Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
Digital Citizenship and Cyber Hygiene
1.1 Welcome to Introduction to Hardware Technology Lesson
1.1.1 Course Introduction 5 Notes
1.1.2 Course Goals 5 Free Response
1.2 Digital Footprint and Reputation Lesson
1.2.1 Digital Footprint and Reputation 1 Video
1.2.2 Digital Footprint and Reputation 3 Check for Understanding
1.2.3 Building a Positive Digital Footprint 5 Free Response
1.2.4 Right to be Forgotten? 1 Connection
1.2.5 Right to be Forgotten 5 Free Response
1.2.6 What is your Digital Footprint? 5 Free Response
1.3 Privacy & Security Lesson
1.3.1 What is Data Privacy & Security? 1 Video
1.3.2 Privacy & Security Quiz 2 Check for Understanding
1.3.3 How Strong is your Password? 1 Connection
1.3.4 How Strong is your password? 5 Free Response
1.3.5 Guess: Password List 1 Example
1.3.6 Guess: Using an Algorithm 1 Example
1.3.7 Guess: Brute Force 1 Example
1.3.8 Google Privacy Policy Search 1 Connection
1.3.9 Google Privacy Policy Search 5 Free Response
1.3.10 Is Your Head in the Cloud? 5 Resource
1.3.11 You Can Be Tracked! 1 Example
1.4 Creative Credit & Copyright Lesson
1.4.1 Creative Credit and Copyright 1 Video
1.4.2 Creative Credit and Copyright 2 Check for Understanding
1.4.3 Cite! 5 Free Response
1.4.4 Exploring Creative Commons 1 Connection
1.4.5 Respond: Creative Commons 5 Free Response
1.4.6 Finding Images 5 Free Response
1.4.7 Reflection: Why is Copyright Important? 5 Free Response
1.4.8 Consequences 5 Free Response
1.5 Hacking Ethics Lesson
1.5.1 Hacking Ethics & Legality 1 Video
1.5.2 Hacking Ethics & Legality 3 Check for Understanding
1.5.3 Penetration Testing 1 Connection
1.5.4 Reflection: Penetration Testing 5 Free Response
1.5.5 Hack the Pentagon? 1 Connection
1.5.6 Reflection: Hack the Pentagon 5 Free Response
1.5.7 Ethical Hacker Agreement 1 Check for Understanding
1.6 Common Security Problems Lesson
1.6.1 Common Security Problems 1 Video
1.6.2 Common Security Problems 1 Check for Understanding
1.6.3 Meet Security Engineers at Google 1 Connection
1.6.4 Security Engineering Reflection 5 Free Response
1.6.5 Living in a Digital World 1 Video
1.6.6 Living in a Digital World 5 Free Response
1.7 Always Connected Lesson
1.7.1 Pre-Lesson Reflection 5 Free Response
1.7.2 Time to Do Some Research 5 Notes
1.7.3 Internet Addiction Pt 1 5 Connection
1.7.4 Internet Addiction Pt 2 5 Connection
1.7.5 Cell Phone Addiction 5 Connection
1.7.6 Video Game Addiction 5 Connection
1.7.7 Present Your Findings 5 Presentation
Operating Systems and Software
2.1 Software vs. Hardware Lesson
2.1.1 Software 1 Video
2.1.2 Software Quiz 2 Check for Understanding
2.1.3 Software Explained 1 Connection
2.1.4 Hardware Review 4 Check for Understanding
2.1.5 Hardware vs. Software 5 Free Response
2.1.6 What Do You Suggest? 5 Resource
2.2 Operating Systems Lesson
2.2.1 Operating Systems 1 Video
2.2.2 Operating Systems Quiz 5 Check for Understanding
2.2.3 Detect My OS 1 Example
2.2.4 Upgrading a Mac OS 1 Connection
2.2.5 Windows OS Installation Simulation 1 Example
2.2.6 Installing an OS 5 Free Response
2.3 Comparing Operating Systems Lesson
2.3.1 Comparing Operating Systems 1 Video
2.3.2 Comparing Operating Systems Quiz 5 Check for Understanding
2.3.3 Windows Simulation 1 Example
2.3.4 MacOS Simulation 1 Example
2.3.5 Choose a Linux Distro! 1 Connection
2.3.6 Which would you choose? 5 Free Response
2.4 File and Folder Management Lesson
2.4.1 File Management, Pt 1 5 Connection
2.4.2 File Management, Pt 2 5 Connection
2.4.3 Organize These Files! 5 Free Response
2.4.4 Back Up These Files! 5 Presentation
2.5 Compatibility Lesson
2.5.1 Compatibility 1 Video
2.5.2 Compatibility Quiz 3 Check for Understanding
2.5.3 What Processor? Windows 1 Example
2.5.4 What Processor? Mac 1 Example
2.5.5 What Processor are you running? 5 Free Response
2.5.6 Compatibility Testing 5 Connection
2.5.7 Compatibility Reflection 5 Free Response
2.6 Software and Applications Lesson
2.6.1 Software and Applications 1 Video
2.6.2 Software and Applications Quiz 2 Check for Understanding
2.6.3 Spreadsheet Simulation 1 Example
2.6.4 Messaging Simulation 1 Example
2.6.5 Kanban Board Simulation 1 Example
2.6.6 Software Simulations 5 Free Response
2.7 Software Licenses Lesson
2.7.1 Software Licenses 1 Video
2.7.2 Software Licenses Quiz 3 Check for Understanding
2.7.3 Do I need a Software License? 5 Free Response
2.7.4 Is This Original? 5 Free Response
2.8 Software Development Lesson
2.8.1 Development Life Cycle 1 Video
2.8.2 Development Life Cycle 3 Check for Understanding
2.8.3 Scrum Framework 1 Connection
2.8.4 SCRUM Response 5 Free Response
2.8.5 Using Flowcharts 5 Connection
2.8.6 Project: Mapping an App 5 Presentation
2.9 What is Artificial Intelligence? Lesson
2.9.1 What is Artificial Intelligence? 5 Video
2.9.2 What is Artificial Intelligence? 3 Quiz
2.9.3 A Day in the Life of AI 5 Connection
2.9.4 A Day in the Life of AI 5 Free Response
2.9.5 Guess the Drawing 5 Connection
2.9.6 Drawing with AI 5 Connection
2.9.7 Drawing with AI 5 Free Response
2.10 The Ethics of Artificial Intelligence Lesson
2.10.1 The Ethics of Artificial Intelligence 5 Video
2.10.2 The Ethics of Artificial Intelligence 3 Quiz
2.10.3 Bias in Facial Recognition Software 5 Connection
2.10.4 Bias in Facial Recognition Software 5 Free Response
2.10.5 Testing a Biased Dataset 5 Notes
2.10.6 Debating the Ethics of Self Driving Cars 5 Free Response
Hardware
3.1 Internal Components Lesson
3.1.1 Internal Components 1 Video
3.1.2 Internal Components 5 Check for Understanding
3.1.3 Build a Computer 1 Connection
3.1.4 Build a Computer 5 Free Response
3.1.5 Test Your Brain's RAM! 1 Example
3.1.6 Test Your Brain's RAM! Reflection 5 Free Response
3.1.7 The Machine Instruction Cycle 5 Connection
3.1.8 Computer Crashes 5 Connection
3.1.9 Computer Crashes Reflection 5 Free Response
3.2 Storage Options Lesson
3.2.1 Storage Options 1 Video
3.2.2 Storage Options Quiz 5 Check for Understanding
3.2.3 Security of Cloud Storage 1 Connection
3.2.4 Security of Cloud Storage 5 Free Response
3.2.5 Storage Suggestions 5 Free Response
3.3 Lab: Computer Disassembly Lesson
3.3.1 Lab: Computer Disassembly 5 Resource
3.3.2 Video: Disassemble a Computer 1 Connection
3.3.3 Article: Disassemble a Computer 5 Connection
3.4 Peripheral Devices Lesson
3.4.1 Peripheral Devices 1 Video
3.4.2 Peripheral Devices 5 Check for Understanding
3.4.3 Personalized Peripherals 5 Free Response
3.4.4 IT Help 5 Free Response
3.4.5 Your Ideal Computer Setup 5 Free Response
3.5 Network Devices Lesson
3.5.1 Network Devices 1 Video
3.5.2 Network Devices 5 Check for Understanding
3.5.3 Speed Test 1 Connection
3.5.4 Speed Test 5 Free Response
3.5.5 Fiber Optics Bend Light! 1 Connection
3.5.6 Fiber Optics Bend Light! 5 Free Response
3.5.7 Ethernet Standards 1 Connection
3.5.8 Ethernet Standards 5 Free Response
3.5.9 Copper vs. Fiber Optic 1 Connection
3.5.10 Copper vs. Fiber Optic 5 Free Response
3.5.11 Network Troubleshooting 5 Free Response
3.5.12 Troubleshooting Cable Issues 1 Connection
3.5.13 Troubleshooting Cable Issues 5 Free Response
3.6 Laptops and Tablets Lesson
3.6.1 Form Factor 5 Free Response
3.6.2 Laptop vs. Tablet 1 Connection
3.6.3 Laptop vs. Tablet 5 Free Response
3.6.4 Which is best? 1 Notes
3.6.5 Product Chart 5 Video
3.6.6 Device Comparison 5 Free Response
3.7 Mobile Devices Lesson
3.7.1 Mobile Devices 1 Video
3.7.2 Mobile Devices Quiz 5 Check for Understanding
3.7.3 How Apple FaceID Works 1 Connection
3.7.4 How Apple FaceID Works Response 5 Free Response
3.7.5 Biometric Data Debate 5 Free Response
3.7.6 BYOD and MDM Concept Map 1 Connection
3.7.7 BYOD and MDM Conclusions 5 Free Response
3.8 Lab: Mobile Device Connectivity Lesson
3.8.1 Mobile Device Features 1 Connection
3.8.2 Mobile Device Simulator 1 Notes
3.8.3 Lab: Mobile Device Connectivity 5 Resource
3.9 The Internet of Things Lesson
3.9.1 Internet of Things 1 Connection
3.9.2 IoT Deep Dive 5 Connection
3.9.3 Smart Devices in Your Life 5 Free Response
3.9.4 IoT Reflection 5 Free Response
Project: Troubleshooting
4.1 Methodology Lesson
4.1.1 Troubleshooting Methodology 1 Notes
4.1.2 Identify the Problem 5 Free Response
4.1.3 Research Solutions 5 Free Response
4.1.4 Establish a Theory 5 Free Response
4.1.5 Test the Theory 5 Free Response
4.1.6 Fix the Problem! 5 Free Response
4.1.7 Diagnostic Tools 5 Connection
4.2 Support Practice Lesson
4.2.1 Signal Strength 10 Exercise
4.2.2 Interference 10 Exercise
Networking
5.1 Introduction to the Internet Lesson
5.1.1 Welcome to the Internet 1 Video
5.1.2 Intro to the Internet 3 Check for Understanding
5.1.3 Inside Facebook's Connectivity Lab 1 Connection
5.1.4 Connectivity Lab Reflection 5 Free Response
5.2 Impact of the Internet Lesson
5.2.1 Impact of the Internet 1 Video
5.2.2 Impact of the Internet 3 Check for Understanding
5.2.3 What is the Digital Divide? 1 Connection
5.2.4 What is the Digital Divide? 5 Free Response
5.3 Internet Hardware and Sending Information Lesson
5.3.1 Internet Hardware 1 Video
5.3.2 Internet Hardware 2 Check for Understanding
5.3.3 Sending Information 1 Video
5.3.4 Sending Information 3 Check for Understanding
5.3.5 The Internet is in the Ocean 1 Connection
5.3.6 Internet in the Ocean Reflection 5 Free Response
5.4 Internet Addresses Lesson
5.4.1 Internet Addresses 1 Video
5.4.2 Internet Addresses 2 Check for Understanding
5.4.3 The Need for Addresses 5 Free Response
5.4.4 IPv4 vs. IPv6 1 Connection
5.4.5 Reflection: IPv4 vs IPv6 5 Free Response
5.5 Domain Name System (DNS) Lesson
5.5.1 Domain Name System (DNS) 1 Video
5.5.2 Domain Name System 2 Check for Understanding
5.5.3 How Does DNS Work? 1 Connection
5.5.4 How Does DNS Work? 5 Free Response
5.6 Routing Lesson
5.6.1 Routing 1 Video
5.6.2 Routing 3 Check for Understanding
5.6.3 Route Tracing 1 Traceroute
5.6.4 Redundancy 5 Free Response
5.7 Packets & Protocols Lesson
5.7.1 Packets 1 Video
5.7.2 Packets 2 Check for Understanding
5.7.3 Protocols 1 Video
5.7.4 Protocols 3 Check for Understanding
5.7.5 How the Internet Works 1 Connection
5.7.6 The Journey of an Image 5 Free Response
5.8 Protocols and Standards Lesson
5.8.1 Protocols 1 Video
5.8.2 Protocols Quiz 3 Check for Understanding
5.8.3 Standards 1 Video
5.8.4 Standards Quiz 2 Check for Understanding
5.8.5 The New Wireless Standard 1 Connection
5.8.6 801.11ax 1 Connection
5.8.7 Wavelength 1 Connection
5.8.8 801.11ax FR 5 Free Response
5.9 Viewing a Webpage Lesson
5.9.1 Viewing a Webpage 1 Video
5.9.2 Viewing a Webpage 2 Check for Understanding
5.9.3 Explaining a URL 5 Free Response
5.9.4 Net Neutrality Explained 1 Connection
5.9.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
5.9.6 Take a Side on Net Neutrality 5 Free Response
5.9.7 Net Neutrality and Cybersecurity 1 Connection
5.9.8 Net Neutrality and Cybersecurity Research 5 Free Response
5.10 Network Options Lesson
5.10.1 Network Options 1 Video
5.10.2 Network Options Quiz 5 Check for Understanding
5.10.3 What is an SSID? 1 Connection
5.10.4 What is an SSID? 5 Free Response
5.10.5 Wireless Threats 1 Connection
5.10.6 Wireless Threats 5 Free Response
5.10.7 Wireless Network Setup 5 Free Response
5.11 Network Administrator Lesson
5.11.1 Advanced Devices 1 Video
5.11.2 Advanced Devices Quiz 5 Check for Understanding
5.11.3 Network Administrator Career 1 Connection
5.11.4 Network Administrator Career 5 Free Response
5.11.5 Choosing the Best Devices 5 Free Response
5.11.6 Network Diagram 5 Free Response
5.12 Network Communication Lesson
5.12.1 Network Communication 1 Video
5.12.2 Network Communication Quiz 2 Check for Understanding
5.12.3 Setting up a Firewall 1 Example
5.12.4 iptables 5 Free Response
5.12.5 iptables simulation 1 Notes
5.13 Network Management Lesson
5.13.1 Linux/MacOS vs. Windows 1 Notes
5.13.2 Network Management 1 Video
5.13.3 Network Management Quiz 3 Check for Understanding
5.13.4 MacOS Terminal Simulation 1 Example
5.13.5 Windows Command Prompt Simulation 1 Example
5.13.6 Windows Command Prompt Spy 5 Video
5.13.7 Windows Command Prompt Spy 5 Free Response
5.13.8 SSH Logs 1 Notes
5.13.9 SSH Logs 1 Example
5.13.10 Reading Logs 5 Free Response
5.14 Advanced Networking Lesson
5.14.1 The OSI Model and Network Attacks 1 Connection
5.14.2 The OSI Model and Network Attacks Response 5 Free Response
5.14.3 Encapsulation 1 Connection
5.14.4 What is Virtualization? 1 Connection
5.14.5 Virtualization Response 5 Free Response
5.14.6 Baseband vs. Broadband 5 Free Response
5.14.7 Bit Rate vs. Baud Rate 5 Free Response
5.14.8 CSMA/CD vs. CSMA/CA 1 Resource
IT Professionals
6.1 IT Helpdesk Lesson
6.1.1 The Many Jobs at the IT Helpdesk 5 Connection
6.1.2 IT Helpdesk Scavenger Hunt 5 Free Response
6.1.3 Find an IT Job! 5 Free Response
6.2 Working with Customers Lesson
6.2.1 What is a CRM System? 5 Connection
6.2.2 CRM System Reflection 5 Free Response
6.2.3 Customer Service Skills 1 Connection
6.2.4 Customer Service Skills Reflection 5 Free Response
6.2.5 Act it Out! 15 Free Response
6.2.6 Log it in the CRM! 5 Free Response
6.3 Building a Knowledge Base Lesson
6.3.1 What is a Knowledge Base? 1 Connection
6.3.2 Draft a KB Article 5 Free Response
6.3.3 Share your KB Article 5 Free Response
6.3.4 Finalize your KB Article 15 Free Response
6.4 Star in a Video! Lesson
6.4.1 Instructional Videos 1 Connection
6.4.2 Example Tutorial 1 Connection
6.4.3 Instructional Video Plan 5 Free Response
6.4.4 Write the Script 5 Free Response
6.4.5 Create the Storyboard 5 Free Response
6.4.6 Record Your Video 5 Free Response
6.5 Keeping a Database Lesson
6.5.1 Databases 1 Video
6.5.2 Databases 1 Check for Understanding
6.5.3 Personally Identifiable Information (PII) 5 Free Response
6.5.4 FERPA 5 Connection
6.5.5 What is SQL? 5 Notes
6.5.6 How to Structure Data in SQL 1 Video
6.5.7 How to Structure Data in SQL 3 Check for Understanding
6.5.8 SQL Table: Tiktok 1 Example
6.5.9 Customer List 5 Example
6.6 Compliance Laws Lesson
6.6.1 IT Compliance 5 Connection
6.6.2 National Regulation Table 5 Connection
6.6.3 Georgia State Regulations 5 Free Response
6.6.4 Compliance Reflection 5 Free Response
6.7 Asset Management Lesson
6.7.1 IT Asset Management 5 Notes
6.7.2 What is ITAM? 5 Connection
6.7.3 Diving Deeper into ITAM 5 Connection
6.7.4 ITAM Presentation 5 Presentation
6.8 Emerging Technology and IT Lesson
6.8.1 What is Cloud Computing? 5 Connection
6.8.2 Cloud Computing and IT 5 Connection
6.8.3 Reflection: Cloud Computing 5 Free Response
6.9 Environmental Controls Lesson
6.9.1 Environmental Controls 1 Video
6.9.2 Environmental Controls Quiz 5 Check for Understanding
6.9.3 Infographic 1 Connection
6.9.4 Infographic FR 5 Free Response
6.9.5 Electrostatic Discharge 1 Connection
6.9.6 Your Security Systems 5 Free Response
6.9.7 Security Design 10 Free Response
6.10 Personal Safety Lesson
6.10.1 Safety Precautions 5 Free Response
6.10.2 Electrical Hazards 5 Free Response
6.10.3 Fire Suppression 1 Connection
6.10.4 Fire Suppression Response 5 Free Response
6.10.5 Emergency Response Plan 5 Connection
Project: IT Proposal
7.1 IT Department Proposal Lesson
7.1.1 Project Introduction 5 Notes
7.1.2 Find Your Companies 5 Free Response
7.1.3 Get to Know Your Companies 5 Free Response
7.1.4 Draft Your Pitch 5 Free Response
7.1.5 Create Your Presentation 5 Presentation
7.1.6 Next Steps 5 Free Response
Cybersecurity
8.1 What is Cybersecurity? Lesson
8.1.1 What is Cybersecurity? 1 Video
8.1.2 What is Cybersecurity? 3 Check for Understanding
8.1.3 City Services Ransomware 1 Connection
8.1.4 Ransomware Reflection 5 Free Response
8.1.5 Ransomware Simulator 1 Example
8.1.6 Hackers vs. Smart Homes 1 Connection
8.1.7 Connectivity Reflection 5 Free Response
8.2 Impact of Cybersecurity Lesson
8.2.1 Impact of Cybersecurity 1 Video
8.2.2 Impact of Cybersecurity 2 Check for Understanding
8.2.3 Phishing Simulator 1 Example
8.2.4 Phishing for Your Info 1 Connection
8.2.5 Phishing Reflection 5 Free Response
8.2.6 Cyber Game 1 Connection
8.2.7 Cyber Game Reflection 5 Free Response
8.2.8 Cyber Crime Time 1 Connection
8.2.9 Cyber Crime Time Reflection 5 Free Response
8.3 Network Attacks Lesson
8.3.1 Network Attacks Overview 1 Video
8.3.2 Network Attacks Quiz 4 Check for Understanding
8.3.3 Check for Vulnerabilities 1 Notes
8.3.4 Bug Bounty Hunting 1 Connection
8.3.5 Bug Bounty Hunting 5 Free Response
8.3.6 Common Port Targets 1 Connection
8.3.7 Port Scanner Simulation 1 Example
8.3.8 Open Port Reflection 5 Free Response
8.4 Malware Types and Prevention Lesson
8.4.1 Malware Types and Prevention 1 Video
8.4.2 Malware Types and Prevention 5 Check for Understanding
8.4.3 How Anti-malware Works 1 Connection
8.4.4 How Anti-malware Works 5 Free Response
8.4.5 OS Malware Security 5 Free Response
8.4.6 Reverse Engineering Malware 5 Free Response
8.5 Common Network Attacks Lesson
8.5.1 Common Network Attacks 1 Video
8.5.2 Network Attacks 3 Check for Understanding
8.5.3 Social Engineering Hack 1 Connection
8.5.4 Social Engineering Reflection 5 Free Response
8.5.5 DDoS Attacks 1 Connection
8.5.6 DDoS Simulation 1 Example
8.5.7 DDoS Reflection 5 Free Response
8.6 Additional Attacks Lesson
8.6.1 Additional Attacks 1 Video
8.6.2 Additional Attacks Quiz 5 Check for Understanding
8.6.3 Botnet Attacks - Mirai 1 Connection
8.6.4 Botnet Attacks - 3ve 1 Connection
8.6.5 Botnet Attacks - 3ve Video 1 Connection
8.6.6 Botnet Attacks - Reflection 5 Free Response
8.6.7 Zero-day Exploit: Stuxnet 5 Connection
8.6.8 Zero-day Exploit: Stuxnet 5 Notes
8.6.9 Zero-day Exploit Reflection 5 Free Response
8.6.10 US-CERT Current Activity 5 Free Response
8.7 Internal Threats Lesson
8.7.1 Internal Threats 1 Video
8.7.2 Internal Threats 5 Check for Understanding
8.7.3 BIOS/UEFI Attack Example 1 Connection
8.7.4 Accessing BIOS/UEFI 1 Notes
8.7.5 Causes of Data Breaches 5 Connection
8.7.6 Causes of Data Breaches 5 Free Response
8.7.7 Protecting Data at All Times 1 Connection
8.7.8 Protecting Data at All Times 5 Free Response
Project: Digital Forensics
9.1 Digital Forensics Lesson
9.1.1 Digital Forensics 1 Video
9.1.2 Student Success Story 1 Connection
9.1.3 Student Success Story Response 5 Free Response
9.2 Forensic Case 1: Logs Lesson
9.2.1 Network Logs 1 Notes
9.2.2 Network Log Evidence 1 Example
9.2.3 Network Logs Conclusion 5 Free Response
9.3 Forensic Case 2: File Metadata Lesson
9.3.1 File Metadata 1 Notes
9.3.2 File Metadata Evidence 1 Example
9.3.3 File Metadata Conclusion 5 Free Response
9.4 Forensic Case 3: Exif Data Lesson
9.4.1 Photo Exif 1 Notes
9.4.2 Exif Using Inspector 1 Connection
9.4.3 Exif Using the CLI 1 Example
9.4.4 Photo Exif Conclusion 5 Free Response
Computer Science Careers
10.1 Computer Science Careers Lesson
10.1.1 Computer Science All Around Us 1 Video
10.1.2 Computer Science All Around Us 2 Quiz
10.1.3 Coding in the Wild 1 Connection
10.1.4 Coding in the Wild Response 5 Free Response
10.1.5 Emerging Technologies and Careers 5 Connection
10.1.6 The Impact of Emerging Technologies 5 Free Response
10.1.7 Career Research 5 Resource
10.2 Create an Online Portfolio Lesson
10.2.1 Online Repositories 5 Free Response
10.2.2 What is a Resume? 5 Connection
10.2.3 What is a Resume? 5 Free Response
10.2.4 Upload Relevant Documents 5 Notes
10.3 Student Organizations Lesson
10.3.1 What Are They? 5 Notes
10.3.2 Their Mission 5 Free Response
10.3.3 Career Development 5 Free Response
10.3.4 Additional Opportunities 5 Free Response
10.3.5 Lifelong Lessons 5 Free Response
Supplemental: Unit Quizzes
11.1 Note to Teacher Lesson
11.1.1 Note to Teacher 5 Notes
11.2 IT Infrastructure Quiz Lesson
11.2.1 IT Infrastructure Quiz 20 Unit Quiz
11.3 Networking Fundamentals Quiz Lesson
11.3.1 Mindsets 1 Survey
11.3.2 Networking Fundamentals Quiz 15 Unit Quiz
11.4 Cyber Defense Quiz Lesson
11.4.1 Cyber Defense Quiz 20 Unit Quiz