Please enable JavaScript to use CodeHS

Outline


1. What is Cybersecurity?
1.1 Module Overview - Cybersecurity
Video 1.1.1 Welcome to Cybersecurity
Check for Understanding 1.1.2 Welcome to Cybersecurity
Example 1.1.3 Intruder Alert!
Free Response 1.1.4 Cybersecurity and You
Free Response 1.1.5 Course Goals
1.2 What is Cybersecurity?
Video 1.2.1 What is Cybersecurity?
Check for Understanding 1.2.2 What is Cybersecurity?
Connection 1.2.3 WannaCry Ransomware Attack
Free Response 1.2.4 WannaCry Reflection
Example 1.2.5 Ransomware Simulator
Connection 1.2.6 Internet of Things
Connection 1.2.7 Cybersecurity and Connected Cars
Free Response 1.2.8 Internet of Things Reflection
Connection 1.2.9 Threat Map
Free Response 1.2.10 Why Learn about Cybersecurity?
Example 1.2.11 QR Code Generator
1.3 Impact of Cybersecurity
Video 1.3.1 Impact of Cybersecurity
Check for Understanding 1.3.2 Impact of Cybersecurity
Connection 1.3.3 Yahoo! Attack
Free Response 1.3.4 Yahoo! Reflection
Connection 1.3.5 Fighting Cyber Crime
Free Response 1.3.6 Cyber Crime Reflection
Connection 1.3.7 FBI Cyber Crime
Free Response 1.3.8 FBI Reflection
Example 1.3.9 Phishing Simulator
1.4 The CIA Triad
Video 1.4.1 CIA Triad
Check for Understanding 1.4.2 CIA Triad
Free Response 1.4.3 Which part of the CIA Triad?
Free Response 1.4.4 Which part of the CIA Triad?
Free Response 1.4.5 Breach of Confidentiality
Free Response 1.4.6 Breach of Availability
1.5 What is Cybersecurity? Quiz
Quiz 1.5.1 What is Cybersecurity? Quiz
Badge 1.5.2 Intro to Cybersecurity Badge
2. Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
Video 2.1.1 Digital Footprint and Reputation
Check for Understanding 2.1.2 Digital Footprint and Reputation
Free Response 2.1.3 Building a Positive Digital Footprint
Connection 2.1.4 Right to be Forgotten?
Free Response 2.1.5 Right to be Forgotten
Free Response 2.1.6 What is your Digital Footprint?
Example 2.1.7 Social Media Clean-up
2.2 Cyberbullying
Video 2.2.1 Cyberbullying
Check for Understanding 2.2.2 Cyberbullying
Free Response 2.2.3 Scenario: Student Ranking
Free Response 2.2.4 Scenario: Singled Out
Free Response 2.2.5 Stopping Cyberbullying
2.3 Internet Safety
Video 2.3.1 Internet Safety
Check for Understanding 2.3.2 Internet Safety
Free Response 2.3.3 Scenario: School Stranger
Free Response 2.3.4 Scenario: Vacation Pals
Free Response 2.3.5 Staying Safe
2.4 Privacy & Security
Video 2.4.1 What is Data Privacy & Security?
Check for Understanding 2.4.2 Privacy & Security Quiz
Connection 2.4.3 How Strong is your Password?
Free Response 2.4.4 How Strong is your password?
Connection 2.4.5 Google Privacy Policy Search
Free Response 2.4.6 Google Privacy Policy Search
Example 2.4.7 Guess: Password List
Example 2.4.8 Guess: Using an Algorithm
Example 2.4.9 Guess: Brute Force
2.5 Information Literacy
Video 2.5.1 Information Literacy
Check for Understanding 2.5.2 Information Literacy
Free Response 2.5.3 Effective Internet Searches
Connection 2.5.4 Evaluate the Source 1
Free Response 2.5.5 Respond: Evaluate the Source 1
Connection 2.5.6 Evaluate the Source 2
Free Response 2.5.7 Respond: Evaluate the Source 2
Connection 2.5.8 Hero Pig?
2.6 Creative Credit & Copyright
Video 2.6.1 Creative Credit and Copyright
Check for Understanding 2.6.2 Creative Credit and Copyright
Free Response 2.6.3 Cite!
Connection 2.6.4 Exploring Creative Commons
Free Response 2.6.5 Respond: Creative Commons
Free Response 2.6.6 Task: Finding Images
Free Response 2.6.7 Reflection: Why is Copyright Important?
2.7 Hacking Ethics
Video 2.7.1 Hacking Ethics & Legality
Check for Understanding 2.7.2 Hacking Ethics & Legality
Connection 2.7.3 Penetration Testing
Free Response 2.7.4 Reflection: Penetration Testing
Connection 2.7.5 Hack the Pentagon?
Free Response 2.7.6 Reflection: Hack the Pentagon
Check for Understanding 2.7.7 Ethical Hacker Agreement
2.8 Digital Citizenship and Cyber Hygiene Quiz
Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
Badge 2.8.2 Digital Citizenship and Cybersecurity Badge
3. Project: Public Service Announcement
3.1 Project: Public Service Announcement
Free Response 3.1.1 Pick a Topic
Free Response 3.1.2 Research
Free Response 3.1.3 Choose Your Audience
Free Response 3.1.4 What kind of PSA?
Free Response 3.1.5 Draft your PSA
Free Response 3.1.6 Finalize your PSA!
4. The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
Connection 4.1.3 Securing the Cloud
Free Response 4.1.4 Encryption Reflection
Example 4.1.5 Encrypt/Decrypt
Example 4.1.6 Cryptogram Game!
4.2 History of Cryptography
Video 4.2.1 Cryptography: A Brief History
Check for Understanding 4.2.2 Cryptography History Quiz
Connection 4.2.3 How the Enigma Worked
Free Response 4.2.4 How the Enigma Worked
Connection 4.2.5 Unknown Languages and the Future of Cryptography
Free Response 4.2.6 The Future of Cybersecurity
4.3 Why Encrypt?
Video 4.3.1 Why encrypt?
Check for Understanding 4.3.2 Why encrypt?
4.4 Basic Crypto Systems: Caesar Cipher
Video 4.4.1 Caesar Cipher
Check for Understanding 4.4.2 Caesar Cipher
Example 4.4.3 Caesar Cipher Encryption
Example 4.4.4 Decrypt Caesar's Cipher!
Exercise 4.4.5 Decrypting Caesar
4.5 Basic Crypto Systems: Cracking Caesar
Video 4.5.1 Cracking Caesar Cipher
Check for Understanding 4.5.2 Cracking Caesar Cipher
Example 4.5.3 Cracking Caesar with Brute Force
Example 4.5.4 Letter Frequency and Caesar
Free Response 4.5.5 Examining Caesar Cipher
4.6 Basic Crypto Systems: Vigenere Cipher
Video 4.6.1 Vigenere Cipher
Check for Understanding 4.6.2 Vigenere Cipher
Example 4.6.3 Vigenere Cipher Example
Example 4.6.4 Letter Frequency and Vigenere Cipher
Free Response 4.6.5 Examining Vigenere Cipher
Example 4.6.6 Improving Vigenere
4.7 Advanced Cryptography
Video 4.7.1 Advanced Cryptography
Check for Understanding 4.7.2 Advanced Cryptography
Connection 4.7.3 Public Key Cryptography for Non-Geeks
Free Response 4.7.4 Examining Public Key Cryptography
Connection 4.7.5 Public Key Cryptography
Free Response 4.7.6 Public Key Cryptography
4.8 Hash Functions
Video 4.8.1 Hash Functions
Check for Understanding 4.8.2 Hash Functions
Connection 4.8.3 Google Shattered Crypto Algorithm
Free Response 4.8.4 Hash Functions in the News
Connection 4.8.5 Using a Hash Generator
Free Response 4.8.6 Hash Generator
4.9 Hash Function Development
Video 4.9.1 Hash Function Development
Check for Understanding 4.9.2 Hash Function Development
Example 4.9.3 Modulo Math Calculator
Example 4.9.4 Understanding Modulo Math
Example 4.9.5 Modulo Game!
Exercise 4.9.6 Develop a Simple Hash Function
4.10 The ABCs of Cryptography Quiz
Quiz 4.10.1 The ABCs of Cryptography Quiz
Badge 4.10.2 ABCs of Cryptography Badge
5. Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
Notes 5.1.1 Overview
Free Response 5.1.2 Preview Sample Newscasts
Notes 5.1.3 Investigate a Classic Cipher
Free Response 5.1.4 Write the Script and Rehearse
Free Response 5.1.5 Newscast Presentation
6. Software Security
6.1 Inside Web Apps
Video 6.1.1 Inside Web Apps
Check for Understanding 6.1.2 Inside Web Apps
Free Response 6.1.3 Using View Page Source
Connection 6.1.4 Getting Started with OWASP
Free Response 6.1.5 Getting Started with OWASP
Example 6.1.6 Recreate a Webpage?
6.2 Developer Tools
Video 6.2.1 Developer Tools
Check for Understanding 6.2.2 Developer Tools
Free Response 6.2.3 Using the Developer Tools
Connection 6.2.4 The Top Cybersecurity Blogs and Websites
Free Response 6.2.5 Selecting a Site to Follow
Exercise 6.2.6 Console Secrets
Example 6.2.7 Local Storage
6.3 Databases
Video 6.3.1 Databases
Check for Understanding 6.3.2 Databases
Connection 6.3.3 Database Administrator Career
Free Response 6.3.4 Database Administrator Career
Video 6.3.5 Parts of a Database
Check for Understanding 6.3.6 Parts of a Database
Connection 6.3.7 SQL Database Diagram
Free Response 6.3.8 SQL Database Diagram
Free Response 6.3.9 Schema Brainstorm
6.4 Clients and Servers
Video 6.4.1 Clients and Servers
Check for Understanding 6.4.2 Clients and Servers
Connection 6.4.3 Inside a Google Data Center
Free Response 6.4.4 Inside a Google Data Center
Connection 6.4.5 Cloud Vulnerabilities
Free Response 6.4.6 Cloud Vulnerabilities Response
Video 6.4.7 Client-Server Model
Check for Understanding 6.4.8 Client-Server Model
Connection 6.4.9 The Future of User Privacy
Free Response 6.4.10 The Future of User Privacy
6.5 What is SQL?
Notes 6.5.1 What is SQL Overview
Video 6.5.2 Intro to SQL
Check for Understanding 6.5.3 Quiz: What is SQL?
6.6 Structuring Data in SQL
Video 6.6.1 How to Structure Data in SQL
Check for Understanding 6.6.2 How to Structure Data in SQL
Example 6.6.3 SQL Tables
6.7 Basic Querying in SQL
Video 6.7.1 The SELECT Statement
Check for Understanding 6.7.2 Basic Querying in SQL
Example 6.7.3 Our First SELECT Statement
Exercise 6.7.4 Your First SELECT Statement
Video 6.7.5 More SELECT Statement
Check for Understanding 6.7.6 More SELECT Statement
Example 6.7.7 Selecting Specific Columns
Exercise 6.7.8 Harry Potter Names
6.8 Filtering Queries in SQL
Video 6.8.1 The WHERE Clause
Check for Understanding 6.8.2 Condition Operators
Example 6.8.3 Ravenclaw House
Example 6.8.4 People in Gryffindor
Example 6.8.5 Filter By ID
Exercise 6.8.6 The Weasleys
Exercise 6.8.7 The Potters
6.9 Common Security Problems
Video 6.9.1 Common Security Problems
Check for Understanding 6.9.2 Common Security Problems
Connection 6.9.3 Meet Security Engineers at Google
Free Response 6.9.4 Security Engineering Reflection
Video 6.9.5 Living in a Digital World
Free Response 6.9.6 Living in a Digital World
6.10 SQL Injection Overview
Video 6.10.1 SQL Injection Overview
Check for Understanding 6.10.2 SQL Injection Overview
Connection 6.10.3 Equifax Security Breach
Connection 6.10.4 Equifax Exposed Millions
Free Response 6.10.5 Equifax SQL Injection Attack
Example 6.10.6 SQLi
6.11 Types of SQLi and Prevention
Video 6.11.1 Types of SQLi
Check for Understanding 6.11.2 Types of SQLi
Video 6.11.3 Preventing SQLi
Check for Understanding 6.11.4 Preventing SQLi
Connection 6.11.5 Mitigating SQL Injection
Free Response 6.11.6 Reflection: Mitigating SQL Injection
Connection 6.11.7 SQL Injection
6.12 Cross-site Scripting
Video 6.12.1 Cross-site Scripting
Check for Understanding 6.12.2 Cross-site Scripting
Connection 6.12.3 XSS Bug in Yahoo Mail
Free Response 6.12.4 XSS Bug in Yahoo Mail
Notes 6.12.5 XSS Demo Overview
Connection 6.12.6 Google Application Security: XSS
Connection 6.12.7 Google's Tutorial for XSS
Free Response 6.12.8 XSS Reflection
6.13 Software Security Quiz
Quiz 6.13.1 Software Security Quiz
Badge 6.13.2 Software Security Badge
7. Networking Fundamentals
7.1 Introduction to the Internet
Video 7.1.1 Welcome to the Internet
Check for Understanding 7.1.2 Intro to the Internet
Connection 7.1.3 Inside Facebook's Connectivity Lab
Free Response 7.1.4 Connectivity Lab Reflection
7.2 Internet Hardware and Sending Information
Video 7.2.1 Internet Hardware
Check for Understanding 7.2.2 Internet Hardware
Video 7.2.3 Sending Information
Check for Understanding 7.2.4 Sending Information
Connection 7.2.5 The Internet is in the Ocean
Free Response 7.2.6 Internet in the Ocean Reflection
7.3 Internet Addresses
Video 7.3.1 Internet Addresses
Check for Understanding 7.3.2 Internet Addresses
Free Response 7.3.3 The Need for Addresses
Connection 7.3.4 IPv4 vs. IPv6
Connection 7.3.5 The Long Transition to IPv6
Free Response 7.3.6 Reflection: IPv4 vs IPv6
7.4 Domain Name System (DNS)
Video 7.4.1 Domain Name System (DNS)
Check for Understanding 7.4.2 Domain Name System
Connection 7.4.3 How Does DNS Work?
Free Response 7.4.4 How Does DNS Work?
7.5 Routing
Video 7.5.1 Routing
Check for Understanding 7.5.2 Routing
Traceroute 7.5.3 Route Tracing
Free Response 7.5.4 Redundancy
7.6 Packets & Protocols
Video 7.6.1 Packets
Check for Understanding 7.6.2 Packets
Video 7.6.3 Protocols
Check for Understanding 7.6.4 Protocols
Resource 7.6.5 Passing Notes
Connection 7.6.6 How the Internet Works
Free Response 7.6.7 The Journey of an Image
7.7 Viewing a Webpage
Video 7.7.1 Viewing a Webpage
Check for Understanding 7.7.2 Viewing a Webpage
Free Response 7.7.3 Explaining a URL
Connection 7.7.4 Net Neutrality Explained
Connection 7.7.5 FCCs Net Neutrality Rules Officially Repealed
Free Response 7.7.6 Take a Side on Net Neutrality
Connection 7.7.7 Net Neutrality and Cybersecurity
Free Response 7.7.8 Net Neutrality and Cybersecurity Research
7.8 Impact of the Internet
Video 7.8.1 Impact of the Internet
Check for Understanding 7.8.2 Impact of the Internet
Connection 7.8.3 What is the Digital Divide?
Free Response 7.8.4 What is the Digital Divide?
7.9 Network Attacks
Video 7.9.1 Network Attacks Overview
Free Response 7.9.2 Network Attacks
Video 7.9.3 Common Network Attacks
Check for Understanding 7.9.4 Network Attacks
Connection 7.9.5 Social Engineering Hack
Free Response 7.9.6 Social Engineering Reflection
Connection 7.9.7 DDoS Attacks
Free Response 7.9.8 DDoS Reflection
Example 7.9.9 DDoS Simulation
Video 7.9.10 SUPPLEMENTARY: Other Network Attacks
7.10 Securing a Network
Video 7.10.1 Access Control
Check for Understanding 7.10.2 Access Control
Connection 7.10.3 RADIUS Overview with AAA Protocol
Connection 7.10.4 RADIUS Server Access Control
Free Response 7.10.5 RADIUS Reflection
Video 7.10.6 Detecting Intrusions to Secure a Network
Quiz 7.10.7 Securing a Network
Connection 7.10.8 How to Secure your IT Network
Free Response 7.10.9 Secure your IT Network Basics
Connection 7.10.10 Network Administrator Career
Free Response 7.10.11 Network Administrator Career
Example 7.10.12 Multifactor Authentication
Example 7.10.13 Two Factor Authentication
Example 7.10.14 Authorization
Example 7.10.15 Setting up a Firewall
7.11 Networking Fundamentals Quiz
Quiz 7.11.1 Networking Fundamentals Quiz
Badge 7.11.2 Networking Fundamentals Badge
8. Final Course Project
8.1 Final Course Project
Notes 8.1.1 Choose Your Own Adventure
Free Response 8.1.2 Choose Your Adventure
Free Response 8.1.3 Research
Free Response 8.1.4 Choose Your Target Audience
Free Response 8.1.5 Draft Your Presentation
Free Response 8.1.6 Draft Your Flyer
Free Response 8.1.7 Make Your Presentation with Handout!
9. Final Exam
9.1 Final Exam
Quiz 9.1.1 Final Exam