Please enable JavaScript to use CodeHS

NCyTE Cybersecurity Concept Lessons (JavaScript)

NCyTE Cybersecurity Concept Lessons (JavaScript)

Lessons

  1. Caesar Cipher

    1. 1.1 Caesar Ciphers

    2. Description
    3. Objective
    4. 1.2 Decrypting and Breaking Caesar Ciphers

    5. Description
    6. Objective
  2. The CIA Triad

    1. 2.1 Introduction to Cybersecurity

    2. Description
    3. Objective
    4. 2.2 CIA Triad

    5. Description
    6. Objective
  3. CyberEthics

    1. 3.1 CyberEthics

    2. Description
    3. Objective
  4. Data Structures

    1. 4.1 Introduction to Lists

    2. Description
    3. Objective
    4. 4.2 Traversing a List

    5. Description
    6. Objective
    7. 4.3 Applying Iteration: Usernames and Passwords

    8. Description
    9. Objective
  5. Identity, Authentication and Authorization

    1. 5.1 Identity Crisis

    2. Description
    3. Objective
    4. 5.2 Let Me In

    5. Description
    6. Objective
  6. Input Validation & Conditionals

    1. 6.1 Applying Conditionals - Password Validation

    2. Description
    3. Objective
    4. 6.2 Password Protection

    5. Description
    6. Objective
  7. Iterative Process

    1. 7.1 Iterative Process

    2. Description
    3. Objective
  8. Secure Networking

    1. 8.1 Introduction to Networking

    2. Description
    3. Objective
    4. 8.2 OSI model activity

    5. Description
    6. Objective
    7. 8.3 Network Attacks

    8. Description
    9. Objective
  9. Personal Data Vulnerabilities

    1. 9.1 Unintentional Data Sharing

    2. Description
    3. Objective
    4. 9.2 Metadata and Data Collection

    5. Description
    6. Objective
  10. Risk

    1. 10.1 Basic Cybersecurity Risk Concepts

    2. Description
    3. Objective
    4. 10.2 Cybersecurity Risk Model-Assessing Risk

    5. Description
    6. Objective
    7. 10.3 Cybersecurity Risk Model-Vulnerabilities

    8. Description
    9. Objective
    10. 10.4 Cybersecurity Risk Model-Security Controls

    11. Description
    12. Objective
  11. Steganography

    1. 11.1 Introduction to Steganography

    2. Description
    3. Objective
    4. 11.2 Ethics of Steganography

    5. Description
    6. Objective
    7. 11.3 Steganography Exploration

    8. Description
    9. Objective
  12. Symmetric and Public Key Encryption

    1. 12.1 Symmetric and Public Key Encryption

    2. Description
    3. Objective
  13. Vigenère Cipher

    1. 13.1 Vigenère Cipher

    2. Description
    3. Objective