 |
6.7.2 What is ITAM? | 5 |
6.7.3 Diving Deeper into ITAM | 5 |
6.7.4 ITAM Presentation | 5 |
6.8 Emerging Technology and IT | |
6.8.1 What is Cloud Computing? | 5 |
6.8.2 Cloud Computing and IT | 5 |
6.8.3 Reflection: Cloud Computing | 5 |
6.9 Environmental Controls | |
6.9.1 Environmental Controls | 1 |
6.9.2 Environmental Controls Quiz | 5 |
6.9.3 Infographic | 1 |
6.9.4 Infographic FR | 5 |
6.9.5 Electrostatic Discharge | 1 |
6.9.6 Your Security Systems | 5 |
6.9.7 Security Design | 10 |
6.10 Personal Safety | |
6.10.1 Safety Precautions | 5 |
6.10.2 Electrical Hazards | 5 |
6.10.3 Fire Suppression | 1 |
6.10.4 Fire Suppression Response | 5 |
6.10.5 Emergency Response Plan | 5 |
Project: IT Proposal | |
7.1 IT Department Proposal | |
7.1.1 Project Introduction | 5 |
7.1.2 Find Your Companies | 5 |
7.1.3 Get to Know Your Companies | 5 |
7.1.4 Draft Your Pitch | 5 |
7.1.5 Create Your Presentation | 5 |
7.1.6 Next Steps | 5 |
Cybersecurity | |
8.1 What is Cybersecurity? | |
8.1.1 What is Cybersecurity? | 1 |
8.1.2 What is Cybersecurity? | 5 |
8.1.3 WannaCry Ransomware Attack | 1 |
8.1.4 WannaCry Reflection | 5 |
8.1.5 Ransomware Simulator | 1 |
8.1.6 Cybersecurity and Connected Cars | 1 |
8.1.7 Connectivity Reflection | 5 |
8.2 Impact of Cybersecurity | |
8.2.1 Impact of Cybersecurity | 1 |
8.2.2 Impact of Cybersecurity | 5 |
8.2.3 Phishing Simulator | 1 |
8.2.4 Yahoo! Attack | 1 |
8.2.5 Yahoo! Reflection | 5 |
8.2.6 Fighting Cyber Crime | 1 |
8.2.7 Cyber Crime Reflection | 5 |
8.2.8 FBI Cyber Crime | 1 |
8.2.9 FBI Reflection | 5 |
8.3 Network Attacks | |
8.3.1 Network Attacks Overview | 1 |
8.3.2 Network Attacks Quiz | 5 |
8.3.3 Check for Vulnerabilities | 1 |
8.3.4 Bug Bounty Hunting | 1 |
8.3.5 Bug Bounty Hunting | 5 |
8.3.6 Common Port Targets | 1 |
8.3.7 Port Scanner Simulation | 1 |
8.3.8 Open Port Reflection | 5 |
8.4 Malware Types and Prevention | |
8.4.1 Malware Types and Prevention | 1 |
8.4.2 Malware Types and Prevention | 5 |
8.4.3 How Anti-malware Works | 1 |
8.4.4 How Anti-malware Works | 5 |
8.4.5 OS Malware Security | 5 |
8.4.6 Reverse Engineering Malware | 5 |
8.5 Common Network Attacks | |
8.5.1 Common Network Attacks | 1 |
8.5.2 Network Attacks | 5 |
8.5.3 Social Engineering Hack | 1 |
8.5.4 Social Engineering Reflection | 5 |
8.5.5 DDoS Attacks | 1 |
8.5.6 DDoS Simulation | 1 |
8.5.7 DDoS Reflection | 5 |
8.6 Additional Attacks | |
8.6.1 Additional Attacks | 1 |
8.6.2 Additional Attacks Quiz | 5 |
8.6.3 Botnet Attacks - Mirai | 1 |
8.6.4 Botnet Attacks - 3ve | 1 |
8.6.5 Botnet Attacks - 3ve Video | 1 |
8.6.6 Botnet Attacks - Reflection | 5 |
8.6.7 Zero-day Exploit: Stuxnet | 5 |
8.6.8 Zero-day Exploit: Stuxnet | 5 |
8.6.9 Zero-day Exploit Reflection | 5 |
8.6.10 US-CERT Current Activity | 5 |
8.7 Internal Threats | |
8.7.1 Internal Threats | 1 |
8.7.2 Internal Threats | 5 |
8.7.3 BIOS/UEFI Attack Example | 1 |
8.7.4 Accessing BIOS/UEFI | 1 |
8.7.5 Causes of Data Breaches | 5 |
8.7.6 Causes of Data Breaches | 5 |
8.7.7 Protecting Data at All Times | 1 |
8.7.8 Protecting Data at All Times | 5 |
Project: Digital Forensics | |
9.1 Digital Forensics | |
9.1.1 Digital Forensics | 1 |
9.1.2 Student Success Story | 1 |
9.1.3 Student Success Story Response | 5 |
9.2 Forensic Case 1: Logs | |
9.2.1 Network Logs | 1 |
9.2.2 Network Log Evidence | 1 |
9.2.3 Network Logs Conclusion | 5 |
9.3 Forensic Case 2: File Metadata | |
9.3.1 File Metadata | 1 |
9.3.2 File Metadata Evidence | 1 |
9.3.3 File Metadata Conclusion | 5 |
9.4 Forensic Case 3: Exif Data | |
9.4.1 Photo Exif | 1 |
9.4.2 Exif Using Inspector | 1 |
9.4.3 Exif Using the CLI | 1 |
9.4.4 Photo Exif Conclusion | 5 |
Computer Science Careers | |
10.1 Computer Science Careers | |
10.1.1 Computer Science All Around Us | 1 |
10.1.2 Computer Science All Around Us | 5 |
10.1.3 Coding in the Wild | 1 |
10.1.4 Coding in the Wild Response | 5 |
10.1.5 Emerging Technologies and Careers | 5 |
10.1.6 The Impact of Emerging Technologies | 5 |
10.1.7 Career Research | 5 |
10.2 Create an Online Portfolio | |
10.2.1 Online Repositories | 5 |
10.2.2 What is a Resume? | 5 |
10.2.3 What is a Resume? | 5 |
10.2.4 Upload Relevant Documents | 5 |
10.3 Student Organizations | |
10.3.1 What Are They? | 5 |
10.3.2 Their Mission | 5 |
10.3.3 Career Development | 5 |
10.3.4 Additional Opportunities | 5 |
10.3.5 Lifelong Lessons | 5 |
Supplemental: Unit Quizzes | |
11.1 Note to Teacher | |
11.1.1 Note to Teacher | 5 |
11.2 IT Infrastructure Quiz | |
11.2.1 IT Infrastructure Quiz | 20 |
11.3 Networking Fundamentals Quiz | |
11.3.1 Mindsets | 1 |
11.3.2 Networking Fundamentals Quiz | 15 |
11.4 Cyber Defense Quiz | |
11.4.1 Cyber Defense Quiz | 20 |
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.
Teacher SignupSign up as a student if you are in a school and have a class code given to you by your teacher.
Student Signup