-
5.1 Programming Concepts
-
Video
5.1.1 Programming Concepts
-
Check for Understanding
5.1.2 Programming Concepts Quiz
-
Connection
5.1.3 Compilers vs. Interpreters
-
Free Response
5.1.4 Compilers vs. Interpreters
-
Example
5.1.5 Variables in Action
-
Example
5.1.6 Data Types using Typeof
-
Example
5.1.7 Basic Variables
-
Exercise
5.1.8 Daily Activities
-
5.2 Inside Web Apps
-
Video
5.2.1 Inside Web Apps
-
Check for Understanding
5.2.2 Inside Web Apps
-
Free Response
5.2.3 Using View Page Source
-
Example
5.2.4 Recreate a Webpage?
-
Connection
5.2.5 Getting Started with OWASP
-
Free Response
5.2.6 Getting Started with OWASP
-
5.3 Developer Tools
-
Video
5.3.1 Developer Tools
-
Check for Understanding
5.3.2 Developer Tools
-
Free Response
5.3.3 Using the Developer Tools
-
Exercise
5.3.4 Console Secrets
-
Example
5.3.5 Local Storage
-
Connection
5.3.6 The Top Cybersecurity Blogs and Websites
-
Free Response
5.3.7 Selecting a Site to Follow
-
5.4 The Value of Data
-
Video
5.4.1 The Value of Data
-
Check for Understanding
5.4.2 The Value of Data Quiz
-
Notes
5.4.3 Exploring Data Visualizations
-
Connection
5.4.4 US Recorded Music Revenue
-
Connection
5.4.5 National Parks
-
Connection
5.4.6 March Madness
-
Connection
5.4.7 Captain Marvel
-
Free Response
5.4.8 Respond: Visualizations
-
Free Response
5.4.9 Free Response: Choosing a Visualization
-
Free Response
5.4.10 Reflection: Design a Survey
-
5.5 Databases
-
Video
5.5.1 Databases
-
Check for Understanding
5.5.2 Databases
-
Connection
5.5.3 Database Administrator Career
-
Free Response
5.5.4 Database Administrator Career
-
Video
5.5.5 Parts of a Database
-
Check for Understanding
5.5.6 Parts of a Database
-
Connection
5.5.7 SQL Database Diagram
-
Free Response
5.5.8 SQL Database Diagram
-
Free Response
5.5.9 Schema Brainstorm
-
5.6 Clients and Servers
-
Video
5.6.1 Clients and Servers
-
Check for Understanding
5.6.2 Clients and Servers
-
Connection
5.6.3 Inside a Google Data Center
-
Free Response
5.6.4 Inside a Google Data Center
-
Connection
5.6.5 Cloud Vulnerabilities
-
Free Response
5.6.6 Cloud Vulnerabilities Response
-
Video
5.6.7 Client-Server Model
-
Check for Understanding
5.6.8 Client-Server Model
-
Connection
5.6.9 The Future of User Privacy
-
Free Response
5.6.10 The Future of User Privacy
-
5.7 What is SQL?
-
Notes
5.7.1 What is SQL Overview
-
Video
5.7.2 Intro to SQL
-
Check for Understanding
5.7.3 Quiz: What is SQL?
-
Video
5.7.4 How to Structure Data in SQL
-
Check for Understanding
5.7.5 How to Structure Data in SQL
-
Example
5.7.6 SQL Tables
-
Free Response
5.7.7 SQL Tables Response
-
5.8 Basic Querying in SQL
-
Video
5.8.1 The SELECT Statement
-
Check for Understanding
5.8.2 Basic Querying in SQL
-
Example
5.8.3 Our First SELECT Statement
-
Exercise
5.8.4 Your First SELECT Statement
-
Video
5.8.5 More SELECT Statement
-
Check for Understanding
5.8.6 More SELECT Statement
-
Example
5.8.7 Selecting Specific Columns
-
Exercise
5.8.8 Harry Potter Names
-
5.9 Filtering Queries in SQL
-
Video
5.9.1 The WHERE Clause
-
Check for Understanding
5.9.2 Condition Operators
-
Example
5.9.3 Ravenclaw House
-
Example
5.9.4 People in Gryffindor
-
Example
5.9.5 Filter By ID
-
Exercise
5.9.6 The Weasleys
-
Exercise
5.9.7 The Potters
-
5.10 Common Security Problems
-
Video
5.10.1 Common Security Problems
-
Check for Understanding
5.10.2 Common Security Problems
-
Connection
5.10.3 Meet Security Engineers at Google
-
Free Response
5.10.4 Security Engineering Reflection
-
Video
5.10.5 Living in a Digital World
-
Free Response
5.10.6 Living in a Digital World
-
5.11 SQL Injection Overview
-
Video
5.11.1 SQL Injection Overview
-
Check for Understanding
5.11.2 SQL Injection Overview
-
Connection
5.11.3 Equifax Security Breach
-
Connection
5.11.4 Equifax Exposed Millions
-
Free Response
5.11.5 Equifax SQL Injection Attack
-
Example
5.11.6 SQLi
-
5.12 Types of SQLi and Prevention
-
Video
5.12.1 Types of SQLi
-
Check for Understanding
5.12.2 Types of SQLi
-
Video
5.12.3 Preventing SQLi
-
Check for Understanding
5.12.4 Preventing SQLi
-
Connection
5.12.5 Mitigating SQL Injection
-
Free Response
5.12.6 Reflection: Mitigating SQL Injection
-
Connection
5.12.7 SQL Injection Practice
-
5.13 Software Security Quiz
-
Unit Quiz
5.13.1 Software Security Quiz