Please enable JavaScript to use CodeHS

Introduction to Cybersecurity (Vigenere) - Outline

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Video 1.1.1 Welcome to Cybersecurity
    3. Check for Understanding 1.1.2 Welcome to Cybersecurity
    4. Example 1.1.3 Intruder Alert!
    5. Free Response 1.1.4 Cybersecurity and You
    6. Free Response 1.1.5 Course Goals
    7. 1.2 What is Cybersecurity?

    8. Video 1.2.1 What is Cybersecurity?
    9. Check for Understanding 1.2.2 What is Cybersecurity?
    10. Connection 1.2.3 WannaCry Ransomware Attack
    11. Free Response 1.2.4 WannaCry Reflection
    12. Example 1.2.5 Ransomware Simulator
    13. Connection 1.2.6 Internet of Things
    14. Connection 1.2.7 Cybersecurity and Connected Cars
    15. Free Response 1.2.8 Internet of Things Reflection
    16. Connection 1.2.9 Threat Map
    17. Free Response 1.2.10 Why Learn about Cybersecurity?
    18. Example 1.2.11 QR Code Generator
    19. 1.3 Impact of Cybersecurity

    20. Video 1.3.1 Impact of Cybersecurity
    21. Check for Understanding 1.3.2 Impact of Cybersecurity
    22. Connection 1.3.3 Yahoo! Attack
    23. Free Response 1.3.4 Yahoo! Reflection
    24. Connection 1.3.5 Fighting Cyber Crime
    25. Free Response 1.3.6 Cyber Crime Reflection
    26. Connection 1.3.7 FBI Cyber Crime
    27. Free Response 1.3.8 FBI Reflection
    28. Example 1.3.9 Phishing Simulator
    29. 1.4 The CIA Triad

    30. Video 1.4.1 CIA Triad
    31. Check for Understanding 1.4.2 CIA Triad
    32. Free Response 1.4.3 Which part of the CIA Triad?
    33. Free Response 1.4.4 Which part of the CIA Triad?
    34. Free Response 1.4.5 Breach of Confidentiality
    35. Free Response 1.4.6 Breach of Availability
    36. 1.5 What is Cybersecurity? Quiz

    37. Quiz 1.5.1 What is Cybersecurity? Quiz
    38. Badge 1.5.2 Intro to Cybersecurity Badge
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Free Response 2.1.3 Building a Positive Digital Footprint
    5. Connection 2.1.4 Right to be Forgotten?
    6. Free Response 2.1.5 Right to be Forgotten
    7. Free Response 2.1.6 What is your Digital Footprint?
    8. Example 2.1.7 Social Media Clean-up
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Free Response 2.2.5 Stopping Cyberbullying
    15. 2.3 Internet Safety

    16. Video 2.3.1 Internet Safety
    17. Check for Understanding 2.3.2 Internet Safety
    18. Free Response 2.3.3 Scenario: School Stranger
    19. Free Response 2.3.4 Scenario: Vacation Pals
    20. Free Response 2.3.5 Staying Safe
    21. 2.4 Privacy & Security

    22. Video 2.4.1 What is Data Privacy & Security?
    23. Check for Understanding 2.4.2 Privacy & Security Quiz
    24. Connection 2.4.3 How Strong is your Password?
    25. Free Response 2.4.4 How Strong is your password?
    26. Connection 2.4.5 Google Privacy Policy Search
    27. Free Response 2.4.6 Google Privacy Policy Search
    28. Example 2.4.7 Guess: Password List
    29. Example 2.4.8 Guess: Using an Algorithm
    30. Example 2.4.9 Guess: Brute Force
    31. 2.5 Information Literacy

    32. Video 2.5.1 Information Literacy
    33. Check for Understanding 2.5.2 Information Literacy
    34. Free Response 2.5.3 Effective Internet Searches
    35. Connection 2.5.4 Evaluate the Source 1
    36. Free Response 2.5.5 Respond: Evaluate the Source 1
    37. Connection 2.5.6 Evaluate the Source 2
    38. Free Response 2.5.7 Respond: Evaluate the Source 2
    39. Connection 2.5.8 Hero Pig?
    40. 2.6 Creative Credit & Copyright

    41. Video 2.6.1 Creative Credit and Copyright
    42. Check for Understanding 2.6.2 Creative Credit and Copyright
    43. Free Response 2.6.3 Cite!
    44. Connection 2.6.4 Exploring Creative Commons
    45. Free Response 2.6.5 Respond: Creative Commons
    46. Free Response 2.6.6 Task: Finding Images
    47. Free Response 2.6.7 Reflection: Why is Copyright Important?
    48. 2.7 Hacking Ethics

    49. Video 2.7.1 Hacking Ethics & Legality
    50. Check for Understanding 2.7.2 Hacking Ethics & Legality
    51. Connection 2.7.3 Penetration Testing
    52. Free Response 2.7.4 Reflection: Penetration Testing
    53. Connection 2.7.5 Hack the Pentagon?
    54. Free Response 2.7.6 Reflection: Hack the Pentagon
    55. Check for Understanding 2.7.7 Ethical Hacker Agreement
    56. 2.8 Digital Citizenship and Cyber Hygiene Quiz

    57. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
    58. Badge 2.8.2 Digital Citizenship and Cybersecurity Badge
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Connection 4.1.3 Securing the Cloud
    5. Free Response 4.1.4 Encryption Reflection
    6. Example 4.1.5 Encrypt/Decrypt
    7. Example 4.1.6 Cryptogram Game!
    8. 4.2 History of Cryptography

    9. Video 4.2.1 Cryptography: A Brief History
    10. Check for Understanding 4.2.2 Cryptography History Quiz
    11. Connection 4.2.3 How the Enigma Worked
    12. Free Response 4.2.4 How the Enigma Worked
    13. Connection 4.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 4.2.6 The Future of Cybersecurity
    15. 4.3 Why Encrypt?

    16. Video 4.3.1 Why encrypt?
    17. Check for Understanding 4.3.2 Why encrypt?
    18. 4.4 Basic Crypto Systems: Caesar Cipher

    19. Video 4.4.1 Caesar Cipher
    20. Check for Understanding 4.4.2 Caesar Cipher
    21. Example 4.4.3 Caesar Cipher Encryption
    22. Example 4.4.4 Decrypt Caesar's Cipher!
    23. Exercise 4.4.5 Decrypting Caesar
    24. 4.5 Basic Crypto Systems: Cracking Caesar

    25. Video 4.5.1 Cracking Caesar Cipher
    26. Check for Understanding 4.5.2 Cracking Caesar Cipher
    27. Example 4.5.3 Cracking Caesar with Brute Force
    28. Example 4.5.4 Letter Frequency and Caesar
    29. Free Response 4.5.5 Examining Caesar Cipher
    30. 4.6 Basic Crypto Systems: Vigenere Cipher

    31. Video 4.6.1 Vigenere Cipher
    32. Check for Understanding 4.6.2 Vigenere Cipher
    33. Example 4.6.3 Vigenere Cipher Example
    34. Example 4.6.4 Letter Frequency and Vigenere Cipher
    35. Free Response 4.6.5 Examining Vigenere Cipher
    36. Example 4.6.6 Improving Vigenere
    37. 4.7 Advanced Cryptography

    38. Video 4.7.1 Advanced Cryptography
    39. Check for Understanding 4.7.2 Advanced Cryptography
    40. Connection 4.7.3 Public Key Cryptography for Non-Geeks
    41. Free Response 4.7.4 Examining Public Key Cryptography
    42. Connection 4.7.5 Public Key Cryptography
    43. Free Response 4.7.6 Public Key Cryptography
    44. 4.8 Hash Functions

    45. Video 4.8.1 Hash Functions
    46. Check for Understanding 4.8.2 Hash Functions
    47. Connection 4.8.3 Google Shattered Crypto Algorithm
    48. Free Response 4.8.4 Hash Functions in the News
    49. Connection 4.8.5 Using a Hash Generator
    50. Free Response 4.8.6 Hash Generator
    51. 4.9 Hash Function Development

    52. Video 4.9.1 Hash Function Development
    53. Check for Understanding 4.9.2 Hash Function Development
    54. Example 4.9.3 Modulo Math Calculator
    55. Example 4.9.4 Understanding Modulo Math
    56. Example 4.9.5 Modulo Game!
    57. Exercise 4.9.6 Develop a Simple Hash Function
    58. 4.10 The ABCs of Cryptography Quiz

    59. Quiz 4.10.1 The ABCs of Cryptography Quiz
    60. Badge 4.10.2 ABCs of Cryptography Badge
  5. Project: Classic Cipher Newscast

    1. 5.1 Project: Classic Cipher Newscast

    2. Notes 5.1.1 Overview
    3. Free Response 5.1.2 Preview Sample Newscasts
    4. Notes 5.1.3 Investigate a Classic Cipher
    5. Free Response 5.1.4 Write the Script and Rehearse
    6. Free Response 5.1.5 Newscast Presentation
  6. Software Security

    1. 6.1 Inside Web Apps

    2. Video 6.1.1 Inside Web Apps
    3. Check for Understanding 6.1.2 Inside Web Apps
    4. Free Response 6.1.3 Using View Page Source
    5. Connection 6.1.4 Getting Started with OWASP
    6. Free Response 6.1.5 Getting Started with OWASP
    7. Example 6.1.6 Recreate a Webpage?
    8. 6.2 Developer Tools

    9. Video 6.2.1 Developer Tools
    10. Check for Understanding 6.2.2 Developer Tools
    11. Free Response 6.2.3 Using the Developer Tools
    12. Connection 6.2.4 The Top Cybersecurity Blogs and Websites
    13. Free Response 6.2.5 Selecting a Site to Follow
    14. Exercise 6.2.6 Console Secrets
    15. Example 6.2.7 Local Storage
    16. 6.3 Databases

    17. Video 6.3.1 Databases
    18. Check for Understanding 6.3.2 Databases
    19. Connection 6.3.3 Database Administrator Career
    20. Free Response 6.3.4 Database Administrator Career
    21. Video 6.3.5 Parts of a Database
    22. Check for Understanding 6.3.6 Parts of a Database
    23. Connection 6.3.7 SQL Database Diagram
    24. Free Response 6.3.8 SQL Database Diagram
    25. Free Response 6.3.9 Schema Brainstorm
    26. 6.4 Clients and Servers

    27. Video 6.4.1 Clients and Servers
    28. Check for Understanding 6.4.2 Clients and Servers
    29. Connection 6.4.3 Inside a Google Data Center
    30. Free Response 6.4.4 Inside a Google Data Center
    31. Connection 6.4.5 Cloud Vulnerabilities
    32. Free Response 6.4.6 Cloud Vulnerabilities Response
    33. Video 6.4.7 Client-Server Model
    34. Check for Understanding 6.4.8 Client-Server Model
    35. Connection 6.4.9 The Future of User Privacy
    36. Free Response 6.4.10 The Future of User Privacy
    37. 6.5 What is SQL?

    38. Notes 6.5.1 What is SQL Overview
    39. Video 6.5.2 Intro to SQL
    40. Check for Understanding 6.5.3 Quiz: What is SQL?
    41. 6.6 Structuring Data in SQL

    42. Video 6.6.1 How to Structure Data in SQL
    43. Check for Understanding 6.6.2 How to Structure Data in SQL
    44. Example 6.6.3 SQL Tables
    45. 6.7 Basic Querying in SQL

    46. Video 6.7.1 The SELECT Statement
    47. Check for Understanding 6.7.2 Basic Querying in SQL
    48. Example 6.7.3 Our First SELECT Statement
    49. Exercise 6.7.4 Your First SELECT Statement
    50. Video 6.7.5 More SELECT Statement
    51. Check for Understanding 6.7.6 More SELECT Statement
    52. Example 6.7.7 Selecting Specific Columns
    53. Exercise 6.7.8 Harry Potter Names
    54. 6.8 Filtering Queries in SQL

    55. Video 6.8.1 The WHERE Clause
    56. Check for Understanding 6.8.2 Condition Operators
    57. Example 6.8.3 Ravenclaw House
    58. Example 6.8.4 People in Gryffindor
    59. Example 6.8.5 Filter By ID
    60. Exercise 6.8.6 The Weasleys
    61. Exercise 6.8.7 The Potters
    62. 6.9 Common Security Problems

    63. Video 6.9.1 Common Security Problems
    64. Check for Understanding 6.9.2 Common Security Problems
    65. Connection 6.9.3 Meet Security Engineers at Google
    66. Free Response 6.9.4 Security Engineering Reflection
    67. Video 6.9.5 Living in a Digital World
    68. Free Response 6.9.6 Living in a Digital World
    69. 6.10 SQL Injection Overview

    70. Video 6.10.1 SQL Injection Overview
    71. Check for Understanding 6.10.2 SQL Injection Overview
    72. Connection 6.10.3 Equifax Security Breach
    73. Connection 6.10.4 Equifax Exposed Millions
    74. Free Response 6.10.5 Equifax SQL Injection Attack
    75. Example 6.10.6 SQLi
    76. 6.11 Types of SQLi and Prevention

    77. Video 6.11.1 Types of SQLi
    78. Check for Understanding 6.11.2 Types of SQLi
    79. Video 6.11.3 Preventing SQLi
    80. Check for Understanding 6.11.4 Preventing SQLi
    81. Connection 6.11.5 Mitigating SQL Injection
    82. Free Response 6.11.6 Reflection: Mitigating SQL Injection
    83. Connection 6.11.7 SQL Injection
    84. 6.12 Cross-site Scripting

    85. Video 6.12.1 Cross-site Scripting
    86. Check for Understanding 6.12.2 Cross-site Scripting
    87. Connection 6.12.3 XSS Bug in Yahoo Mail
    88. Free Response 6.12.4 XSS Bug in Yahoo Mail
    89. Notes 6.12.5 XSS Demo Overview
    90. Connection 6.12.6 Google Application Security: XSS
    91. Connection 6.12.7 Google's Tutorial for XSS
    92. Free Response 6.12.8 XSS Reflection
    93. 6.13 Software Security Quiz

    94. Quiz 6.13.1 Software Security Quiz
    95. Badge 6.13.2 Software Security Badge
  7. Networking Fundamentals

    1. 7.1 Introduction to the Internet

    2. Video 7.1.1 Welcome to the Internet
    3. Check for Understanding 7.1.2 Intro to the Internet
    4. Connection 7.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 7.1.4 Connectivity Lab Reflection
    6. 7.2 Internet Hardware and Sending Information

    7. Video 7.2.1 Internet Hardware
    8. Check for Understanding 7.2.2 Internet Hardware
    9. Video 7.2.3 Sending Information
    10. Check for Understanding 7.2.4 Sending Information
    11. Connection 7.2.5 The Internet is in the Ocean
    12. Free Response 7.2.6 Internet in the Ocean Reflection
    13. 7.3 Internet Addresses

    14. Video 7.3.1 Internet Addresses
    15. Check for Understanding 7.3.2 Internet Addresses
    16. Free Response 7.3.3 The Need for Addresses
    17. Connection 7.3.4 IPv4 vs. IPv6
    18. Connection 7.3.5 The Long Transition to IPv6
    19. Free Response 7.3.6 Reflection: IPv4 vs IPv6
    20. 7.4 Domain Name System (DNS)

    21. Video 7.4.1 Domain Name System (DNS)
    22. Check for Understanding 7.4.2 Domain Name System
    23. Connection 7.4.3 How Does DNS Work?
    24. Free Response 7.4.4 How Does DNS Work?
    25. 7.5 Routing

    26. Video 7.5.1 Routing
    27. Check for Understanding 7.5.2 Routing
    28. Traceroute 7.5.3 Route Tracing
    29. Free Response 7.5.4 Redundancy
    30. 7.6 Packets & Protocols

    31. Video 7.6.1 Packets
    32. Check for Understanding 7.6.2 Packets
    33. Video 7.6.3 Protocols
    34. Check for Understanding 7.6.4 Protocols
    35. Resource 7.6.5 Passing Notes
    36. Connection 7.6.6 How the Internet Works
    37. Free Response 7.6.7 The Journey of an Image
    38. 7.7 Viewing a Webpage

    39. Video 7.7.1 Viewing a Webpage
    40. Check for Understanding 7.7.2 Viewing a Webpage
    41. Free Response 7.7.3 Explaining a URL
    42. Connection 7.7.4 Net Neutrality Explained
    43. Connection 7.7.5 FCCs Net Neutrality Rules Officially Repealed
    44. Free Response 7.7.6 Take a Side on Net Neutrality
    45. Connection 7.7.7 Net Neutrality and Cybersecurity
    46. Free Response 7.7.8 Net Neutrality and Cybersecurity Research
    47. 7.8 Impact of the Internet

    48. Video 7.8.1 Impact of the Internet
    49. Check for Understanding 7.8.2 Impact of the Internet
    50. Connection 7.8.3 What is the Digital Divide?
    51. Free Response 7.8.4 What is the Digital Divide?
    52. 7.9 Network Attacks

    53. Video 7.9.1 Network Attacks Overview
    54. Free Response 7.9.2 Network Attacks
    55. Video 7.9.3 Common Network Attacks
    56. Check for Understanding 7.9.4 Network Attacks
    57. Connection 7.9.5 Social Engineering Hack
    58. Free Response 7.9.6 Social Engineering Reflection
    59. Connection 7.9.7 DDoS Attacks
    60. Free Response 7.9.8 DDoS Reflection
    61. Example 7.9.9 DDoS Simulation
    62. Video 7.9.10 SUPPLEMENTARY: Other Network Attacks
    63. 7.10 Securing a Network

    64. Video 7.10.1 Access Control
    65. Check for Understanding 7.10.2 Access Control
    66. Connection 7.10.3 RADIUS Overview with AAA Protocol
    67. Connection 7.10.4 RADIUS Server Access Control
    68. Free Response 7.10.5 RADIUS Reflection
    69. Video 7.10.6 Detecting Intrusions to Secure a Network
    70. Quiz 7.10.7 Securing a Network
    71. Connection 7.10.8 How to Secure your IT Network
    72. Free Response 7.10.9 Secure your IT Network Basics
    73. Connection 7.10.10 Network Administrator Career
    74. Free Response 7.10.11 Network Administrator Career
    75. Example 7.10.12 Multifactor Authentication
    76. Example 7.10.13 Two Factor Authentication
    77. Example 7.10.14 Authorization
    78. Example 7.10.15 Setting up a Firewall
    79. 7.11 Networking Fundamentals Quiz

    80. Quiz 7.11.1 Networking Fundamentals Quiz
    81. Badge 7.11.2 Networking Fundamentals Badge
  8. Project: Secure the Company's Network

    1. 8.1 Project: Secure the Company's Network

    2. Connection 8.1.1 Secure the Company's Network
    3. Free Response 8.1.2 Establish Firewall Rules
    4. Resource 8.1.3 Establish Firewall Rules Handout
    5. Free Response 8.1.4 Reading Logs
    6. Resource 8.1.5 Reading Logs Handout
    7. Example 8.1.6 SSH Logs
    8. Free Response 8.1.7 Project Reflection
  9. Final Course Project

    1. 9.1 Final Course Project

    2. Notes 9.1.1 Choose Your Own Adventure
    3. Free Response 9.1.2 Choose Your Adventure
    4. Free Response 9.1.3 Research
    5. Free Response 9.1.4 Choose Your Target Audience
    6. Free Response 9.1.5 Draft Your Presentation
    7. Free Response 9.1.6 Draft Your Flyer
    8. Free Response 9.1.7 Make Your Presentation with Handout!
  10. Final Exam

    1. 10.1 Final Exam

    2. Quiz 10.1.1 Final Exam
  11. Cryptocurrency

    1. 11.1 What is Currency?

    2. Video 11.1.1 What is Currency?
    3. Check for Understanding 11.1.2 What is Currency?
    4. Connection 11.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 11.1.4 What Gives Money Its Value
    6. Resource 11.1.5 Money: What is it Good For?
    7. 11.2 What is Cryptocurrency?

    8. Video 11.2.1 Cryptocurrency Basics
    9. Check for Understanding 11.2.2 Cryptocurrency Basics
    10. Video 11.2.3 Cryptocurrency Module Overview
    11. Connection 11.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 11.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 11.2.6 Show Me the Money
    14. Free Response 11.2.7 American Currency Exhibit
    15. 11.3 Intro to Blockchain

    16. Video 11.3.1 Intro to Blockchain
    17. Check for Understanding 11.3.2 Intro to Blockchain
    18. Connection 11.3.3 CryptoKitties
    19. Free Response 11.3.4 CryptoKitties
    20. 11.4 Hashing

    21. Video 11.4.1 Hashing
    22. Check for Understanding 11.4.2 Hashing
    23. Connection 11.4.3 SHA256 Hash Generator
    24. Free Response 11.4.4 Using the SHA256 Hash Generator
    25. 11.5 Proof of Work

    26. Video 11.5.1 Proof of Work
    27. Check for Understanding 11.5.2 Proof of Work
    28. Video 11.5.3 Mining the Block
    29. Check for Understanding 11.5.4 Mining the Block
    30. Connection 11.5.5 PoW vs. Proof of Stake
    31. Free Response 11.5.6 PoW vs. PoS
    32. Resource 11.5.7 Checking Proof of Work
    33. 11.6 Advanced Blockchain

    34. Video 11.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 11.6.2 Advanced Blockchain (part 1)
    36. Connection 11.6.3 Blockchain Buzz
    37. Free Response 11.6.4 Blockchain Buzz
    38. Video 11.6.5 Advanced Blockchain (part 2)
    39. Free Response 11.6.6 Advanced Blockchain (part 2)
    40. Resource 11.6.7 Make a Blockchain
    41. Connection 11.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 11.7 Cryptocurrencies

    43. Video 11.7.1 Cryptocurrencies
    44. Check for Understanding 11.7.2 Cryptocurrencies
    45. Free Response 11.7.3 Shiny Toy Phenomenon
    46. Connection 11.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 11.7.5 Walmart Use of Blockchain
    48. 11.8 Bitcoin

    49. Video 11.8.1 Bitcoin
    50. Check for Understanding 11.8.2 Bitcoin
    51. Connection 11.8.3 51% Attack Explained
    52. Free Response 11.8.4 51% Attack
    53. Connection 11.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 11.8.6 Bitcoin Bust
    55. Resource 11.8.7 Explore the Bitcoin Blockchain
    56. 11.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 11.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 11.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 11.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 11.9.4 Cryptocurrency Pros and Cons
    61. Free Response 11.9.5 Crypto Pros and Cons
    62. Connection 11.9.6 What is HODL?
    63. Free Response 11.9.7 What is HODL?
    64. Free Response 11.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 11.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 11.10.1 Overview
    67. Free Response 11.10.2 Preview Sample Expert Panels
    68. Free Response 11.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 11.10.4 Write an Outline and Rehearse
    70. Free Response 11.10.5 Expert Panel Talk (Presentation)
    71. 11.11 Cryptocurrency Quiz

    72. Unit Quiz 11.11.1 Cryptocurrency Quiz
    73. Badge 11.11.2 Cryptocurrency Badge
  12. Simulations

    1. 12.1 Simulations

    2. Example 12.1.1 Ransomware Simulator
    3. Example 12.1.2 Intruder Alert!
    4. Example 12.1.3 Phishing Simulator
    5. Example 12.1.4 QR Code Generator
    6. Example 12.1.5 You Can Be Tracked!
    7. Example 12.1.6 Social Media Clean-up
    8. Example 12.1.7 Guess: Password List
    9. Example 12.1.8 Guess: Using an Algorithm
    10. Example 12.1.9 Guess: Brute Force
    11. Example 12.1.10 Encrypt/Decrypt
    12. Example 12.1.11 Cryptogram Game!
    13. Example 12.1.12 Caesar Cipher Encryption
    14. Example 12.1.13 Decrypt Caesar's Cipher!
    15. Example 12.1.14 Cracking Caesar with Brute Force
    16. Example 12.1.15 Letter Frequency and Vigenere Cipher
    17. Example 12.1.16 Improving Vigenere
    18. Example 12.1.17 Modulo Math Calculator
    19. Example 12.1.18 Understanding Modulo Math
    20. Example 12.1.19 Modulo Game!
    21. Example 12.1.20 Recreate a Webpage?
    22. Exercise 12.1.21 Console Secrets
    23. Example 12.1.22 Local Storage
    24. Free Response 12.1.23 Schema Brainstorm
    25. Example 12.1.24 SQL Tables
    26. Example 12.1.25 SQLi
    27. Connection 12.1.26 SQL Injection
    28. Example 12.1.27 DDoS Simulation
    29. Example 12.1.28 Multifactor Authentication
    30. Example 12.1.29 Two Factor Authentication
    31. Example 12.1.30 Authorization
    32. Example 12.1.31 Setting up a Firewall
  13. SQL Part II: The SQL

    1. 13.1 More Filtering Practice

    2. Exercise 13.1.1 Initials
    3. Exercise 13.1.2 Compound Queries with BETWEEN
    4. Exercise 13.1.3 Gryffindors With G Names
    5. Exercise 13.1.4 R First Names
    6. Exercise 13.1.5 FF Houses
    7. 13.2 Ordering Results

    8. Video 13.2.1 The ORDER BY Keyword
    9. Notes 13.2.2 ORDER BY
    10. Example 13.2.3 ORDER BY First Name
    11. Example 13.2.4 Reverse Order
    12. Example 13.2.5 Order By Multiple Fields
    13. Exercise 13.2.6 House Ordering
    14. Exercise 13.2.7 Sort the P Names
    15. 13.3 Renaming Fields

    16. Notes 13.3.1 Renaming Fields with AS
    17. Example 13.3.2 Renaming in the House Table
    18. Exercise 13.3.3 Changing Column Names
    19. 13.4 Joining Tables

    20. Video 13.4.1 The JOIN command
    21. Notes 13.4.2 Basic Joining
    22. Example 13.4.3 Letters and Numbers
    23. Example 13.4.4 Person and House
    24. Example 13.4.5 Person and House (Correct)
    25. Example 13.4.6 Person and House (with namespacing)
    26. Exercise 13.4.7 List All Gryffindors
    27. Video 13.4.8 JOIN With Yourself
    28. Notes 13.4.9 Renaming Tables
    29. Example 13.4.10 Quidditch Matchups
    30. Exercise 13.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 13.5 More Joining Tables

    32. Example 13.5.1 The Course Table
    33. Exercise 13.5.2 Courses and Professors
    34. Exercise 13.5.3 Courses, Professors, and Houses
    35. Exercise 13.5.4 Courses Taught By Gryffindors
    36. Example 13.5.5 The Enrollment Table
    37. Exercise 13.5.6 Students Taking Potions
    38. Exercise 13.5.7 Non-Slytherins Taking Potions
    39. Exercise 13.5.8 Defense Students by House
    40. Exercise 13.5.9 Neville's Courses
  14. Web Development

    1. 14.1 Introduction to HTML

    2. Video 14.1.1 Introduction to HTML
    3. Check for Understanding 14.1.2 Introduction to HTML Quiz
    4. Example 14.1.3 Our First HTML Page
    5. Exercise 14.1.4 Say Hello!
    6. 14.2 Structure of an HTML Page

    7. Video 14.2.1 Structure of an HTML Page
    8. Check for Understanding 14.2.2 Structure of an HTML Page Quiz
    9. Example 14.2.3 HTML Template
    10. Example 14.2.4 Hello World Page
    11. Exercise 14.2.5 The <title> Tag
    12. Exercise 14.2.6 Your First HTML Page
    13. Badge 14.2.7 Structure Badge
    14. 14.3 Formatting Text

    15. Video 14.3.1 Formatting Text
    16. Check for Understanding 14.3.2 Formatting Text Quiz
    17. Example 14.3.3 Dictionary
    18. Exercise 14.3.4 That's Bold
    19. Exercise 14.3.5 Artificial Intelligence
    20. Exercise 14.3.6 State Capitals
    21. 14.4 Links

    22. Video 14.4.1 Links
    23. Check for Understanding 14.4.2 Links Quiz
    24. Example 14.4.3 The <a> Tag
    25. Exercise 14.4.4 Simple Link
    26. Exercise 14.4.5 My Favorite Websites
    27. 14.5 Images

    28. Video 14.5.1 Images
    29. Check for Understanding 14.5.2 Images Quiz
    30. Example 14.5.3 The <img> Tag
    31. Example 14.5.4 Building the CodeHS Homepage
    32. Exercise 14.5.5 Collage on a Theme
    33. Exercise 14.5.6 Linking an Image
    34. Exercise 14.5.7 Personal Library
    35. Badge 14.5.8 Images Badge
    36. 14.6 HTML Lists

    37. Video 14.6.1 HTML Lists
    38. Check for Understanding 14.6.2 HTML Lists Quiz
    39. Example 14.6.3 Grocery Shopping
    40. Exercise 14.6.4 Favorite Things
    41. Exercise 14.6.5 To-Do List
    42. Exercise 14.6.6 List Article
    43. 14.7 HTML Tables

    44. Video 14.7.1 HTML Tables
    45. Check for Understanding 14.7.2 HTML Tables Quiz
    46. Example 14.7.3 Address Book
    47. Exercise 14.7.4 Favorite Songs
    48. Exercise 14.7.5 Calendar
    49. 14.8 HTML Styling

    50. Video 14.8.1 HTML Styling
    51. Check for Understanding 14.8.2 HTML Styling Quiz
    52. Example 14.8.3 Stylish Address Book
    53. Exercise 14.8.4 Background Colors
    54. Exercise 14.8.5 Style Your To-Do List
    55. 14.9 Introduction to CSS

    56. Video 14.9.1 Introduction to CSS
    57. Check for Understanding 14.9.2 Introduction to CSS Quiz
    58. Example 14.9.3 Styling Your H1s
    59. Exercise 14.9.4 First Style with CSS
    60. Exercise 14.9.5 List Styling
    61. 14.10 CSS Select by Tag

    62. Video 14.10.1 CSS Select by Tag
    63. Check for Understanding 14.10.2 CSS Select by Tag Quiz
    64. Example 14.10.3 Rainbow
    65. Example 14.10.4 Dog Styling
    66. Exercise 14.10.5 Restaurant Menu
    67. Exercise 14.10.6 Put Karel Together
    68. 14.11 CSS Select by Class

    69. Video 14.11.1 CSS Select by Class
    70. Check for Understanding 14.11.2 CSS Select by Class Quiz
    71. Example 14.11.3 Simple Checkerboard
    72. Exercise 14.11.4 Tic Tac Toe
    73. Exercise 14.11.5 Music Library
    74. 14.12 CSS Select by ID

    75. Video 14.12.1 CSS Select by ID
    76. Check for Understanding 14.12.2 CSS Select by ID Quiz
    77. Example 14.12.3 Logo
    78. Exercise 14.12.4 Favorite Dog
    79. Exercise 14.12.5 Bingo
    80. Badge 14.12.6 CSS Badge
    81. 14.13 Viewing Websites

    82. Video 14.13.1 Viewing Websites
    83. Check for Understanding 14.13.2 Viewing Websites Quiz
    84. Free Response 14.13.3 Explaining a URL
    85. 14.14 Web Development Quiz

    86. Unit Quiz 14.14.1 Web Development Quiz
    87. 14.15 Your First Website

    88. Challenge 14.15.1 Set Up Your codehs.me Website
    89. Challenge 14.15.2 Practice PT: Your First Website
    90. Badge 14.15.3 Website Badge
  15. Midterm

    1. 15.1 Midterm

    2. Quiz 15.1.1 Midterm