Please enable JavaScript to use CodeHS

Points

Activity Points
What is Cybersecurity?
1.1 Welcome to Cybersecurity Fundamentals
1.1.1 Course Introduction 1
1.1.2 Course Goals 5
1.2 Module Overview - Cybersecurity
1.2.1 Welcome to Cybersecurity 1
1.2.2 Welcome to Cybersecurity 5
1.2.3 Intruder Alert! 1
1.2.4 Cybersecurity and You 5
1.2.5 Course Goals 5
1.3 What is Cybersecurity?
1.3.1 What is Cybersecurity? 1
1.3.2 What is Cybersecurity? 5
1.3.3 WannaCry Ransomware Attack 1
1.3.4 WannaCry Reflection 5
1.3.5 Ransomware Simulator 1
1.3.6 Internet of Things 1
1.3.7 Cybersecurity and Connected Cars 1
1.3.8 Internet of Things Reflection 5
1.4 Impact of Cybersecurity
1.4.1 Impact of Cybersecurity 1
1.4.2 Impact of Cybersecurity 5
1.4.3 Phishing Simulator 1
1.4.4 Yahoo! Attack 1
1.4.5 Yahoo! Reflection 5
1.4.6 Cyberterrorism 1
1.4.7 Cyberterrorism Response 5
1.4.8 Fighting Cyber Crime 1
1.4.9 Cyber Crime Reflection 5
1.5 The CIA Triad
1.5.1 CIA Triad 1
1.5.2 CIA Triad 5
1.5.3 Which part of the CIA Triad? 5
1.5.4 Which part of the CIA Triad? 5
1.5.5 Breach of Confidentiality 5
1.5.6 Breach of Availability 5
1.5.7 CIA Connections 5
1.6 What is Cybersecurity? Quiz
1.6.1 What is Cybersecurity? Quiz 15
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
2.1.1 Digital Footprint and Reputation 1
2.1.2 Digital Footprint and Reputation 5
2.1.3 Social Media Clean-up 1
2.1.4 Building a Positive Digital Footprint 5
2.1.5 Right to be Forgotten? 1
2.1.6 Right to be Forgotten 5
2.1.7 What is your Digital Footprint? 5
2.2 Cyberbullying
2.2.1 Cyberbullying 1
2.2.2 Cyberbullying 5
2.2.3 Scenario: Student Ranking 5
2.2.4 Scenario: Singled Out 5
2.2.5 Stopping Cyberbullying 5
2.3 Internet Safety
2.3.1 Internet Safety 1
2.3.2 Internet Safety 5
2.3.3 Scenario: School Stranger 5
2.3.4 Scenario: Vacation Pals 5
2.3.5 Staying Safe 5
2.4 Privacy & Security
2.4.1 What is Data Privacy & Security? 1
2.4.2 Privacy & Security Quiz 5
2.4.3 Google Privacy Policy Search 1
2.4.4 Google Privacy Policy Search 5
2.4.5 Guess: Password List 1
2.4.6 Guess: Using an Algorithm 1
2.4.7 Guess: Brute Force 1
2.4.8 How Strong is your Password? 1
2.4.9 How Strong is your password? 5
2.4.10 You Can Be Tracked! 1
2.5 Information Literacy
2.5.1 Information Literacy 1
2.5.2 Information Literacy 5
2.5.3 Effective Internet Searches 5
2.5.4 Evaluate the Source 1 1
2.5.5 Respond: Evaluate the Source 1 5
2.5.6 Evaluate the Source 2 1
2.5.7 Respond: Evaluate the Source 2 5
2.5.8 Hero Pig? 1
2.5.9 Respond: Hero Pig? 5
2.6 Creative Credit & Copyright
2.6.1 Creative Credit and Copyright 1
2.6.2 Creative Credit and Copyright 5
2.6.3 Cite! 5
2.6.4 Exploring Creative Commons 1
2.6.5 Respond: Creative Commons 5
2.6.6 Task: Finding Images 5
2.6.7 Reflection: Why is Copyright Important? 5
2.7 Hacking Ethics
2.7.1 Hacking Ethics & Legality 1
2.7.2 Hacking Ethics & Legality 5
2.7.3 Penetration Testing 1
2.7.4 Reflection: Penetration Testing 5
2.7.5 Hack the Pentagon? 1
2.7.6 Reflection: Hack the Pentagon 5
2.7.7 Ethical Hacker Agreement 1
2.8 Digital Citizenship and Cyber Hygiene Quiz
2.8.1 Digital Citizenship and Cyber Hygiene Quiz 20
Project: Public Service Announcement
3.1 Project: Public Service Announcement
3.1.1 Pick a Topic 5
3.1.2 Research 5
3.1.3 Choose Your Audience 5
3.1.4 What kind of PSA? 5
3.1.5 Draft your PSA 5
3.1.6 Finalize your PSA! 15
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
4.1.1 Cryptography, Cryptology, Cryptanalysis 1
4.1.2 Cryptography, Cryptology, Cryptanalysis 5
4.1.3 Cryptogram Game! 1
4.1.4 Why encrypt? 1
4.1.5 Why encrypt? 5
4.1.6 Encrypt/Decrypt 1
4.2 History of Cryptography
4.2.1 Cryptography: A Brief History 1
4.2.2 Cryptography History Quiz 5
4.2.3 How the Enigma Worked 1
4.2.4 How the Enigma Worked 5
4.2.5 Unknown Languages and the Future of Cryptography 1
4.2.6 The Future of Cybersecurity 5
4.3 Basic Crypto Systems: Caesar Cipher
4.3.1 Caesar Cipher 1
4.3.2 Caesar Cipher 5
4.3.3 Caesar Cipher Encryption 1
4.3.4 Decrypt Caesar's Cipher! 1
4.4 Basic Crypto Systems: Cracking Caesar
4.4.1 Cracking Caesar Cipher 1
4.4.2 Cracking Caesar Cipher 5
4.4.3 Cracking Caesar with Brute Force 1
4.4.4 Letter Frequency and Caesar 1
4.4.5 Examining Caesar Cipher 5
4.5 Basic Crypto Systems: Vigenere Cipher
4.5.1 Vigenere Cipher 1
4.5.2 Vigenere Cipher 5
4.5.3 Vigenere Cipher Example 1
4.5.4 Letter Frequency and Vigenere Cipher 1
4.5.5 Examining Vigenere Cipher 5
4.5.6 Improving Vigenere 1
4.6 The ABCs of Cryptography Quiz
4.6.1 The ABCs of Cryptography Quiz 15
Advanced Cryptography
5.1 Welcome to Advanced Cybersecurity!
5.1.1 Course Introduction 1
5.1.2 Cybersecurity 101 1
5.1.3 Cyber Heat Map 5
5.1.4 Career Pathways 5
5.1.5 Starting with Cryptography 1
5.1.6 Course Goals 5
5.2 Encryption Algorithms
5.2.1 Ciphers 1
5.2.2 Ciphers Quiz 2
5.2.3 Enhanced Caesar Cipher 5
5.2.4 Mixed Alphabet Cipher 5
5.2.5 Pigpen Encoder 1
5.2.6 Pigpen Cipher 5
5.2.7 Rail Fence Cipher 5
5.2.8 Encryption Standards 1
5.2.9 Encryption Standards Quiz 5
5.3 Advanced Cryptography
5.3.1 Advanced Cryptography 1
5.3.2 Advanced Cryptography 5
5.3.3 Public Key Cryptography for Non-Geeks 1
5.3.4 Examining Public Key Cryptography 5
5.3.5 Public Key Cryptography 1
5.3.6 Public Key Cryptography 5
5.4 Hash Functions
5.4.1 Hash Functions 1
5.4.2 Hash Functions 5
5.4.3 Google Shattered Crypto Algorithm 1
5.4.4 Hash Functions in the News 5
5.4.5 Using a Hash Generator 1
5.4.6 Hash Generator 5
5.4.7 Password Salting 1
5.4.8 Password Salting 5
5.5 Hash Function Development
5.5.1 Hash Function Development 1
5.5.2 Hash Function Development 5
5.5.3 Modulo Math Calculator 1
5.5.4 Understanding Modulo Math 1
5.5.5 Modulo Game! 1
5.5.6 Develop a Simple Hash Function 5
5.6 Asymmetric Encryption
5.6.1 Asymmetric Encryption 1
5.6.2 Asymmetric Encryption Quiz 5
5.6.3 Diffie-Hellman Key Exchange 1
5.6.4 Affine Cipher 5
5.6.5 Trapdoor Functions 5
5.6.6 RSA 1
5.6.7 RSA Reflection 5
5.7 Digital Certificates
5.7.1 Digital Certificates 1
5.7.2 Digital Certificates 5
5.7.3 SSL Explained 1
5.7.4 SSL Explained 5
5.7.5 SSL Connection 5
5.7.6 In The News 1
5.7.7 In The News Response 5
5.7.8 Become a Certificate Authority! 10
5.8 Advanced Cryptography Quiz
5.8.1 Advanced Cryptography Quiz 20
Project: Steganography
6.1 Project: Steganography
6.1.1 Project Opener 1
6.1.2 Government Surveillance and Reality Winner 1
6.1.3 Government Surveillance and Reality Winner 5
6.1.4 Data Hiding and Extraction 1
6.1.5 Reflect: Data Hiding and Extraction 5
6.1.6 Hide Text 1
6.1.7 Hidden Message 1
6.1.8 Your turn: Encryption Algorithm 5
6.1.9 Your turn: Image Creation 10
6.1.10 Final Algorithm and Partner Decode 5
6.1.11 Final Reflection 5
System Administration
7.1 Operating Systems
7.1.1 Operating Systems 1
7.1.2 Operating Systems Quiz 5
7.1.3 Detect My OS 1
7.1.4 Windows OS Installation Simulation 1
7.1.5 Installing an OS 5
7.1.6 Upgrading a Mac OS 1
7.2 Comparing Operating Systems
7.2.1 Comparing Operating Systems 1
7.2.2 Comparing Operating Systems Quiz 5
7.2.3 Windows Simulation 1
7.2.4 MacOS Simulation 1
7.2.5 Choose a Linux Distro! 1
7.2.6 Which would you choose? 5
7.3 Compatibility
7.3.1 Compatibility 1
7.3.2 Compatibility Quiz 5
7.3.3 What Processor? Windows 1
7.3.4 What Processor? Mac 1
7.3.5 What Processor are you running? 5
7.4 Software and Applications
7.4.1 Software and Applications 1
7.4.2 Software and Applications Quiz 5
7.4.3 Spreadsheet Simulation 1
7.4.4 Messaging Simulation 1
7.4.5 Kanban Board Simulation 1
7.4.6 Software Simulations 5
7.5 Software Licenses
7.5.1 Software Licenses 1
7.5.2 Software Licenses Quiz 5
7.5.3 Do I need a Software License? 5
7.5.4 Is This Original? 5
7.6 Application Security
7.6.1 Application Security 1
7.6.2 Application Security 5
7.6.3 Windows Updates 1
7.6.4 Windows Defender Antivirus 1
7.6.5 Windows Defender Antivirus 5
7.6.6 CodeHS System Restore 5
7.7 Browser Configuration
7.7.1 Browser Configuration 1
7.7.2 Browser Configuration 5
7.7.3 Cached CodeHS 1
7.7.4 Cached CodeHS 5
7.7.5 Is Your Popup Blocker On? 1
7.7.6 Browser Extensions Lab 5
7.8 System Administration
7.8.1 User Accounts 1
7.8.2 User Accounts Quiz 2
7.8.3 User Accounts 5
7.8.4 Shared Folders and Files 5
7.8.5 Host Security 1
7.8.6 Host Security Quiz 3
7.8.7 Security Baseline 5
7.9 Access Control
7.9.1 Access Control 1
7.9.2 Access Control 5
7.9.3 Multifactor Authentication 1
7.9.4 Two Factor Authentication 1
7.9.5 Two Factor Authentication Reflection 5
7.9.6 RADIUS Overview with AAA Protocol 1
7.9.7 RADIUS Server Access Control 1
7.9.8 RADIUS Reflection 5
7.10 Command Line Interface
7.10.1 Linux/MacOS vs. Windows 1
7.10.2 Command Line Interface 1
7.10.3 Command Line Interface Quiz 5
7.10.4 Command Equivalents 1
7.10.5 Windows Command Prompt 1
7.10.6 Windows Command Prompt 5
7.10.7 Directory Directions 5
7.10.8 Neural Interface? 1
7.10.9 Neural Interface? 5
7.11 System Administration Quiz
7.11.1 Mindsets 1
7.11.2 System Administration Quiz 20
Cyber Defense
8.1 Network Attacks
8.1.1 Network Attacks Overview 1
8.1.2 Network Attacks Quiz 5
8.1.3 Check for Vulnerabilities 1
8.1.4 Bug Bounty Hunting 1
8.1.5 Bug Bounty Hunting 5
8.1.6 Common Port Targets 1
8.1.7 Port Scanner Simulation 1
8.1.8 Open Port Reflection 5
8.2 Malware Types and Prevention
8.2.1 Malware Types and Prevention 1
8.2.2 Malware Types and Prevention 5
8.2.3 How Anti-malware Works 1
8.2.4 How Anti-malware Works 5
8.2.5 OS Malware Security 5
8.2.6 Reverse Engineering Malware 5
8.3 What is SQL?
8.3.1 What is SQL Overview 1
8.3.2 Intro to SQL 1
8.3.3 Quiz: What is SQL? 1
8.3.4 How to Structure Data in SQL 1
8.3.5 How to Structure Data in SQL 3
8.3.6 SQL Tables 1
8.3.7 SQL Tables Response 5
8.4 Basic Querying in SQL
8.4.1 The SELECT Statement 1
8.4.2 Basic Querying in SQL 1
8.4.3 Our First SELECT Statement 1
8.4.4 Your First SELECT Statement 5
8.4.5 More SELECT Statement 1
8.4.6 More SELECT Statement 1
8.4.7 Selecting Specific Columns 1
8.4.8 Harry Potter Names 5
8.5 Filtering Queries in SQL
8.5.1 The WHERE Clause 1
8.5.2 Condition Operators 5
8.5.3 Ravenclaw House 1
8.5.4 People in Gryffindor 1
8.5.5 Filter By ID 1
8.5.6 The Weasleys 5
8.5.7 The Potters 5
8.6 Common Security Problems
8.6.1 Common Security Problems 1
8.6.2 Common Security Problems 5
8.6.3 Meet Security Engineers at Google 1
8.6.4 Security Engineering Reflection 5
8.6.5 Living in a Digital World 1
8.6.6 Living in a Digital World 5
8.7 SQL Injection Overview
8.7.1 SQL Injection Overview 1
8.7.2 SQL Injection Overview 5
8.7.3 Equifax Security Breach 1
8.7.4 Equifax Exposed Millions 1
8.7.5 Equifax SQL Injection Attack 5
8.7.6 SQLi 1
8.8 Types of SQLi and Prevention
8.8.1 Types of SQLi 1
8.8.2 Types of SQLi 3
8.8.3 Preventing SQLi 1
8.8.4 Preventing SQLi 2
8.8.5 Mitigating SQL Injection 1
8.8.6 Reflection: Mitigating SQL Injection 5
8.8.7 SQL Injection 1
8.9 Software Security Quiz
8.9.1 Software Security Quiz 15
Project: Security Assessment Report
9.1 Project: Security Assessment Report
9.1.1 Project Requirements 1
9.1.2 Supercar Showdown Website 1
9.1.3 SQL Injection Testing 5
9.1.4 SQLi Testing Handout 1
9.1.5 Security Assessment Report 15
9.1.6 Project Reflection 5
Networking Fundamentals
10.1 Introduction to the Internet
10.1.1 Welcome to the Internet 1
10.1.2 Intro to the Internet 5
10.1.3 Inside Facebook's Connectivity Lab 1
10.1.4 Connectivity Lab Reflection 5
10.2 Notational Systems
10.2.1 Number Systems 1
10.2.2 Number Systems Quiz 2
10.2.3 Number Base Tool 1
10.2.4 Decimal to Binary 1
10.2.5 Decimal to Binary Quiz 3
10.2.6 Binary Game 5
10.3 Data Representation
10.3.1 Hexadecimal 1
10.3.2 Hexadecimal Quiz 2
10.3.3 Binary to Hex Game 5
10.3.4 Encoding Text with Binary 1
10.3.5 Encoding Text with Binary Quiz 2
10.3.6 Custom Encoding 1
10.3.7 Bits to ASCII 1
10.3.8 Hello World in Bits 5
10.4 Internet Hardware and Sending Information
10.4.1 Internet Hardware 1
10.4.2 Internet Hardware 2
10.4.3 Sending Information 1
10.4.4 Sending Information 3
10.4.5 The Internet is in the Ocean 1
10.4.6 Internet in the Ocean Reflection 5
10.5 Internet Addresses
10.5.1 Internet Addresses 1
10.5.2 Internet Addresses 5
10.5.3 The Need for Addresses 5
10.5.4 IPv4 vs. IPv6 1
10.5.5 Reflection: IPv4 vs IPv6 5
10.6 Domain Name System (DNS)
10.6.1 Domain Name System (DNS) 1
10.6.2 Domain Name System 5
10.6.3 How Does DNS Work? 1
10.6.4 How Does DNS Work? 5
10.7 Routing
10.7.1 Routing 1
10.7.2 Routing 5
10.7.3 Redundancy 5
10.8 Packets & Protocols
10.8.1 Packets 1
10.8.2 Packets 2
10.8.3 Protocols 1
10.8.4 Protocols 3
10.8.5 How the Internet Works 1
10.8.6 The Journey of an Image 5
10.9 Viewing a Webpage
10.9.1 Viewing a Webpage 1
10.9.2 Viewing a Webpage 5
10.9.3 Explaining a URL 5
10.9.4 Net Neutrality Explained 1
10.9.5 FCCs Net Neutrality Rules Officially Repealed 1
10.9.6 Take a Side on Net Neutrality 5
10.9.7 Net Neutrality and Cybersecurity 1
10.9.8 Net Neutrality and Cybersecurity Research 5
10.10 Impact of the Internet
10.10.1 Impact of the Internet 1
10.10.2 Impact of the Internet 5
10.10.3 What is the Digital Divide? 1
10.10.4 What is the Digital Divide? 5
10.11 Networking Fundamentals Quiz
10.11.1 Mindsets 1
10.11.2 Networking Fundamentals Quiz 15
IT Infrastructure
11.1 Internal Components
11.1.1 Internal Components 1
11.1.2 Internal Components 5
11.1.3 Build a Computer 1
11.1.4 Build a Computer 5
11.1.5 Test Your Brain's RAM! 1
11.1.6 Test Your Brain's RAM! 5
11.2 Peripheral Devices
11.2.1 Peripheral Devices 1
11.2.2 Peripheral Devices 5
11.2.3 Personalized Peripherals 5
11.2.4 IT Help 5
11.2.5 Your Ideal Computer Setup 5
11.3 Network Devices
11.3.1 Network Devices 1
11.3.2 Network Devices 5
11.3.3 Speed Test 1
11.3.4 Speed Test 5
11.3.5 Fiber Optics Bend Light! 1
11.3.6 Fiber Optics Bend Light! 5
11.3.7 Ethernet Standards 1
11.3.8 Ethernet Standards 5
11.3.9 Network Troubleshooting 5
11.4 Storage Options
11.4.1 Storage Options 1
11.4.2 Storage Options Quiz 5
11.4.3 Security of Cloud Storage 1
11.4.4 Security of Cloud Storage 5
11.4.5 Storage Suggestions 5
11.5 Network Options
11.5.1 Network Options 1
11.5.2 Network Options Quiz 5
11.5.3 What is an SSID? 1
11.5.4 What is an SSID? 5
11.5.5 Wireless Network Setup 5
11.6 Network Communication
11.6.1 Network Communication 1
11.6.2 Network Communication Quiz 5
11.6.3 Setting up a Firewall 1
11.6.4 iptables 5
11.6.5 iptables simulation 1
11.6.6 What is Virtualization? 1
11.6.7 Virtualization Response 5
11.7 Network Management
11.7.1 Linux/MacOS vs. Windows 1
11.7.2 Network Management 1
11.7.3 Network Management Quiz 5
11.7.4 MacOS Terminal Simulation 1
11.7.5 Windows Command Prompt Simulation 1
11.7.6 Windows Command Prompt Spy 5
11.7.7 Windows Command Prompt Spy 5
11.7.8 SSH Logs 1
11.7.9 SSH Logs 1
11.7.10 Reading Logs 5
11.8 Private Networks
11.8.1 IP and MAC Addresses 1
11.8.2 IP and MAC Addresses Quiz 2
11.8.3 Intranet Permissions 1
11.8.4 Coffee Shop: Design an Intranet 5
11.8.5 DMZs and VPNs 1
11.8.6 DMZs and VPNs Quiz 3
11.8.7 Protecting Privacy with VPNs 1
11.8.8 Protecting Privacy with VPNs 5
11.8.9 Coffee Shop: Network Plan 5
11.8.10 Coffee Shop: Network Diagram 5
11.8.11 SOHO Network 1
11.8.12 Network Topologies 1
11.9 IT Infrastructure Quiz
11.9.1 IT Infrastructure Quiz 20
Project: Troubleshooting
12.1 Methodology
12.1.1 Troubleshooting Methodology 1
12.1.2 Identify the Problem 5
12.1.3 Research Solutions 5
12.1.4 Establish a Theory 5
12.1.5 Test the Theory 5
12.1.6 Fix the Problem! 5
12.2 Support Practice
12.2.1 Signal Strength 10
12.2.2 Interference 10
Risk Management
13.1 Identifying Risks
13.1.1 Identifying Risks 1
13.1.2 Identifying Risks Quiz 5
13.1.3 What is a Honeypot? 1
13.1.4 Honeypot Attacks 1
13.1.5 Honeypot Attacks 5
13.1.6 Whois 1
13.1.7 Whois 5
13.1.8 Packet Sniffing 1
13.1.9 Packet Sniffing Response 5
13.1.10 Breach Trends 5
13.2 Assessing Risks
13.2.1 Assessing Risks 1
13.2.2 Malware Risk Assessment 5
13.2.3 Poor Password Assessment 5
13.2.4 Social Engineering Assessment 5
13.2.5 Assessing Risks 1
13.2.6 Assessing Risks Quiz 5
13.2.7 End-of-Life OS 1
13.2.8 End-of-Life Proposal 5
13.2.9 Input Handling 1
13.2.10 Input Handling Responses 5
13.2.11 Input Validation 1
13.2.12 Input Validation Responses 5
13.3 Risk Response
13.3.1 Risk Response 1
13.3.2 Risk Response 5
13.3.3 Defense in Depth Risk Mitigation 5
13.3.4 Sample Risk Assessment Report 5
13.3.5 Sample Risk Assessment Reflection 5
13.3.6 Delta Outage Video 5
13.3.7 Delta Outage Reflection 5
13.3.8 What Happens When Your Servers Go Down 5
13.3.9 What Happens When Your Servers Go Down Reflection 5
13.3.10 Server Upgrade Memo 5
13.4 Penetration Testing
13.4.1 Penetration Testing 1
13.4.2 Penetration Testing 5
13.4.3 Penetration Test Report 5
13.4.4 Penetration Test Report 5
13.4.5 Chaos Engineering 5
13.4.6 Chaos Engineering Reflection 5
13.4.7 Pen Test Simulation Handout 5
13.4.8 Pen Test Simulation: Active Recon 5
13.4.9 Pen Test Simulation: Exploit Vulnerabilities 5
13.5 Risk Management Quiz
13.5.1 Risk Management Quiz 20
Final Exam
14.1 Final Exam
14.1.1 Final Exam 25
What's Next?
15.1 After Fundamentals of Cybersecurity
15.1.1 Cybersecurity Pathways 1
15.1.2 CodeHS Advanced Cybersecurity 1
15.1.3 College Pathway 1
15.1.4 Certification Pathway 1
15.1.5 Career Spotlight 1
15.1.6 My Pathway 5
Programming Fundamentals
16.1 Programming Concepts
16.1.1 Programming Concepts 1
16.1.2 Programming Concepts Quiz 5
16.1.3 Compilers vs. Interpreters 1
16.1.4 Compilers vs. Interpreters 5
16.1.5 Variables in Action 1
16.1.6 Data Types using Typeof 1
16.1.7 Basic Variables 1
16.1.8 Daily Activities 5
16.2 Programming with Karel
16.2.1 Learning to Program 1
16.2.2 Programming With Karel 1
16.2.3 Quiz: Karel Commands 5
16.2.4 Our First Karel Program 1
16.2.5 Your First Karel Program 5
16.2.6 Functions in Karel 1
16.2.7 Functions in Karel Quiz 5
16.2.8 Turn Around 1
16.2.9 Digging Karel 1
16.2.10 Backflip 5
16.3 Looping
16.3.1 For Loops 1
16.3.2 For Loops Quiz 5
16.3.3 Take 'em All 1
16.3.4 For Loop Square 1
16.3.5 Lots of Hurdles 5
16.3.6 While Loops in Karel 1
16.3.7 While Loops in Karel Quiz 5
16.3.8 Move to Wall 1
16.3.9 Big Tower 1
16.3.10 Follow The Yellow Ball Road 5
16.4 Branching
16.4.1 If/Else Statements 1
16.4.2 If/Else Statements Quiz 5
16.4.3 If/Else Statements 1
16.4.4 One Ball in Each Spot 1
16.4.5 Right Side Up 5
16.4.6 Programming with Karel Badge 5
16.5 Arrays and Objects
16.5.1 More JS Topics 1
16.5.2 Arrays and Objects 1
16.5.3 Arrays and Objects 5
16.5.4 Making an Array 1
16.5.5 List of Places to Travel 5
16.5.6 List of Prime Numbers 5
16.5.7 Phonebook 1
16.5.8 Sidekicks 5
16.6 Organizational Techniques
16.6.1 Organizational Techniques 1
16.6.2 Organizational Techniques Quiz 5
16.6.3 Hurdle Karel 1
16.6.4 One Ball in Each Spot 5
16.6.5 The Two Towers 5
16.6.6 Interactive Sequence Diagram 1
16.7 Programming Fundamentals Quiz
16.7.1 Mindsets 1
16.7.2 Programming Fundamentals Quiz 15
Software Security
17.1 Inside Web Apps
17.1.1 Inside Web Apps 1
17.1.2 Inside Web Apps 5
17.1.3 Using View Page Source 5
17.1.4 Recreate a Webpage? 1
17.1.5 Getting Started with OWASP 1
17.1.6 Getting Started with OWASP 5
17.2 Developer Tools
17.2.1 Developer Tools 1
17.2.2 Developer Tools 5
17.2.3 Using the Developer Tools 5
17.2.4 Console Secrets 5
17.2.5 Local Storage 1
17.2.6 The Top Cybersecurity Blogs and Websites 1
17.2.7 Selecting a Site to Follow 5
17.3 The Value of Data
17.3.1 The Value of Data 1
17.3.2 The Value of Data Quiz 5
17.3.3 Exploring Data Visualizations 1
17.3.4 US Recorded Music Revenue 1
17.3.5 National Parks 1
17.3.6 March Madness 1
17.3.7 Captain Marvel 1
17.3.8 Respond: Visualizations 5
17.3.9 Free Response: Choosing a Visualization 5
17.3.10 Reflection: Design a Survey 5
17.4 Databases
17.4.1 Databases 1
17.4.2 Databases 1
17.4.3 Database Administrator Career 1
17.4.4 Database Administrator Career 5
17.4.5 Parts of a Database 1
17.4.6 Parts of a Database 1
17.4.7 SQL Database Diagram 1
17.4.8 SQL Database Diagram 5
17.4.9 Schema Brainstorm 5
17.5 Clients and Servers
17.5.1 Clients and Servers 1
17.5.2 Clients and Servers 2
17.5.3 Inside a Google Data Center 1
17.5.4 Inside a Google Data Center 5
17.5.5 Cloud Vulnerabilities 1
17.5.6 Cloud Vulnerabilities Response 5
17.5.7 Client-Server Model 1
17.5.8 Client-Server Model 2
17.5.9 The Future of User Privacy 1
17.5.10 The Future of User Privacy 5
17.6 What is SQL?
17.6.1 What is SQL Overview 1
17.6.2 Intro to SQL 1
17.6.3 Quiz: What is SQL? 1
17.6.4 How to Structure Data in SQL 1
17.6.5 How to Structure Data in SQL 3
17.6.6 SQL Tables 1
17.6.7 SQL Tables Response 5
17.7 Basic Querying in SQL
17.7.1 The SELECT Statement 1
17.7.2 Basic Querying in SQL 1
17.7.3 Our First SELECT Statement 1
17.7.4 Your First SELECT Statement 5
17.7.5 More SELECT Statement 1
17.7.6 More SELECT Statement 1
17.7.7 Selecting Specific Columns 1
17.7.8 Harry Potter Names 5
17.8 Filtering Queries in SQL
17.8.1 The WHERE Clause 1
17.8.2 Condition Operators 5
17.8.3 Ravenclaw House 1
17.8.4 People in Gryffindor 1
17.8.5 Filter By ID 1
17.8.6 The Weasleys 5
17.8.7 The Potters 5
17.9 Common Security Problems
17.9.1 Common Security Problems 1
17.9.2 Common Security Problems 5
17.9.3 Meet Security Engineers at Google 1
17.9.4 Security Engineering Reflection 5
17.9.5 Living in a Digital World 1
17.9.6 Living in a Digital World 5
17.10 SQL Injection Overview
17.10.1 SQL Injection Overview 1
17.10.2 SQL Injection Overview 5
17.10.3 Equifax Security Breach 1
17.10.4 Equifax Exposed Millions 1
17.10.5 Equifax SQL Injection Attack 5
17.10.6 SQLi 1
17.11 Types of SQLi and Prevention
17.11.1 Types of SQLi 1
17.11.2 Types of SQLi 3
17.11.3 Preventing SQLi 1
17.11.4 Preventing SQLi 2
17.11.5 Mitigating SQL Injection 1
17.11.6 Reflection: Mitigating SQL Injection 5
17.11.7 SQL Injection 1
17.12 Software Security Quiz
17.12.1 Software Security Quiz 15
Advanced Networking
18.1 Network Administrator
18.1.1 Advanced Devices 1
18.1.2 Advanced Devices Quiz 5
18.1.3 Network Administrator Career 1
18.1.4 Network Administrator Career 5
18.1.5 Choosing the Best Devices 5
18.1.6 Network Diagram 5
18.2 Environmental Controls
18.2.1 Environmental Controls 1
18.2.2 Environmental Controls Quiz 5
18.2.3 Infographic 1
18.2.4 Infographic FR 5
18.2.5 Your Security Systems 5
18.2.6 Security Design 10
18.3 Protocols and Standards
18.3.1 Protocols 1
18.3.2 Protocols Quiz 3
18.3.3 Standards 1
18.3.4 Standards Quiz 2
18.3.5 The New Wireless Standard 1
18.3.6 801.11ax 1
18.3.7 801.11ax FR 5
18.4 Private Networks
18.4.1 IP and MAC Addresses 1
18.4.2 IP and MAC Addresses Quiz 2
18.4.3 Intranet Permissions 1
18.4.4 Coffee Shop: Design an Intranet 5
18.4.5 DMZs and VPNs 1
18.4.6 DMZs and VPNs Quiz 3
18.4.7 Protecting Privacy with VPNs 1
18.4.8 Protecting Privacy with VPNs 5
18.4.9 Coffee Shop: Network Plan 5
18.4.10 Coffee Shop: Network Diagram 5
18.4.11 SOHO Network 1
18.4.12 Network Topologies 1
18.5 Mobile Devices
18.5.1 Mobile Devices 1
18.5.2 Mobile Devices Quiz 5
18.5.3 How Apple FaceID Works 1
18.5.4 How Apple FaceID Works Response 5
18.5.5 Biometric Data Debate 5
18.5.6 BYOD and MDM Concept Map 1
18.5.7 BYOD and MDM Conclusions 5
18.6 Access Control
18.6.1 Access Control 1
18.6.2 Access Control 5
18.6.3 Multifactor Authentication 1
18.6.4 Two Factor Authentication 1
18.6.5 Two Factor Authentication Reflection 5
18.6.6 RADIUS Overview with AAA Protocol 1
18.6.7 RADIUS Server Access Control 1
18.6.8 RADIUS Reflection 5
18.7 Advanced Networking Quiz
18.7.1 Advanced Networking Quiz 20
Project: Put it in Writing!
19.1 Level 1: Entry Event
19.1.1 Company Development 5
19.1.2 Level 1: Attack! 5
19.1.3 Level 1: Project Overview 1
19.1.4 Put It In Writing! Rubric 5
19.2 Level 2: User Training
19.2.1 User Training Policy Development 5
19.2.2 Challenge: Employee Negligence 1 5
19.2.3 Challenge: Employee Negligence 2 5
19.2.4 Level 2 Debrief 5
19.3 Level 3: Incident Response
19.3.1 Incident Response Plan Template 5
19.3.2 Incident Response Plan Link 5
19.3.3 Challenge: Cyber Attack! 5
19.3.4 Level 3 Debrief 5
19.4 Level 4: Data and Licenses
19.4.1 Data and Licenses 5
19.4.2 FTC Data Security Guide 5
19.4.3 Data Policy Template 5
19.4.4 Data Policy Link 5
19.4.5 Challenge: Data Breach 1 5
19.4.6 Challenge: Data Breach 2 5
19.4.7 Challenge: Data Breach 3 5
19.4.8 Level 4 Debrief 5
19.5 Level 5: Change Management
19.5.1 Change Management 5
19.5.2 Change Management Plan 5
19.5.3 Change Management Plan Link 5
Project: Digital Forensics
20.1 Digital Forensics
20.1.1 Digital Forensics 1
20.1.2 Student Success Story 1
20.1.3 Student Success Story Response 5
20.2 Forensic Case 1: Logs
20.2.1 Network Logs 1
20.2.2 Network Log Evidence 1
20.2.3 Network Logs Conclusion 5
20.3 Forensic Case 2: File Metadata
20.3.1 File Metadata 1
20.3.2 File Metadata Evidence 1
20.3.3 File Metadata Conclusion 5
20.4 Forensic Case 3: Exif Data
20.4.1 Photo Exif 1
20.4.2 Exif Using Inspector 1
20.4.3 Exif Using the CLI 1
20.4.4 Photo Exif Conclusion 5
Cryptocurrency
21.1 What is Currency?
21.1.1 What is Currency? 1
21.1.2 What is Currency? 5
21.1.3 What Gives Paper Money Its Actual Value 1
21.1.4 What Gives Money Its Value 5
21.1.5 Money: What is it Good For? 1
21.2 What is Cryptocurrency?
21.2.1 Cryptocurrency Basics 1
21.2.2 Cryptocurrency Basics 5
21.2.3 Cryptocurrency Module Overview 1
21.2.4 Cryptocurrencies Might Help Developing Countries 1
21.2.5 Cryptocurrencies are Helping Developing Countries 5
21.2.6 Show Me the Money 1
21.2.7 American Currency Exhibit 5
21.3 Intro to Blockchain
21.3.1 Intro to Blockchain 1
21.3.2 Intro to Blockchain 5
21.3.3 CryptoKitties 1
21.3.4 CryptoKitties 5
21.4 Hashing
21.4.1 Hashing 1
21.4.2 Hashing 5
21.4.3 SHA256 Hash Generator 1
21.4.4 Using the SHA256 Hash Generator 5
21.5 Proof of Work
21.5.1 Proof of Work 1
21.5.2 Proof of Work 5
21.5.3 Mining the Block 1
21.5.4 Mining the Block 5
21.5.5 PoW vs. Proof of Stake 1
21.5.6 PoW vs. PoS 5
21.5.7 Checking Proof of Work 1
21.6 Advanced Blockchain
21.6.1 Advanced Blockchain (part 1) 1
21.6.2 Advanced Blockchain (part 1) 5
21.6.3 Blockchain Buzz 1
21.6.4 Blockchain Buzz 5
21.6.5 Advanced Blockchain (part 2) 1
21.6.6 Advanced Blockchain (part 2) 5
21.6.7 Make a Blockchain 1
21.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1
21.7 Cryptocurrencies
21.7.1 Cryptocurrencies 1
21.7.2 Cryptocurrencies 5
21.7.3 Shiny Toy Phenomenon 5
21.7.4 Walmart Using Blockchain to Stop Spread of Disease 1
21.7.5 Walmart Use of Blockchain 5
21.8 Bitcoin
21.8.1 Bitcoin 1
21.8.2 Bitcoin 5
21.8.3 51% Attack Explained 1
21.8.4 51% Attack 5
21.8.5 Why the Bitcoin Bubble will Burst in 2018 1
21.8.6 Bitcoin Bust 5
21.8.7 Explore the Bitcoin Blockchain 1
21.9 Pros, Cons, and Future of Cryptocurrencies
21.9.1 Pros, Cons, and Future of Cryptocurrencies 1
21.9.2 Pros, Cons and Future of Cryptocurrencies 5
21.9.3 Pros, Cons and future of Cryptocurrencies 5
21.9.4 Cryptocurrency Pros and Cons 1
21.9.5 Crypto Pros and Cons 5
21.9.6 What is HODL? 1
21.9.7 What is HODL? 5
21.9.8 Pros, Cons, and Future of Cryptocurrencies 5
21.10 Project: Cryptocurrency Expert Panel Talk
21.10.1 Overview 5
21.10.2 Preview Sample Expert Panels 5
21.10.3 Investigate a Cryptocurrency Topic 5
21.10.4 Write an Outline and Rehearse 5
21.10.5 Expert Panel Talk (Presentation) 5
21.11 Cryptocurrency Quiz
21.11.1 Cryptocurrency Quiz 25
21.11.2 Cryptocurrency Badge 0
SQL Part II: The SQL
22.1 More Filtering Practice
22.1.1 Initials 5
22.1.2 Compound Queries with BETWEEN 5
22.1.3 Gryffindors With G Names 5
22.1.4 R First Names 5
22.1.5 FF Houses 5
22.2 Ordering Results
22.2.1 The ORDER BY Keyword 1
22.2.2 ORDER BY 1
22.2.3 ORDER BY First Name 1
22.2.4 Reverse Order 1
22.2.5 Order By Multiple Fields 1
22.2.6 House Ordering 5
22.2.7 Sort the P Names 5
22.3 Renaming Fields
22.3.1 Renaming Fields with AS 1
22.3.2 Renaming in the House Table 1
22.3.3 Changing Column Names 5
22.4 Joining Tables
22.4.1 The JOIN command 1
22.4.2 Basic Joining 1
22.4.3 Letters and Numbers 1
22.4.4 Person and House 1
22.4.5 Person and House (Correct) 1
22.4.6 Person and House (with namespacing) 1
22.4.7 List All Gryffindors 5
22.4.8 JOIN With Yourself 1
22.4.9 Renaming Tables 1
22.4.10 Quidditch Matchups 1
22.4.11 Quidditch Matchups: Ravenclaw Away Games 5
22.5 More Joining Tables
22.5.1 The Course Table 1
22.5.2 Courses and Professors 5
22.5.3 Courses, Professors, and Houses 5
22.5.4 Courses Taught By Gryffindors 5
22.5.5 The Enrollment Table 1
22.5.6 Students Taking Potions 5
22.5.7 Non-Slytherins Taking Potions 5
22.5.8 Defense Students by House 5
22.5.9 Neville's Courses 5
Web Development
23.1 Introduction to HTML
23.1.1 Introduction to HTML 1
23.1.2 Introduction to HTML Quiz 5
23.1.3 Our First HTML Page 1
23.1.4 Say Hello! 5
23.2 Structure of an HTML Page
23.2.1 Structure of an HTML Page 1
23.2.2 Structure of an HTML Page Quiz 5
23.2.3 HTML Template 1
23.2.4 Hello World Page 1
23.2.5 The <title> Tag 5
23.2.6 Your First HTML Page 5
23.2.7 Structure Badge 1
23.3 Formatting Text
23.3.1 Formatting Text 1
23.3.2 Formatting Text Quiz 5
23.3.3 Dictionary 1
23.3.4 That's Bold 5
23.3.5 Artificial Intelligence 5
23.3.6 State Capitals 5
23.4 Links
23.4.1 Links 1
23.4.2 Links Quiz 5
23.4.3 The <a> Tag 1
23.4.4 Simple Link 5
23.4.5 My Favorite Websites 5
23.5 Images
23.5.1 Images 1
23.5.2 Images Quiz 5
23.5.3 The <img> Tag 1
23.5.4 Building the CodeHS Homepage 1
23.5.5 Collage on a Theme 5
23.5.6 Linking an Image 5
23.5.7 Personal Library 5
23.5.8 Images Badge 1
23.6 HTML Lists
23.6.1 HTML Lists 1
23.6.2 HTML Lists Quiz 5
23.6.3 Grocery Shopping 1
23.6.4 Favorite Things 5
23.6.5 To-Do List 5
23.6.6 List Article 5
23.7 HTML Tables
23.7.1 HTML Tables 1
23.7.2 HTML Tables Quiz 5
23.7.3 Address Book 1
23.7.4 Favorite Songs 5
23.7.5 Calendar 5
23.8 HTML Styling
23.8.1 HTML Styling 1
23.8.2 HTML Styling Quiz 5
23.8.3 Stylish Address Book 1
23.8.4 Background Colors 5
23.8.5 Style Your To-Do List 5
23.9 Introduction to CSS
23.9.1 Introduction to CSS 1
23.9.2 Introduction to CSS Quiz 5
23.9.3 Styling Your H1s 1
23.9.4 First Style with CSS 5
23.9.5 List Styling 5
23.10 CSS Select by Tag
23.10.1 CSS Select by Tag 1
23.10.2 CSS Select by Tag Quiz 5
23.10.3 Rainbow 1
23.10.4 Dog Styling 1
23.10.5 Restaurant Menu 5
23.10.6 Put Karel Together 5
23.11 CSS Select by Class
23.11.1 CSS Select by Class 1
23.11.2 CSS Select by Class Quiz 5
23.11.3 Simple Checkerboard 1
23.11.4 Tic Tac Toe 5
23.11.5 Music Library 5
23.12 CSS Select by ID
23.12.1 CSS Select by ID 1
23.12.2 CSS Select by ID Quiz 5
23.12.3 Logo 1
23.12.4 Favorite Dog 5
23.12.5 Bingo 5
23.12.6 CSS Badge 1
23.13 Viewing Websites
23.13.1 Viewing Websites 1
23.13.2 Viewing Websites Quiz 5
23.13.3 Explaining a URL 5
23.14 Web Development Quiz
23.14.1 Web Development Quiz 25
23.15 Your First Website
23.15.1 Set Up Your codehs.me Website 10
23.15.2 Practice PT: Your First Website 10
23.15.3 Website Badge 1
Midterm
24.1 Midterm
24.1.1 Midterm 25
Final Course Project
25.1 Final Course Project
25.1.1 Choose Your Own Adventure 1
25.1.2 Choose Your Adventure 5
25.1.3 Research 5
25.1.4 Choose Your Target Audience 5
25.1.5 Draft Your Presentation 5
25.1.6 Draft Your Flyer 5
25.1.7 Make Your Presentation with Handout! 5
Extra
26.1 Lesson 1
26.1.1 Compound Queries 5