Please enable JavaScript to use CodeHS

Outline


1. What is Cybersecurity?
1.1 Welcome to Cybersecurity Fundamentals
Notes 1.1.1 Course Introduction
Free Response 1.1.2 Course Goals
1.2 Module Overview - Cybersecurity
Video 1.2.1 Welcome to Cybersecurity
Check for Understanding 1.2.2 Welcome to Cybersecurity
Example 1.2.3 Intruder Alert!
Free Response 1.2.4 Cybersecurity and You
Free Response 1.2.5 Course Goals
1.3 What is Cybersecurity?
Video 1.3.1 What is Cybersecurity?
Check for Understanding 1.3.2 What is Cybersecurity?
Connection 1.3.3 WannaCry Ransomware Attack
Free Response 1.3.4 WannaCry Reflection
Example 1.3.5 Ransomware Simulator
Connection 1.3.6 Internet of Things
Connection 1.3.7 Cybersecurity and Connected Cars
Free Response 1.3.8 Internet of Things Reflection
1.4 Impact of Cybersecurity
Video 1.4.1 Impact of Cybersecurity
Check for Understanding 1.4.2 Impact of Cybersecurity
Example 1.4.3 Phishing Simulator
Connection 1.4.4 Yahoo! Attack
Free Response 1.4.5 Yahoo! Reflection
Connection 1.4.6 Cyberterrorism
Free Response 1.4.7 Cyberterrorism Response
Connection 1.4.8 Fighting Cyber Crime
Free Response 1.4.9 Cyber Crime Reflection
1.5 The CIA Triad
Video 1.5.1 CIA Triad
Check for Understanding 1.5.2 CIA Triad
Free Response 1.5.3 Which part of the CIA Triad?
Free Response 1.5.4 Which part of the CIA Triad?
Free Response 1.5.5 Breach of Confidentiality
Free Response 1.5.6 Breach of Availability
Free Response 1.5.7 CIA Connections
1.6 What is Cybersecurity? Quiz
Unit Quiz 1.6.1 What is Cybersecurity? Quiz
2. Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
Video 2.1.1 Digital Footprint and Reputation
Check for Understanding 2.1.2 Digital Footprint and Reputation
Example 2.1.3 Social Media Clean-up
Free Response 2.1.4 Building a Positive Digital Footprint
Connection 2.1.5 Right to be Forgotten?
Free Response 2.1.6 Right to be Forgotten
Free Response 2.1.7 What is your Digital Footprint?
2.2 Cyberbullying
Video 2.2.1 Cyberbullying
Check for Understanding 2.2.2 Cyberbullying
Free Response 2.2.3 Scenario: Student Ranking
Free Response 2.2.4 Scenario: Singled Out
Free Response 2.2.5 Stopping Cyberbullying
2.3 Internet Safety
Video 2.3.1 Internet Safety
Check for Understanding 2.3.2 Internet Safety
Free Response 2.3.3 Scenario: School Stranger
Free Response 2.3.4 Scenario: Vacation Pals
Free Response 2.3.5 Staying Safe
2.4 Privacy & Security
Video 2.4.1 What is Data Privacy & Security?
Check for Understanding 2.4.2 Privacy & Security Quiz
Connection 2.4.3 Google Privacy Policy Search
Free Response 2.4.4 Google Privacy Policy Search
Example 2.4.5 Guess: Password List
Example 2.4.6 Guess: Using an Algorithm
Example 2.4.7 Guess: Brute Force
Connection 2.4.8 How Strong is your Password?
Free Response 2.4.9 How Strong is your password?
Example 2.4.10 You Can Be Tracked!
2.5 Information Literacy
Video 2.5.1 Information Literacy
Check for Understanding 2.5.2 Information Literacy
Free Response 2.5.3 Effective Internet Searches
Connection 2.5.4 Evaluate the Source 1
Free Response 2.5.5 Respond: Evaluate the Source 1
Connection 2.5.6 Evaluate the Source 2
Free Response 2.5.7 Respond: Evaluate the Source 2
Connection 2.5.8 Hero Pig?
Free Response 2.5.9 Respond: Hero Pig?
2.6 Creative Credit & Copyright
Video 2.6.1 Creative Credit and Copyright
Check for Understanding 2.6.2 Creative Credit and Copyright
Free Response 2.6.3 Cite!
Connection 2.6.4 Exploring Creative Commons
Free Response 2.6.5 Respond: Creative Commons
Free Response 2.6.6 Task: Finding Images
Free Response 2.6.7 Reflection: Why is Copyright Important?
2.7 Hacking Ethics
Video 2.7.1 Hacking Ethics & Legality
Check for Understanding 2.7.2 Hacking Ethics & Legality
Connection 2.7.3 Penetration Testing
Free Response 2.7.4 Reflection: Penetration Testing
Connection 2.7.5 Hack the Pentagon?
Free Response 2.7.6 Reflection: Hack the Pentagon
Check for Understanding 2.7.7 Ethical Hacker Agreement
2.8 Digital Citizenship and Cyber Hygiene Quiz
Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
3. Project: Public Service Announcement
3.1 Project: Public Service Announcement
Free Response 3.1.1 Pick a Topic
Free Response 3.1.2 Research
Free Response 3.1.3 Choose Your Audience
Free Response 3.1.4 What kind of PSA?
Free Response 3.1.5 Draft your PSA
Free Response 3.1.6 Finalize your PSA!
4. The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
Example 4.1.3 Cryptogram Game!
Video 4.1.4 Why encrypt?
Check for Understanding 4.1.5 Why encrypt?
Example 4.1.6 Encrypt/Decrypt
4.2 History of Cryptography
Video 4.2.1 Cryptography: A Brief History
Check for Understanding 4.2.2 Cryptography History Quiz
Connection 4.2.3 How the Enigma Worked
Free Response 4.2.4 How the Enigma Worked
Connection 4.2.5 Unknown Languages and the Future of Cryptography
Free Response 4.2.6 The Future of Cybersecurity
4.3 Basic Crypto Systems: Caesar Cipher
Video 4.3.1 Caesar Cipher
Check for Understanding 4.3.2 Caesar Cipher
Example 4.3.3 Caesar Cipher Encryption
Example 4.3.4 Decrypt Caesar's Cipher!
4.4 Basic Crypto Systems: Cracking Caesar
Video 4.4.1 Cracking Caesar Cipher
Check for Understanding 4.4.2 Cracking Caesar Cipher
Example 4.4.3 Cracking Caesar with Brute Force
Example 4.4.4 Letter Frequency and Caesar
Free Response 4.4.5 Examining Caesar Cipher
4.5 Basic Crypto Systems: Vigenere Cipher
Video 4.5.1 Vigenere Cipher
Check for Understanding 4.5.2 Vigenere Cipher
Example 4.5.3 Vigenere Cipher Example
Example 4.5.4 Letter Frequency and Vigenere Cipher
Free Response 4.5.5 Examining Vigenere Cipher
Example 4.5.6 Improving Vigenere
4.6 The ABCs of Cryptography Quiz
Unit Quiz 4.6.1 The ABCs of Cryptography Quiz
5. Advanced Cryptography
5.1 Welcome to Advanced Cybersecurity!
Notes 5.1.1 Course Introduction
Connection 5.1.2 Cybersecurity 101
Free Response 5.1.3 Cyber Heat Map
Free Response 5.1.4 Career Pathways
Connection 5.1.5 Starting with Cryptography
Free Response 5.1.6 Course Goals
5.2 Encryption Algorithms
Video 5.2.1 Ciphers
Check for Understanding 5.2.2 Ciphers Quiz
Free Response 5.2.3 Enhanced Caesar Cipher
Free Response 5.2.4 Mixed Alphabet Cipher
Example 5.2.5 Pigpen Encoder
Free Response 5.2.6 Pigpen Cipher
Free Response 5.2.7 Rail Fence Cipher
Video 5.2.8 Encryption Standards
Check for Understanding 5.2.9 Encryption Standards Quiz
5.3 Advanced Cryptography
Video 5.3.1 Advanced Cryptography
Check for Understanding 5.3.2 Advanced Cryptography
Connection 5.3.3 Public Key Cryptography for Non-Geeks
Free Response 5.3.4 Examining Public Key Cryptography
Connection 5.3.5 Public Key Cryptography
Free Response 5.3.6 Public Key Cryptography
5.4 Hash Functions
Video 5.4.1 Hash Functions
Check for Understanding 5.4.2 Hash Functions
Connection 5.4.3 Google Shattered Crypto Algorithm
Free Response 5.4.4 Hash Functions in the News
Connection 5.4.5 Using a Hash Generator
Free Response 5.4.6 Hash Generator
Connection 5.4.7 Password Salting
Free Response 5.4.8 Password Salting
5.5 Hash Function Development
Video 5.5.1 Hash Function Development
Check for Understanding 5.5.2 Hash Function Development
Example 5.5.3 Modulo Math Calculator
Example 5.5.4 Understanding Modulo Math
Example 5.5.5 Modulo Game!
Exercise 5.5.6 Develop a Simple Hash Function
5.6 Asymmetric Encryption
Video 5.6.1 Asymmetric Encryption
Check for Understanding 5.6.2 Asymmetric Encryption Quiz
Example 5.6.3 Diffie-Hellman Key Exchange
Free Response 5.6.4 Affine Cipher
Free Response 5.6.5 Trapdoor Functions
Notes 5.6.6 RSA
Free Response 5.6.7 RSA Reflection
5.7 Digital Certificates
Video 5.7.1 Digital Certificates
Check for Understanding 5.7.2 Digital Certificates
Connection 5.7.3 SSL Explained
Free Response 5.7.4 SSL Explained
Free Response 5.7.5 SSL Connection
Connection 5.7.6 In The News
Free Response 5.7.7 In The News Response
Free Response 5.7.8 Become a Certificate Authority!
5.8 Advanced Cryptography Quiz
Unit Quiz 5.8.1 Advanced Cryptography Quiz
6. Project: Steganography
6.1 Project: Steganography
Video 6.1.1 Project Opener
Connection 6.1.2 Government Surveillance and Reality Winner
Free Response 6.1.3 Government Surveillance and Reality Winner
Connection 6.1.4 Data Hiding and Extraction
Free Response 6.1.5 Reflect: Data Hiding and Extraction
Example 6.1.6 Hide Text
Example 6.1.7 Hidden Message
Free Response 6.1.8 Your turn: Encryption Algorithm
Challenge 6.1.9 Your turn: Image Creation
Free Response 6.1.10 Final Algorithm and Partner Decode
Free Response 6.1.11 Final Reflection
7. System Administration
7.1 Operating Systems
Video 7.1.1 Operating Systems
Check for Understanding 7.1.2 Operating Systems Quiz
Example 7.1.3 Detect My OS
Example 7.1.4 Windows OS Installation Simulation
Free Response 7.1.5 Installing an OS
Connection 7.1.6 Upgrading a Mac OS
7.2 Comparing Operating Systems
Video 7.2.1 Comparing Operating Systems
Check for Understanding 7.2.2 Comparing Operating Systems Quiz
Example 7.2.3 Windows Simulation
Example 7.2.4 MacOS Simulation
Connection 7.2.5 Choose a Linux Distro!
Free Response 7.2.6 Which would you choose?
7.3 Compatibility
Video 7.3.1 Compatibility
Check for Understanding 7.3.2 Compatibility Quiz
Example 7.3.3 What Processor? Windows
Example 7.3.4 What Processor? Mac
Free Response 7.3.5 What Processor are you running?
7.4 Software and Applications
Video 7.4.1 Software and Applications
Check for Understanding 7.4.2 Software and Applications Quiz
Example 7.4.3 Spreadsheet Simulation
Example 7.4.4 Messaging Simulation
Example 7.4.5 Kanban Board Simulation
Free Response 7.4.6 Software Simulations
7.5 Software Licenses
Video 7.5.1 Software Licenses
Check for Understanding 7.5.2 Software Licenses Quiz
Free Response 7.5.3 Do I need a Software License?
Free Response 7.5.4 Is This Original?
7.6 Application Security
Video 7.6.1 Application Security
Check for Understanding 7.6.2 Application Security
Example 7.6.3 Windows Updates
Connection 7.6.4 Windows Defender Antivirus
Free Response 7.6.5 Windows Defender Antivirus
Free Response 7.6.6 CodeHS System Restore
7.7 Browser Configuration
Video 7.7.1 Browser Configuration
Check for Understanding 7.7.2 Browser Configuration
Connection 7.7.3 Cached CodeHS
Free Response 7.7.4 Cached CodeHS
Example 7.7.5 Is Your Popup Blocker On?
Free Response 7.7.6 Browser Extensions Lab
7.8 System Administration
Video 7.8.1 User Accounts
Check for Understanding 7.8.2 User Accounts Quiz
Free Response 7.8.3 User Accounts
Free Response 7.8.4 Shared Folders and Files
Video 7.8.5 Host Security
Check for Understanding 7.8.6 Host Security Quiz
Free Response 7.8.7 Security Baseline
7.9 Access Control
Video 7.9.1 Access Control
Check for Understanding 7.9.2 Access Control
Example 7.9.3 Multifactor Authentication
Example 7.9.4 Two Factor Authentication
Free Response 7.9.5 Two Factor Authentication Reflection
Connection 7.9.6 RADIUS Overview with AAA Protocol
Connection 7.9.7 RADIUS Server Access Control
Free Response 7.9.8 RADIUS Reflection
7.10 Command Line Interface
Notes 7.10.1 Linux/MacOS vs. Windows
Video 7.10.2 Command Line Interface
Check for Understanding 7.10.3 Command Line Interface Quiz
Resource 7.10.4 Command Equivalents
Video 7.10.5 Windows Command Prompt
Free Response 7.10.6 Windows Command Prompt
Free Response 7.10.7 Directory Directions
Connection 7.10.8 Neural Interface?
Free Response 7.10.9 Neural Interface?
7.11 System Administration Quiz
Survey 7.11.1 Mindsets
Unit Quiz 7.11.2 System Administration Quiz
8. Cyber Defense
8.1 Network Attacks
Video 8.1.1 Network Attacks Overview
Check for Understanding 8.1.2 Network Attacks Quiz
Notes 8.1.3 Check for Vulnerabilities
Connection 8.1.4 Bug Bounty Hunting
Free Response 8.1.5 Bug Bounty Hunting
Connection 8.1.6 Common Port Targets
Example 8.1.7 Port Scanner Simulation
Free Response 8.1.8 Open Port Reflection
8.2 Malware Types and Prevention
Video 8.2.1 Malware Types and Prevention
Check for Understanding 8.2.2 Malware Types and Prevention
Connection 8.2.3 How Anti-malware Works
Free Response 8.2.4 How Anti-malware Works
Free Response 8.2.5 OS Malware Security
Free Response 8.2.6 Reverse Engineering Malware
8.3 What is SQL?
Notes 8.3.1 What is SQL Overview
Video 8.3.2 Intro to SQL
Check for Understanding 8.3.3 Quiz: What is SQL?
Video 8.3.4 How to Structure Data in SQL
Check for Understanding 8.3.5 How to Structure Data in SQL
Example 8.3.6 SQL Tables
Free Response 8.3.7 SQL Tables Response
8.4 Basic Querying in SQL
Video 8.4.1 The SELECT Statement
Check for Understanding 8.4.2 Basic Querying in SQL
Example 8.4.3 Our First SELECT Statement
Exercise 8.4.4 Your First SELECT Statement
Video 8.4.5 More SELECT Statement
Check for Understanding 8.4.6 More SELECT Statement
Example 8.4.7 Selecting Specific Columns
Exercise 8.4.8 Harry Potter Names
8.5 Filtering Queries in SQL
Video 8.5.1 The WHERE Clause
Check for Understanding 8.5.2 Condition Operators
Example 8.5.3 Ravenclaw House
Example 8.5.4 People in Gryffindor
Example 8.5.5 Filter By ID
Exercise 8.5.6 The Weasleys
Exercise 8.5.7 The Potters
8.6 Common Security Problems
Video 8.6.1 Common Security Problems
Check for Understanding 8.6.2 Common Security Problems
Connection 8.6.3 Meet Security Engineers at Google
Free Response 8.6.4 Security Engineering Reflection
Video 8.6.5 Living in a Digital World
Free Response 8.6.6 Living in a Digital World
8.7 SQL Injection Overview
Video 8.7.1 SQL Injection Overview
Check for Understanding 8.7.2 SQL Injection Overview
Connection 8.7.3 Equifax Security Breach
Connection 8.7.4 Equifax Exposed Millions
Free Response 8.7.5 Equifax SQL Injection Attack
Example 8.7.6 SQLi
8.8 Types of SQLi and Prevention
Video 8.8.1 Types of SQLi
Check for Understanding 8.8.2 Types of SQLi
Video 8.8.3 Preventing SQLi
Check for Understanding 8.8.4 Preventing SQLi
Connection 8.8.5 Mitigating SQL Injection
Free Response 8.8.6 Reflection: Mitigating SQL Injection
Connection 8.8.7 SQL Injection
8.9 Software Security Quiz
Unit Quiz 8.9.1 Software Security Quiz
9. Project: Security Assessment Report
9.1 Project: Security Assessment Report
Notes 9.1.1 Project Requirements
Connection 9.1.2 Supercar Showdown Website
Free Response 9.1.3 SQL Injection Testing
Resource 9.1.4 SQLi Testing Handout
Free Response 9.1.5 Security Assessment Report
Free Response 9.1.6 Project Reflection
10. Networking Fundamentals
10.1 Introduction to the Internet
Video 10.1.1 Welcome to the Internet
Check for Understanding 10.1.2 Intro to the Internet
Connection 10.1.3 Inside Facebook's Connectivity Lab
Free Response 10.1.4 Connectivity Lab Reflection
10.2 Notational Systems
Video 10.2.1 Number Systems
Check for Understanding 10.2.2 Number Systems Quiz
Notes 10.2.3 Number Base Tool
Video 10.2.4 Decimal to Binary
Check for Understanding 10.2.5 Decimal to Binary Quiz
Exercise 10.2.6 Binary Game
10.3 Data Representation
Video 10.3.1 Hexadecimal
Check for Understanding 10.3.2 Hexadecimal Quiz
Exercise 10.3.3 Binary to Hex Game
Video 10.3.4 Encoding Text with Binary
Check for Understanding 10.3.5 Encoding Text with Binary Quiz
Example 10.3.6 Custom Encoding
Example 10.3.7 Bits to ASCII
Exercise 10.3.8 Hello World in Bits
10.4 Internet Hardware and Sending Information
Video 10.4.1 Internet Hardware
Check for Understanding 10.4.2 Internet Hardware
Video 10.4.3 Sending Information
Check for Understanding 10.4.4 Sending Information
Connection 10.4.5 The Internet is in the Ocean
Free Response 10.4.6 Internet in the Ocean Reflection
10.5 Internet Addresses
Video 10.5.1 Internet Addresses
Check for Understanding 10.5.2 Internet Addresses
Free Response 10.5.3 The Need for Addresses
Connection 10.5.4 IPv4 vs. IPv6
Free Response 10.5.5 Reflection: IPv4 vs IPv6
10.6 Domain Name System (DNS)
Video 10.6.1 Domain Name System (DNS)
Check for Understanding 10.6.2 Domain Name System
Connection 10.6.3 How Does DNS Work?
Free Response 10.6.4 How Does DNS Work?
10.7 Routing
Video 10.7.1 Routing
Check for Understanding 10.7.2 Routing
Free Response 10.7.3 Redundancy
10.8 Packets & Protocols
Video 10.8.1 Packets
Check for Understanding 10.8.2 Packets
Video 10.8.3 Protocols
Check for Understanding 10.8.4 Protocols
Connection 10.8.5 How the Internet Works
Free Response 10.8.6 The Journey of an Image
10.9 Viewing a Webpage
Video 10.9.1 Viewing a Webpage
Check for Understanding 10.9.2 Viewing a Webpage
Free Response 10.9.3 Explaining a URL
Connection 10.9.4 Net Neutrality Explained
Connection 10.9.5 FCCs Net Neutrality Rules Officially Repealed
Free Response 10.9.6 Take a Side on Net Neutrality
Connection 10.9.7 Net Neutrality and Cybersecurity
Free Response 10.9.8 Net Neutrality and Cybersecurity Research
10.10 Impact of the Internet
Video 10.10.1 Impact of the Internet
Check for Understanding 10.10.2 Impact of the Internet
Connection 10.10.3 What is the Digital Divide?
Free Response 10.10.4 What is the Digital Divide?
10.11 Networking Fundamentals Quiz
Survey 10.11.1 Mindsets
Unit Quiz 10.11.2 Networking Fundamentals Quiz
11. IT Infrastructure
11.1 Internal Components
Video 11.1.1 Internal Components
Check for Understanding 11.1.2 Internal Components
Connection 11.1.3 Build a Computer
Free Response 11.1.4 Build a Computer
Example 11.1.5 Test Your Brain's RAM!
Free Response 11.1.6 Test Your Brain's RAM!
11.2 Peripheral Devices
Video 11.2.1 Peripheral Devices
Check for Understanding 11.2.2 Peripheral Devices
Free Response 11.2.3 Personalized Peripherals
Free Response 11.2.4 IT Help
Free Response 11.2.5 Your Ideal Computer Setup
11.3 Network Devices
Video 11.3.1 Network Devices
Check for Understanding 11.3.2 Network Devices
Connection 11.3.3 Speed Test
Free Response 11.3.4 Speed Test
Connection 11.3.5 Fiber Optics Bend Light!
Free Response 11.3.6 Fiber Optics Bend Light!
Connection 11.3.7 Ethernet Standards
Free Response 11.3.8 Ethernet Standards
Free Response 11.3.9 Network Troubleshooting
11.4 Storage Options
Video 11.4.1 Storage Options
Check for Understanding 11.4.2 Storage Options Quiz
Connection 11.4.3 Security of Cloud Storage
Free Response 11.4.4 Security of Cloud Storage
Free Response 11.4.5 Storage Suggestions
11.5 Network Options
Video 11.5.1 Network Options
Check for Understanding 11.5.2 Network Options Quiz
Connection 11.5.3 What is an SSID?
Free Response 11.5.4 What is an SSID?
Free Response 11.5.5 Wireless Network Setup
11.6 Network Communication
Video 11.6.1 Network Communication
Check for Understanding 11.6.2 Network Communication Quiz
Example 11.6.3 Setting up a Firewall
Free Response 11.6.4 iptables
Notes 11.6.5 iptables simulation
Connection 11.6.6 What is Virtualization?
Free Response 11.6.7 Virtualization Response
11.7 Network Management
Notes 11.7.1 Linux/MacOS vs. Windows
Video 11.7.2 Network Management
Check for Understanding 11.7.3 Network Management Quiz
Example 11.7.4 MacOS Terminal Simulation
Example 11.7.5 Windows Command Prompt Simulation
Video 11.7.6 Windows Command Prompt Spy
Free Response 11.7.7 Windows Command Prompt Spy
Notes 11.7.8 SSH Logs
Example 11.7.9 SSH Logs
Free Response 11.7.10 Reading Logs
11.8 Private Networks
Video 11.8.1 IP and MAC Addresses
Check for Understanding 11.8.2 IP and MAC Addresses Quiz
Example 11.8.3 Intranet Permissions
Free Response 11.8.4 Coffee Shop: Design an Intranet
Video 11.8.5 DMZs and VPNs
Check for Understanding 11.8.6 DMZs and VPNs Quiz
Connection 11.8.7 Protecting Privacy with VPNs
Free Response 11.8.8 Protecting Privacy with VPNs
Free Response 11.8.9 Coffee Shop: Network Plan
Free Response 11.8.10 Coffee Shop: Network Diagram
Video 11.8.11 SOHO Network
Example 11.8.12 Network Topologies
11.9 IT Infrastructure Quiz
Unit Quiz 11.9.1 IT Infrastructure Quiz
12. Project: Troubleshooting
12.1 Methodology
Notes 12.1.1 Troubleshooting Methodology
Free Response 12.1.2 Identify the Problem
Free Response 12.1.3 Research Solutions
Free Response 12.1.4 Establish a Theory
Free Response 12.1.5 Test the Theory
Free Response 12.1.6 Fix the Problem!
12.2 Support Practice
Exercise 12.2.1 Signal Strength
Exercise 12.2.2 Interference
13. Risk Management
13.1 Identifying Risks
Video 13.1.1 Identifying Risks
Check for Understanding 13.1.2 Identifying Risks Quiz
Connection 13.1.3 What is a Honeypot?
Connection 13.1.4 Honeypot Attacks
Free Response 13.1.5 Honeypot Attacks
Connection 13.1.6 Whois
Free Response 13.1.7 Whois
Connection 13.1.8 Packet Sniffing
Free Response 13.1.9 Packet Sniffing Response
Free Response 13.1.10 Breach Trends
13.2 Assessing Risks
Notes 13.2.1 Assessing Risks
Free Response 13.2.2 Malware Risk Assessment
Free Response 13.2.3 Poor Password Assessment
Free Response 13.2.4 Social Engineering Assessment
Video 13.2.5 Assessing Risks
Check for Understanding 13.2.6 Assessing Risks Quiz
Connection 13.2.7 End-of-Life OS
Free Response 13.2.8 End-of-Life Proposal
Example 13.2.9 Input Handling
Free Response 13.2.10 Input Handling Responses
Example 13.2.11 Input Validation
Free Response 13.2.12 Input Validation Responses
13.3 Risk Response
Video 13.3.1 Risk Response
Check for Understanding 13.3.2 Risk Response
Free Response 13.3.3 Defense in Depth Risk Mitigation
Connection 13.3.4 Sample Risk Assessment Report
Free Response 13.3.5 Sample Risk Assessment Reflection
Connection 13.3.6 Delta Outage Video
Free Response 13.3.7 Delta Outage Reflection
Connection 13.3.8 What Happens When Your Servers Go Down
Free Response 13.3.9 What Happens When Your Servers Go Down Reflection
Free Response 13.3.10 Server Upgrade Memo
13.4 Penetration Testing
Video 13.4.1 Penetration Testing
Check for Understanding 13.4.2 Penetration Testing
Connection 13.4.3 Penetration Test Report
Free Response 13.4.4 Penetration Test Report
Notes 13.4.5 Chaos Engineering
Free Response 13.4.6 Chaos Engineering Reflection
Resource 13.4.7 Pen Test Simulation Handout
Exercise 13.4.8 Pen Test Simulation: Active Recon
Exercise 13.4.9 Pen Test Simulation: Exploit Vulnerabilities
13.5 Risk Management Quiz
Unit Quiz 13.5.1 Risk Management Quiz
14. Final Exam
14.1 Final Exam
Final 14.1.1 Final Exam
15. What's Next?
15.1 After Fundamentals of Cybersecurity
Notes 15.1.1 Cybersecurity Pathways
Connection 15.1.2 CodeHS Advanced Cybersecurity
Notes 15.1.3 College Pathway
Connection 15.1.4 Certification Pathway
Connection 15.1.5 Career Spotlight
Free Response 15.1.6 My Pathway