Please enable JavaScript to use CodeHS

CT 2: 2-IC-20

CodeHS Lessons

Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.

Standard
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
13.10 Creative Credit & Copyright
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
3.1 Computer Model
3.1 Computer Model
7.1 Intro to the Internet
7.1 Intro to the Internet
7.7 The Impact of the Internet
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
8.1 Project: The Effects of the Internet
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.2 Cyberbullying
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
9.5 Information Literacy
9.5 Information Literacy
9.6 Creative Credit & Copyright
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
15.1 Module Overview - Cybersecurity
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
8.9 Common Security Problems
10.11 Impact of the Internet
10.11 Impact of the Internet
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
Standard
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
Standard
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
3.1 Intro to the Internet
3.1 Intro to the Internet
3.7 The Impact of the Internet
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
3.8 Project: The Effects of the Internet
Standard
5.1 History of Computers
5.1 History of Computers
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
2.6 Computer Model
2.6 Computer Model
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
4.5 Future of Computing
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.1 History of Computers
4.1 History of Computers
4.5 Future of Computing
4.5 Future of Computing
4.6 Computer Model
4.6 Computer Model
22.12 Project: Security Assessment Report
21.10 Project: Classic Cipher Newscast
21.2 History of Cryptography
21.1 Cryptography, Cryptology, Cryptanalysis
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.12 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
8.1 Module Overview - Cybersecurity
8.1 Module Overview - Cybersecurity
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.5 Cyberbullying
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.8 Information Literacy
1.8 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
2.6 Computer Model
2.6 Computer Model
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Information Literacy
4.5 Information Literacy
4.7 Creative Credit & Copyright
4.7 Creative Credit & Copyright
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Information Literacy
1.4 Information Literacy
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
1.8 Hacking Ethics
Standard
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.10 Common Security Problems
5.10 Common Security Problems
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
9.10 Impact of the Internet
9.10 Impact of the Internet
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity