undefined

🆕 Preview the New Cybersecurity Course!

The Fundamentals of Cybersecurity course is getting an update! This updated course will replace the current course by the start of the 2024-25 school year. The following modules are receiving a full update with brand-new material and activities:

  • What is Cybersecurity?
  • Digital Citizenship and Cyber Hygiene
  • The ABCs of Cryptography
  • Software Security
  • Networking Fundamentals

We have also worked to include three new projects and new labs throughout the course! If you’d like to hear more about the updates, watch the first half of this webinar (10 mins) from our Virtual Teacher Conference: New Cybersecurity Course Updates

If you’d like to see an early preview of the cyber course, you can see the nearly finished course by joining this class: New Cybersecurity Course Preview

We would love your feedback! Gain access to the Feedback Star and tell us what you think about the new activities and exercises in the course.

🗞️ Cybersecurity in the News

Have you ever accidentally saved the world? A single programmer did just that by unknowingly stopping a major cyberattack on Linux systems! The full story behind this glitch in the matrix and how it protected millions remains unclear, but it highlights a critical vulnerability in our digital infrastructure.

Read the following article to learn more about this fascinating incident and the ongoing fight to secure our tech.

TechScape: How one man stopped a potentially massive cyber-attack – by accident

Class Discussion Questions:

  1. The article talks about an accidental stop to a cyberattack. Can finding weaknesses in computer systems sometimes be a good thing? Why or why not?
  2. The article says the code change was easy. Does that mean keeping computers safe is simple too? Why or why not?
  3. Imagine you accidentally stopped a cyberattack! How would you feel? What questions would you have?

🔥 Cybersecurity Challenge

Can you decode the encrypted message?

Last Insider’s Challenge Answer

Do ovfzn 20 tzvmn oj wpdgy v mzkpovodji viy azr hdipozn ja xtwzm-dixdyzio oj mpdi do.

Answer: This encryption uses the Caesar Cipher and a shift of 21. When decoded, it states a quote by Stephanie Nappo:

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it."

undefined

💸 CodeHS Scholarship Program

Calling All High School Seniors!

CodeHS is proud to invite all eligible students to apply for the third year of the CodeHS Scholarship!
Review the scholarship eligibility requirements and learn how your students can apply today. All applications are due by May 20, 2024 at 11:59 PM CT.


undefined

🧠 Coding in the Wild Blog

The Coding the Wild posts are great for showcasing how professionals use computer science across multiple disciplines.

I recommend using “Coding for Artificial Intelligence at TikTok.” It highlights some great advice for younger coders, and reviews a software engineer's experience working at TikTok.


🗓️ Upcoming PD Webinars and Workshops

We’re hosting a variety of free webinars this spring with the rollout of our new computer science courses! Be sure to check out the full calendar of events including:


undefined

💬 Stay Connected

  1. Explore the CodeHS Cybersecurity Topic Hub
  2. Chat with fellow teachers in the CodeHS Facebook Group
  3. Follow us on Twitter and Instagram

Cheers,
Jennifer Campbell
Senior Curriculum Developer, CodeHS

Interested in learning more about CodeHS Pro? Request a quote.