Please enable JavaScript to use CodeHS


South Carolina Cybersecurity Fundamentals

Lessons

  1. What is Cybersecurity?

    1. 1.1 Welcome to Cybersecurity Fundamentals

    2. Description
    3. Objective
    4. 1.2 Module Overview - Cybersecurity

    5. Description
    6. Objective
    7. 1.3 What is Cybersecurity?

    8. Description
    9. Objective
    10. 1.4 Impact of Cybersecurity

    11. Description
    12. Objective
    13. 1.5 The CIA Triad

    14. Description
    15. Objective
    16. 1.6 What is Cybersecurity? Quiz

    17. Description
    18. Objective
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Description
    3. Objective
    4. 2.2 Cyberbullying

    5. Description
    6. Objective
    7. 2.3 Internet Safety

    8. Description
    9. Objective
    10. 2.4 Privacy & Security

    11. Description
    12. Objective
    13. 2.5 Information Literacy

    14. Description
    15. Objective
    16. 2.6 Creative Credit & Copyright

    17. Description
    18. Objective
    19. 2.7 Hacking Ethics

    20. Description
    21. Objective
    22. 2.8 Digital Citizenship and Cyber Hygiene Quiz

    23. Description
    24. Objective
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Description
    3. Objective
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Description
    3. Objective
    4. 4.2 History of Cryptography

    5. Description
    6. Objective
    7. 4.3 Basic Crypto Systems: Caesar Cipher

    8. Description
    9. Objective
    10. 4.4 Basic Crypto Systems: Cracking Caesar

    11. Description
    12. Objective
    13. 4.5 Basic Crypto Systems: Vigenere Cipher

    14. Description
    15. Objective
    16. 4.6 The ABCs of Cryptography Quiz

    17. Description
    18. Objective
  5. Advanced Cryptography

    1. 5.1 Welcome to Advanced Cybersecurity!

    2. Description
    3. Objective
    4. 5.2 Encryption Algorithms

    5. Description
    6. Objective
    7. 5.3 Advanced Cryptography

    8. Description
    9. Objective
    10. 5.4 Hash Functions

    11. Description
    12. Objective
    13. 5.5 Hash Function Development

    14. Description
    15. Objective
    16. 5.6 Asymmetric Encryption

    17. Description
    18. Objective
    19. 5.7 Digital Certificates

    20. Description
    21. Objective
    22. 5.8 Advanced Cryptography Quiz

    23. Description
    24. Objective
  6. Project: Steganography

    1. 6.1 Project: Steganography

    2. Description
    3. Objective
  7. System Administration

    1. 7.1 Operating Systems

    2. Description
    3. Objective
    4. 7.2 Comparing Operating Systems

    5. Description
    6. Objective
    7. 7.3 Compatibility

    8. Description
    9. Objective
    10. 7.4 Software and Applications

    11. Description
    12. Objective
    13. 7.5 Software Licenses

    14. Description
    15. Objective
    16. 7.6 Application Security

    17. Description
    18. Objective
    19. 7.7 Browser Configuration

    20. Description
    21. Objective
    22. 7.8 System Administration

    23. Description
    24. Objective
    25. 7.9 Access Control

    26. Description
    27. Objective
    28. 7.10 Command Line Interface

    29. Description
    30. Objective
    31. 7.11 System Administration Quiz

    32. Description
    33. Objective
  8. Cyber Defense

    1. 8.1 Network Attacks

    2. Description
    3. Objective
    4. 8.2 Malware Types and Prevention

    5. Description
    6. Objective
    7. 8.3 What is SQL?

    8. Description
    9. Objective
    10. 8.4 Basic Querying in SQL

    11. Description
    12. Objective
    13. 8.5 Filtering Queries in SQL

    14. Description
    15. Objective
    16. 8.6 Common Security Problems

    17. Description
    18. Objective
    19. 8.7 SQL Injection Overview

    20. Description
    21. Objective
    22. 8.8 Types of SQLi and Prevention

    23. Description
    24. Objective
    25. 8.9 Software Security Quiz

    26. Description
    27. Objective
  9. Project: Security Assessment Report

    1. 9.1 Project: Security Assessment Report

    2. Description
    3. Objective
  10. Networking Fundamentals

    1. 10.1 Introduction to the Internet

    2. Description
    3. Objective
    4. 10.2 Notational Systems

    5. Description
    6. Objective
    7. 10.3 Data Representation

    8. Description
    9. Objective
    10. 10.4 Internet Hardware and Sending Information

    11. Description
    12. Objective
    13. 10.5 Internet Addresses

    14. Description
    15. Objective
    16. 10.6 Domain Name System (DNS)

    17. Description
    18. Objective
    19. 10.7 Routing

    20. Description
    21. Objective
    22. 10.8 Packets & Protocols

    23. Description
    24. Objective
    25. 10.9 Viewing a Webpage

    26. Description
    27. Objective
    28. 10.10 Impact of the Internet

    29. Description
    30. Objective
    31. 10.11 Networking Fundamentals Quiz

    32. Description
    33. Objective
  11. IT Infrastructure

    1. 11.1 Internal Components

    2. Description
    3. Objective
    4. 11.2 Peripheral Devices

    5. Description
    6. Objective
    7. 11.3 Network Devices

    8. Description
    9. Objective
    10. 11.4 Storage Options

    11. Description
    12. Objective
    13. 11.5 Network Options

    14. Description
    15. Objective
    16. 11.6 Network Communication

    17. Description
    18. Objective
    19. 11.7 Network Management

    20. Description
    21. Objective
    22. 11.8 Private Networks

    23. Description
    24. Objective
    25. 11.9 IT Infrastructure Quiz

    26. Description
    27. Objective
  12. Project: Troubleshooting

    1. 12.1 Methodology

    2. Description
    3. Objective
    4. 12.2 Support Practice

    5. Description
    6. Objective
  13. Risk Management

    1. 13.1 Identifying Risks

    2. Description
    3. Objective
    4. 13.2 Assessing Risks

    5. Description
    6. Objective
    7. 13.3 Risk Response

    8. Description
    9. Objective
    10. 13.4 Penetration Testing

    11. Description
    12. Objective
    13. 13.5 Risk Management Quiz

    14. Description
    15. Objective
  14. Final Exam

    1. 14.1 Final Exam

    2. Description
    3. Objective
  15. What's Next?

    1. 15.1 After Fundamentals of Cybersecurity

    2. Description
    3. Objective
  16. Project: Digital Forensics

    1. 16.1 Digital Forensics

    2. Description
    3. Objective
    4. 16.2 Forensic Case 1: Logs

    5. Description
    6. Objective
    7. 16.3 Forensic Case 2: File Metadata

    8. Description
    9. Objective
    10. 16.4 Forensic Case 3: Exif Data

    11. Description
    12. Objective
  17. Programming Fundamentals

    1. 17.1 Programming Concepts

    2. Description
    3. Objective
    4. 17.2 Programming with Karel

    5. Description
    6. Objective
    7. 17.3 Looping

    8. Description
    9. Objective
    10. 17.4 Branching

    11. Description
    12. Objective
    13. 17.5 Arrays and Objects

    14. Description
    15. Objective
    16. 17.6 Organizational Techniques

    17. Description
    18. Objective
    19. 17.7 Programming Fundamentals Quiz

    20. Description
    21. Objective
  18. Cryptocurrency

    1. 18.1 What is Currency?

    2. Description
    3. Objective
    4. 18.2 What is Cryptocurrency?

    5. Description
    6. Objective
    7. 18.3 Intro to Blockchain

    8. Description
    9. Objective
    10. 18.4 Hashing

    11. Description
    12. Objective
    13. 18.5 Proof of Work

    14. Description
    15. Objective
    16. 18.6 Advanced Blockchain

    17. Description
    18. Objective
    19. 18.7 Cryptocurrencies

    20. Description
    21. Objective
    22. 18.8 Bitcoin

    23. Description
    24. Objective
    25. 18.9 Pros, Cons, and Future of Cryptocurrencies

    26. Description
    27. Objective
    28. 18.10 Project: Cryptocurrency Expert Panel Talk

    29. Description
    30. Objective
    31. 18.11 Cryptocurrency Quiz

    32. Description
    33. Objective
  19. Final Course Project

    1. 19.1 Final Course Project

    2. Description
    3. Objective
  20. SQL Part II: The SQL

    1. 20.1 More Filtering Practice

    2. Description
    3. Objective
    4. 20.2 Ordering Results

    5. Description
    6. Objective
    7. 20.3 Renaming Fields

    8. Description
    9. Objective
    10. 20.4 Joining Tables

    11. Description
    12. Objective
    13. 20.5 More Joining Tables

    14. Description
    15. Objective
  21. Web Development

    1. 21.1 Introduction to HTML

    2. Description
    3. Objective
    4. 21.2 Structure of an HTML Page

    5. Description
    6. Objective
    7. 21.3 Formatting Text

    8. Description
    9. Objective
    10. 21.4 Links

    11. Description
    12. Objective
    13. 21.5 Images

    14. Description
    15. Objective
    16. 21.6 HTML Lists

    17. Description
    18. Objective
    19. 21.7 HTML Tables

    20. Description
    21. Objective
    22. 21.8 HTML Styling

    23. Description
    24. Objective
    25. 21.9 Introduction to CSS

    26. Description
    27. Objective
    28. 21.10 CSS Select by Tag

    29. Description
    30. Objective
    31. 21.11 CSS Select by Class

    32. Description
    33. Objective
    34. 21.12 CSS Select by ID

    35. Description
    36. Objective
    37. 21.13 Viewing Websites

    38. Description
    39. Objective
    40. 21.14 Web Development Quiz

    41. Description
    42. Objective
    43. 21.15 Your First Website

    44. Description
    45. Objective
  22. Midterm

    1. 22.1 Midterm

    2. Description
    3. Objective
  23. Extra

    1. 23.1 Lesson 1

    2. Description
    3. Objective