Activity | Points | Item Type |
---|---|---|
What is Cybersecurity? | ||
1.1 Welcome to Cybersecurity Fundamentals | Lesson | |
1.1.1 Course Introduction | 1 | Notes |
1.1.2 Course Goals | 5 | Free Response |
1.2 Module Overview - Cybersecurity | Lesson | |
1.2.1 Welcome to Cybersecurity | 1 | Video |
1.2.2 Welcome to Cybersecurity | 2 | Check for Understanding |
1.2.3 Intruder Alert! | 1 | Example |
1.2.4 Cybersecurity and You | 5 | Free Response |
1.2.5 Course Goals | 5 | Free Response |
1.3 What is Cybersecurity? | Lesson | |
1.3.1 What is Cybersecurity? | 1 | Video |
1.3.2 What is Cybersecurity? | 3 | Check for Understanding |
1.3.3 City Services Ransomware | 1 | Connection |
1.3.4 Ransomware Reflection | 5 | Free Response |
1.3.5 Ransomware Simulator | 1 | Example |
1.3.6 Internet of Things | 1 | Connection |
1.3.7 Hackers vs. Smart Homes | 1 | Connection |
1.3.8 Internet of Things Reflection | 5 | Free Response |
1.4 Impact of Cybersecurity | Lesson | |
1.4.1 Impact of Cybersecurity | 1 | Video |
1.4.2 Impact of Cybersecurity | 2 | Check for Understanding |
1.4.3 Phishing Simulator | 1 | Example |
1.4.4 Phishing for Your Info | 1 | Connection |
1.4.5 Phishing Reflection | 5 | Free Response |
1.4.6 Cyberterrorism | 1 | Connection |
1.4.7 Cyberterrorism Response | 5 | Free Response |
1.4.8 Cyber Game | 1 | Connection |
1.4.9 Cyber Game Reflection | 5 | Free Response |
1.5 The CIA Triad | Lesson | |
1.5.1 CIA Triad | 1 | Video |
1.5.2 CIA Triad | 2 | Check for Understanding |
1.5.3 Which part of the CIA Triad? | 5 | Free Response |
1.5.4 Which part of the CIA Triad? | 5 | Free Response |
1.5.5 Breach of Confidentiality | 5 | Free Response |
1.5.6 Breach of Availability | 5 | Free Response |
1.5.7 CIA Connections | 5 | Free Response |
1.6 What is Cybersecurity? Quiz | Lesson | |
1.6.1 What is Cybersecurity? Quiz | 15 | Unit Quiz |
Digital Citizenship and Cyber Hygiene | ||
2.1 Digital Footprint and Reputation | Lesson | |
2.1.1 Digital Footprint and Reputation | 1 | Video |
2.1.2 Digital Footprint and Reputation | 3 | Check for Understanding |
2.1.3 Social Media Clean-up | 1 | Example |
2.1.4 Building a Positive Digital Footprint | 5 | Free Response |
2.1.5 Right to be Forgotten? | 1 | Connection |
2.1.6 Right to be Forgotten | 5 | Free Response |
2.1.7 What is your Digital Footprint? | 5 | Free Response |
2.2 Cyberbullying | Lesson | |
2.2.1 Cyberbullying | 1 | Video |
2.2.2 Cyberbullying | 3 | Check for Understanding |
2.2.3 Scenario: Student Ranking | 5 | Free Response |
2.2.4 Scenario: Singled Out | 5 | Free Response |
2.2.5 Stopping Cyberbullying | 5 | Free Response |
2.3 Internet Safety | Lesson | |
2.3.1 Internet Safety | 1 | Video |
2.3.2 Internet Safety | 2 | Check for Understanding |
2.3.3 Scenario: School Stranger | 5 | Free Response |
2.3.4 Scenario: Vacation Pals | 5 | Free Response |
2.3.5 Staying Safe | 5 | Free Response |
2.4 Privacy & Security | Lesson | |
2.4.1 What is Data Privacy & Security? | 1 | Video |
2.4.2 Privacy & Security Quiz | 2 | Check for Understanding |
2.4.3 Google Privacy Policy Search | 1 | Connection |
2.4.4 Google Privacy Policy Search | 5 | Free Response |
2.4.5 Guess: Password List | 1 | Example |
2.4.6 Guess: Using an Algorithm | 1 | Example |
2.4.7 Guess: Brute Force | 1 | Example |
2.4.8 How Strong is your Password? | 1 | Connection |
2.4.9 How Strong is your password? | 5 | Free Response |
2.4.10 You Can Be Tracked! | 1 | Example |
2.5 Information Literacy | Lesson | |
2.5.1 Information Literacy | 1 | Video |
2.5.2 Information Literacy | 2 | Check for Understanding |
2.5.3 Effective Internet Searches | 5 | Free Response |
2.5.4 Evaluate the Source 1 | 1 | Connection |
2.5.5 Respond: Evaluate the Source 1 | 5 | Free Response |
2.5.6 Evaluate the Source 2 | 1 | Notes |
2.5.7 Respond: Evaluate the Source 2 | 5 | Free Response |
2.5.8 Hero Pig? | 1 | Connection |
2.5.9 Respond: Hero Pig? | 5 | Free Response |
2.6 Creative Credit & Copyright | Lesson | |
2.6.1 Creative Credit and Copyright | 1 | Video |
2.6.2 Creative Credit and Copyright | 2 | Check for Understanding |
2.6.3 Cite! | 5 | Free Response |
2.6.4 Exploring Creative Commons | 1 | Connection |
2.6.5 Respond: Creative Commons | 5 | Free Response |
2.6.6 Task: Finding Images | 5 | Free Response |
2.6.7 Reflection: Why is Copyright Important? | 5 | Free Response |
2.7 Hacking Ethics | Lesson | |
2.7.1 Hacking Ethics & Legality | 1 | Video |
2.7.2 Hacking Ethics & Legality | 3 | Check for Understanding |
2.7.3 Penetration Testing | 1 | Connection |
2.7.4 Reflection: Penetration Testing | 5 | Free Response |
2.7.5 Hack the Pentagon? | 1 | Connection |
2.7.6 Reflection: Hack the Pentagon | 5 | Free Response |
2.7.7 Ethical Hacker Agreement | 1 | Check for Understanding |
2.8 Digital Citizenship and Cybersecurity Quiz | Lesson | |
2.8.1 Digital Citizenship and Cyber Hygiene Quiz | 20 | Unit Quiz |
Project: Public Service Announcement | ||
3.1 Project: Public Service Announcement | Lesson | |
3.1.1 Pick a Topic | 5 | Free Response |
3.1.2 Research | 5 | Free Response |
3.1.3 Choose Your Audience | 5 | Free Response |
3.1.4 What kind of PSA? | 5 | Free Response |
3.1.5 Draft your PSA | 5 | Free Response |
3.1.6 Finalize your PSA! | 15 | Free Response |
The ABCs of Cryptography | ||
4.1 Cryptography, Cryptology, Cryptanalysis | Lesson | |
4.1.1 Cryptography, Cryptology, Cryptanalysis | 1 | Video |
4.1.2 Cryptography, Cryptology, Cryptanalysis | 2 | Check for Understanding |
4.1.3 Cryptogram Game! | 1 | Example |
4.1.4 Why encrypt? | 1 | Video |
4.1.5 Why encrypt? | 2 | Check for Understanding |
4.1.6 Encrypt/Decrypt | 1 | Example |
4.2 History of Cryptography | Lesson | |
4.2.1 Cryptography: A Brief History | 1 | Video |
4.2.2 Cryptography History Quiz | 2 | Check for Understanding |
4.2.3 How the Enigma Worked | 1 | Connection |
4.2.4 How the Enigma Worked | 5 | Free Response |
4.2.5 Unknown Languages and the Future of Cryptography | 1 | Connection |
4.2.6 The Future of Cybersecurity | 5 | Free Response |
4.3 Basic Crypto Systems: Caesar Cipher | Lesson | |
4.3.1 Caesar Cipher | 1 | Video |
4.3.2 Caesar Cipher | 2 | Check for Understanding |
4.3.3 Caesar Cipher Encryption | 1 | Example |
4.3.4 Decrypt Caesar's Cipher! | 1 | Example |
4.4 Basic Crypto Systems: Cracking Caesar | Lesson | |
4.4.1 Cracking Caesar Cipher | 1 | Video |
4.4.2 Cracking Caesar Cipher | 2 | Check for Understanding |
4.4.3 Cracking Caesar with Brute Force | 1 | Example |
4.4.4 Letter Frequency and Caesar | 1 | Example |
4.4.5 Examining Caesar Cipher | 5 | Free Response |
4.5 Basic Crypto Systems: Vigenere Cipher | Lesson | |
4.5.1 Vigenere Cipher | 1 | Video |
4.5.2 Vigenere Cipher | 1 | Check for Understanding |
4.5.3 Vigenere Cipher Example | 1 | Example |
4.5.4 Letter Frequency and Vigenere Cipher | 1 | Example |
4.5.5 Examining Vigenere Cipher | 5 | Free Response |
4.5.6 Improving Vigenere | 1 | Example |
4.6 The ABCs of Cryptography Quiz | Lesson | |
4.6.1 The ABCs of Cryptography Quiz | 15 | Unit Quiz |
Advanced Cryptography | ||
5.1 Welcome to Advanced Cybersecurity! | Lesson | |
5.1.1 Course Introduction | 1 | Notes |
5.1.2 Cybersecurity 101 | 1 | Connection |
5.1.3 Cyber Heat Map | 5 | Free Response |
5.1.4 Career Pathways | 5 | Free Response |
5.1.5 Starting with Cryptography | 1 | Connection |
5.1.6 Course Goals | 5 | Free Response |
5.2 Encryption Algorithms | Lesson | |
5.2.1 Symmetric Encryption | 1 | Video |
5.2.2 Ciphers Quiz | 2 | Check for Understanding |
5.2.3 Enhanced Caesar Cipher | 5 | Free Response |
5.2.4 Mixed Alphabet Cipher | 5 | Free Response |
5.2.5 Pigpen Encoder | 1 | Example |
5.2.6 Pigpen Cipher | 5 | Free Response |
5.2.7 Rail Fence Cipher | 5 | Free Response |
5.2.8 Encryption Standards | 1 | Video |
5.2.9 Encryption Standards Quiz | 3 | Check for Understanding |
5.3 Advanced Cryptography | Lesson | |
5.3.1 Advanced Cryptography | 1 | Video |
5.3.2 Advanced Cryptography | 3 | Check for Understanding |
5.3.3 Public Key Cryptography for Non-Geeks | 1 | Connection |
5.3.4 Examining Public Key Cryptography | 5 | Free Response |
5.3.5 Public Key Cryptography | 1 | Connection |
5.3.6 Public Key Cryptography | 5 | Free Response |
5.4 Hash Functions | Lesson | |
5.4.1 Hash Functions | 1 | Video |
5.4.2 Hash Functions | 3 | Check for Understanding |
5.4.3 Google Shattered Crypto Algorithm | 1 | Connection |
5.4.4 Hash Functions in the News | 5 | Free Response |
5.4.5 Using a Hash Generator | 1 | Connection |
5.4.6 Hash Generator | 5 | Free Response |
5.4.7 Password Salting | 1 | Connection |
5.4.8 Password Salting | 5 | Free Response |
5.5 Hash Function Development | Lesson | |
5.5.1 Hash Function Development | 1 | Video |
5.5.2 Hash Function Development | 2 | Check for Understanding |
5.5.3 Modulo Math Calculator | 1 | Example |
5.5.4 Understanding Modulo Math | 1 | Example |
5.5.5 Modulo Game! | 1 | Example |
5.5.6 Develop a Simple Hash Function | 5 | Exercise |
5.6 Asymmetric Encryption | Lesson | |
5.6.1 Asymmetric Encryption | 1 | Video |
5.6.2 Asymmetric Encryption Quiz | 5 | Check for Understanding |
5.6.3 Diffie-Hellman Key Exchange | 1 | Example |
5.6.4 Affine Cipher | 5 | Free Response |
5.6.5 Trapdoor Functions | 5 | Free Response |
5.6.6 Public-Key Encryption Explorer | 1 | Notes |
5.6.7 Public-Key Encryption Explorer Reflection | 5 | Free Response |
5.7 Digital Certificates | Lesson | |
5.7.1 Digital Certificates | 1 | Video |
5.7.2 Digital Certificates | 4 | Check for Understanding |
5.7.3 SSL Explained | 1 | Connection |
5.7.4 SSL Explained Response | 5 | Free Response |
5.7.5 Digital Certificate Connection | 5 | Free Response |
5.7.6 In The News | 1 | Connection |
5.7.7 In The News Response | 5 | Free Response |
5.7.8 Become a Certificate Authority! | 10 | Free Response |
5.8 Advanced Cryptography Quiz | Lesson | |
5.8.1 Advanced Cryptography Quiz | 20 | Unit Quiz |
Project: Steganography | ||
6.1 Project: Steganography | Lesson | |
6.1.1 What is Steganography? | 1 | Video |
6.1.2 Government Surveillance and Reality Winner | 1 | Connection |
6.1.3 Government Surveillance and Reality Winner | 5 | Free Response |
6.1.4 Data Hiding and Extraction | 1 | Connection |
6.1.5 Reflect: Data Hiding and Extraction | 5 | Free Response |
6.1.6 Hide Text | 1 | Example |
6.1.7 Hidden Message | 1 | Example |
6.1.8 Your turn: Encryption Algorithm | 5 | Free Response |
6.1.9 Your turn: Image Creation | 10 | Challenge |
6.1.10 Final Algorithm and Partner Decode | 5 | Free Response |
6.1.11 Final Reflection | 5 | Free Response |
System Administration | ||
7.1 Operating Systems | Lesson | |
7.1.1 Operating Systems | 1 | Video |
7.1.2 Operating Systems Quiz | 5 | Check for Understanding |
7.1.3 Detect My OS | 1 | Example |
7.1.4 Windows OS Installation Simulation | 1 | Example |
7.1.5 Installing an OS | 5 | Free Response |
7.1.6 Upgrading a Mac OS | 1 | Connection |
7.2 Comparing Operating Systems | Lesson | |
7.2.1 Comparing Operating Systems | 1 | Video |
7.2.2 Comparing Operating Systems Quiz | 5 | Check for Understanding |
7.2.3 Windows Simulation | 1 | Example |
7.2.4 MacOS Simulation | 1 | Example |
7.2.5 Choose a Linux Distro! | 1 | Connection |
7.2.6 Which would you choose? | 5 | Free Response |
7.3 Compatibility | Lesson | |
7.3.1 Compatibility | 1 | Video |
7.3.2 Compatibility Quiz | 3 | Check for Understanding |
7.3.3 What Processor? Windows | 1 | Example |
7.3.4 What Processor? Mac | 1 | Example |
7.3.5 What Processor are you running? | 5 | Free Response |
7.4 Software and Applications | Lesson | |
7.4.1 Software and Applications | 1 | Video |
7.4.2 Software and Applications Quiz | 2 | Check for Understanding |
7.4.3 Spreadsheet Simulation | 1 | Example |
7.4.4 Messaging Simulation | 1 | Example |
7.4.5 Kanban Board Simulation | 1 | Example |
7.4.6 Software Simulations | 5 | Free Response |
7.5 Software Licenses | Lesson | |
7.5.1 Software Licenses | 1 | Video |
7.5.2 Software Licenses Quiz | 3 | Check for Understanding |
7.5.3 Do I need a Software License? | 5 | Free Response |
7.5.4 Is This Original? | 5 | Free Response |
7.6 Application Security | Lesson | |
7.6.1 Application Security | 1 | Video |
7.6.2 Application Security | 5 | Check for Understanding |
7.6.3 Windows Updates | 1 | Example |
7.6.4 Windows Defender Antivirus | 1 | Connection |
7.6.5 Windows Defender Antivirus | 5 | Free Response |
7.6.6 CodeHS System Restore | 5 | Free Response |
7.7 Browser Configuration | Lesson | |
7.7.1 Browser Configuration | 1 | Video |
7.7.2 Browser Configuration | 5 | Check for Understanding |
7.7.3 Cached CodeHS | 1 | Connection |
7.7.4 Cached CodeHS | 5 | Free Response |
7.7.5 Is Your Popup Blocker On? | 1 | Example |
7.7.6 Browser Extensions Lab | 5 | Free Response |
7.8 System Administration | Lesson | |
7.8.1 User Accounts | 1 | Video |
7.8.2 User Accounts Quiz | 2 | Check for Understanding |
7.8.3 User Accounts | 5 | Free Response |
7.8.4 Shared Folders and Files | 5 | Free Response |
7.8.5 Host Security | 1 | Video |
7.8.6 Host Security Quiz | 3 | Check for Understanding |
7.8.7 Security Baseline | 5 | Free Response |
7.9 Access Control | Lesson | |
7.9.1 Access Control | 1 | Video |
7.9.2 Access Control | 4 | Check for Understanding |
7.9.3 Multifactor Authentication | 1 | Example |
7.9.4 Two Factor Authentication | 1 | Example |
7.9.5 Two Factor Authentication Reflection | 5 | Free Response |
7.9.6 RADIUS Overview with AAA Protocol | 1 | Connection |
7.9.7 RADIUS Server Access Control | 1 | Connection |
7.9.8 RADIUS Reflection | 5 | Free Response |
7.10 Command Line Interface | Lesson | |
7.10.1 Linux/MacOS vs. Windows | 1 | Notes |
7.10.2 Command Line Interface | 1 | Video |
7.10.3 Command Line Interface Quiz | 5 | Check for Understanding |
7.10.4 Command Equivalents | 1 | Resource |
7.10.5 Windows Command Prompt | 1 | Video |
7.10.6 Windows Command Prompt | 5 | Free Response |
7.10.7 Directory Directions | 5 | Free Response |
7.10.8 Neural Interface? | 1 | Connection |
7.10.9 Neural Interface? | 5 | Free Response |
7.11 System Administration Quiz | Lesson | |
7.11.1 Mindsets | 1 | Survey |
7.11.2 System Administration Quiz | 20 | Unit Quiz |
Cyber Defense | ||
8.1 Network Attacks | Lesson | |
8.1.1 Network Attacks Overview | 1 | Video |
8.1.2 Network Attacks Quiz | 4 | Check for Understanding |
8.1.3 Check for Vulnerabilities | 1 | Notes |
8.1.4 Bug Bounty Hunting | 1 | Connection |
8.1.5 Bug Bounty Hunting | 5 | Free Response |
8.1.6 Common Port Targets | 1 | Connection |
8.1.7 Port Scanner Simulation | 1 | Example |
8.1.8 Open Port Reflection | 5 | Free Response |
8.2 Malware Types and Prevention | Lesson | |
8.2.1 Malware Types and Prevention | 1 | Video |
8.2.2 Malware Types and Prevention | 5 | Check for Understanding |
8.2.3 How Anti-malware Works | 1 | Connection |
8.2.4 How Anti-malware Works | 5 | Free Response |
8.2.5 OS Malware Security | 5 | Free Response |
8.2.6 Reverse Engineering Malware | 5 | Free Response |
8.3 What is SQL? | Lesson | |
8.3.1 What is SQL Overview | 1 | Notes |
8.3.2 Intro to SQL | 1 | Video |
8.3.3 Quiz: What is SQL? | 1 | Check for Understanding |
8.3.4 How to Structure Data in SQL | 1 | Video |
8.3.5 How to Structure Data in SQL | 3 | Check for Understanding |
8.3.6 SQL Tables | 1 | Example |
8.3.7 SQL Tables Response | 5 | Free Response |
8.4 Basic Querying in SQL | Lesson | |
8.4.1 The SELECT Statement | 1 | Video |
8.4.2 Basic Querying in SQL | 1 | Check for Understanding |
8.4.3 Our First SELECT Statement | 1 | Example |
8.4.4 Your First SELECT Statement | 5 | Exercise |
8.4.5 More SELECT Statement | 1 | Video |
8.4.6 More SELECT Statement | 1 | Check for Understanding |
8.4.7 Selecting Specific Columns | 1 | Example |
8.4.8 Harry Potter Names | 5 | Exercise |
8.5 Filtering Queries in SQL | Lesson | |
8.5.1 The WHERE Clause | 1 | Video |
8.5.2 Condition Operators | 1 | Check for Understanding |
8.5.3 Ravenclaw House | 1 | Example |
8.5.4 People in Gryffindor | 1 | Example |
8.5.5 Filter By ID | 1 | Example |
8.5.6 The Weasleys | 5 | Exercise |
8.5.7 The Potters | 5 | Exercise |
8.6 Common Security Problems | Lesson | |
8.6.1 Common Security Problems | 1 | Video |
8.6.2 Common Security Problems | 1 | Check for Understanding |
8.6.3 Meet Security Engineers at Google | 1 | Connection |
8.6.4 Security Engineering Reflection | 5 | Free Response |
8.6.5 Living in a Digital World | 1 | Video |
8.6.6 Living in a Digital World | 5 | Free Response |
8.7 SQL Injection Overview | Lesson | |
8.7.1 SQL Injection Overview | 1 | Video |
8.7.2 SQL Injection Overview | 2 | Check for Understanding |
8.7.3 Equifax Security Breach | 1 | Connection |
8.7.4 Equifax Exposed Millions | 1 | Connection |
8.7.5 Equifax SQL Injection Attack | 5 | Free Response |
8.7.6 SQLi | 1 | Example |
8.8 Types of SQLi and Prevention | Lesson | |
8.8.1 Types of SQLi | 1 | Video |
8.8.2 Types of SQLi | 3 | Check for Understanding |
8.8.3 Preventing SQLi | 1 | Video |
8.8.4 Preventing SQLi | 2 | Check for Understanding |
8.8.5 Mitigating SQL Injection | 1 | Connection |
8.8.6 Reflection: Mitigating SQL Injection | 5 | Free Response |
8.8.7 SQL Injection Practice | 1 | Connection |
8.9 Software Security Quiz | Lesson | |
8.9.1 Software Security Quiz | 15 | Unit Quiz |
Project: Security Assessment Report | ||
9.1 Project: Security Assessment Report | Lesson | |
9.1.1 Project Requirements | 1 | Notes |
9.1.2 Supercar Showdown Website | 1 | Connection |
9.1.3 SQL Injection Testing | 5 | Free Response |
9.1.4 SQLi Testing Handout | 1 | Resource |
9.1.5 Security Assessment Report | 15 | Free Response |
9.1.6 Project Reflection | 5 | Free Response |
Networking Fundamentals | ||
10.1 Introduction to the Internet | Lesson | |
10.1.1 Welcome to the Internet | 1 | Video |
10.1.2 Intro to the Internet | 3 | Check for Understanding |
10.1.3 Inside Facebook's Connectivity Lab | 1 | Connection |
10.1.4 Connectivity Lab Reflection | 5 | Free Response |
10.2 Notational Systems | Lesson | |
10.2.1 Number Systems | 1 | Video |
10.2.2 Number Systems Quiz | 2 | Check for Understanding |
10.2.3 Number Base Tool | 1 | Notes |
10.2.4 Decimal to Binary | 1 | Video |
10.2.5 Decimal to Binary Quiz | 3 | Check for Understanding |
10.2.6 Binary Game | 5 | Exercise |
10.3 Data Representation | Lesson | |
10.3.1 Hexadecimal | 1 | Video |
10.3.2 Hexadecimal Quiz | 2 | Check for Understanding |
10.3.3 Binary to Hex Game | 5 | Exercise |
10.3.4 Encoding Text with Binary | 1 | Video |
10.3.5 Encoding Text with Binary Quiz | 2 | Check for Understanding |
10.3.6 Custom Encoding | 1 | Example |
10.3.7 Bits to ASCII | 1 | Example |
10.3.8 Hello World in Bits | 5 | Exercise |
10.4 Internet Hardware and Sending Information | Lesson | |
10.4.1 Internet Hardware | 1 | Video |
10.4.2 Internet Hardware | 2 | Check for Understanding |
10.4.3 Sending Information | 1 | Video |
10.4.4 Sending Information | 3 | Check for Understanding |
10.4.5 The Internet is in the Ocean | 1 | Connection |
10.4.6 Internet in the Ocean Reflection | 5 | Free Response |
10.5 Internet Addresses | Lesson | |
10.5.1 Internet Addresses | 1 | Video |
10.5.2 Internet Addresses | 2 | Check for Understanding |
10.5.3 The Need for Addresses | 5 | Free Response |
10.5.4 IPv4 vs. IPv6 | 1 | Connection |
10.5.5 Reflection: IPv4 vs IPv6 | 5 | Free Response |
10.6 Domain Name System (DNS) | Lesson | |
10.6.1 Domain Name System (DNS) | 1 | Video |
10.6.2 Domain Name System | 2 | Check for Understanding |
10.6.3 How Does DNS Work? | 1 | Connection |
10.6.4 How Does DNS Work? | 5 | Free Response |
10.7 Routing | Lesson | |
10.7.1 Routing | 1 | Video |
10.7.2 Routing | 3 | Check for Understanding |
10.7.3 Redundancy | 5 | Free Response |
10.8 Packets & Protocols | Lesson | |
10.8.1 Packets | 1 | Video |
10.8.2 Packets | 2 | Check for Understanding |
10.8.3 Protocols | 1 | Video |
10.8.4 Protocols | 3 | Check for Understanding |
10.8.5 How the Internet Works | 1 | Connection |
10.8.6 The Journey of an Image | 5 | Free Response |
10.9 Viewing a Webpage | Lesson | |
10.9.1 Viewing a Webpage | 1 | Video |
10.9.2 Viewing a Webpage | 2 | Check for Understanding |
10.9.3 Explaining a URL | 5 | Free Response |
10.9.4 Net Neutrality Explained | 1 | Connection |
10.9.5 FCCs Net Neutrality Rules Officially Repealed | 1 | Connection |
10.9.6 Take a Side on Net Neutrality | 5 | Free Response |
10.9.7 Net Neutrality and Cybersecurity | 1 | Connection |
10.9.8 Net Neutrality and Cybersecurity Research | 5 | Free Response |
10.10 Impact of the Internet | Lesson | |
10.10.1 Impact of the Internet | 1 | Video |
10.10.2 Impact of the Internet | 3 | Check for Understanding |
10.10.3 What is the Digital Divide? | 1 | Connection |
10.10.4 What is the Digital Divide? | 5 | Free Response |
10.11 Networking Fundamentals Quiz | Lesson | |
10.11.1 Mindsets | 1 | Survey |
10.11.2 Networking Fundamentals Quiz | 15 | Unit Quiz |
IT Infrastructure | ||
11.1 Internal Components | Lesson | |
11.1.1 Internal Components | 1 | Video |
11.1.2 Internal Components | 5 | Check for Understanding |
11.1.3 Build a Computer | 1 | Connection |
11.1.4 Build a Computer | 5 | Free Response |
11.1.5 Test Your Brain's RAM! | 1 | Example |
11.1.6 Test Your Brain's RAM! Reflection | 5 | Free Response |
11.2 Peripheral Devices | Lesson | |
11.2.1 Peripheral Devices | 1 | Video |
11.2.2 Peripheral Devices | 5 | Check for Understanding |
11.2.3 Personalized Peripherals | 5 | Free Response |
11.2.4 IT Help | 5 | Free Response |
11.2.5 Your Ideal Computer Setup | 5 | Free Response |
11.3 Network Devices | Lesson | |
11.3.1 Network Devices | 1 | Video |
11.3.2 Network Devices | 5 | Check for Understanding |
11.3.3 Speed Test | 1 | Connection |
11.3.4 Speed Test | 5 | Free Response |
11.3.5 Fiber Optics Bend Light! | 1 | Connection |
11.3.6 Fiber Optics Bend Light! | 5 | Free Response |
11.3.7 Ethernet Standards | 1 | Connection |
11.3.8 Ethernet Standards | 5 | Free Response |
11.3.9 Network Troubleshooting | 5 | Free Response |
11.4 Storage Options | Lesson | |
11.4.1 Storage Options | 1 | Video |
11.4.2 Storage Options Quiz | 5 | Check for Understanding |
11.4.3 Security of Cloud Storage | 1 | Connection |
11.4.4 Security of Cloud Storage | 5 | Free Response |
11.4.5 Storage Suggestions | 5 | Free Response |
11.5 Network Options | Lesson | |
11.5.1 Network Options | 1 | Video |
11.5.2 Network Options Quiz | 5 | Check for Understanding |
11.5.3 What is an SSID? | 1 | Connection |
11.5.4 What is an SSID? | 5 | Free Response |
11.5.5 Wireless Network Setup | 5 | Free Response |
11.6 Network Communication | Lesson | |
11.6.1 Network Communication | 1 | Video |
11.6.2 Network Communication Quiz | 2 | Check for Understanding |
11.6.3 Setting up a Firewall | 1 | Example |
11.6.4 iptables | 5 | Free Response |
11.6.5 iptables simulation | 1 | Notes |
11.6.6 What is Virtualization? | 1 | Connection |
11.6.7 Virtualization Response | 5 | Free Response |
11.7 Network Management | Lesson | |
11.7.1 Linux/MacOS vs. Windows | 1 | Notes |
11.7.2 Network Management | 1 | Video |
11.7.3 Network Management Quiz | 3 | Check for Understanding |
11.7.4 MacOS Terminal Simulation | 1 | Example |
11.7.5 Windows Command Prompt Simulation | 1 | Example |
11.7.6 Windows Command Prompt Spy | 5 | Video |
11.7.7 Windows Command Prompt Spy | 5 | Free Response |
11.7.8 SSH Logs | 1 | Notes |
11.7.9 SSH Logs | 1 | Example |
11.7.10 SSH Logs Submission | 5 | Free Response |
11.8 Private Networks | Lesson | |
11.8.1 IP and MAC Addresses | 1 | Video |
11.8.2 IP and MAC Addresses Quiz | 2 | Check for Understanding |
11.8.3 Intranet Permissions | 1 | Example |
11.8.4 Coffee Shop: Design an Intranet | 5 | Free Response |
11.8.5 DMZs and VPNs | 1 | Video |
11.8.6 DMZs and VPNs Quiz | 3 | Check for Understanding |
11.8.7 Protecting Privacy with VPNs | 1 | Connection |
11.8.8 Protecting Privacy with VPNs | 5 | Free Response |
11.8.9 Coffee Shop: Network Plan | 5 | Free Response |
11.8.10 Coffee Shop: Network Diagram | 5 | Free Response |
11.8.11 SOHO Network | 1 | Video |
11.8.12 Network Topologies | 1 | Example |
11.9 IT Infrastructure Quiz | Lesson | |
11.9.1 IT Infrastructure Quiz | 20 | Unit Quiz |
Project: Troubleshooting | ||
12.1 Methodology | Lesson | |
12.1.1 Troubleshooting Methodology | 1 | Notes |
12.1.2 Identify the Problem | 5 | Free Response |
12.1.3 Research Solutions | 5 | Free Response |
12.1.4 Establish a Theory | 5 | Free Response |
12.1.5 Test the Theory | 5 | Free Response |
12.1.6 Fix the Problem! | 5 | Free Response |
12.2 Support Practice | Lesson | |
12.2.1 Signal Strength | 10 | Exercise |
12.2.2 Interference | 10 | Exercise |
Risk Management | ||
13.1 Identifying Risks | Lesson | |
13.1.1 Identifying Risks | 1 | Video |
13.1.2 Identifying Risks Quiz | 5 | Check for Understanding |
13.1.3 What is a Honeypot? | 1 | Connection |
13.1.4 Honeypot Attacks | 1 | Connection |
13.1.5 Honeypot Attacks | 5 | Free Response |
13.1.6 Whois | 1 | Connection |
13.1.7 Whois | 5 | Free Response |
13.1.8 Packet Sniffing | 1 | Connection |
13.1.9 Packet Sniffing Response | 5 | Free Response |
13.1.10 Breach Trends | 5 | Free Response |
13.2 Assessing Risks | Lesson | |
13.2.1 Assessing Risks | 1 | Notes |
13.2.2 Malware Risk Assessment | 5 | Free Response |
13.2.3 Poor Password Assessment | 5 | Free Response |
13.2.4 Social Engineering Assessment | 5 | Free Response |
13.2.5 Assessing Risks | 1 | Video |
13.2.6 Assessing Risks Quiz | 5 | Check for Understanding |
13.2.7 End-of-Life OS | 1 | Connection |
13.2.8 End-of-Life Proposal | 5 | Free Response |
13.2.9 Input Handling | 1 | Example |
13.2.10 Input Handling Responses | 5 | Free Response |
13.2.11 Input Validation | 1 | Example |
13.2.12 Input Validation Responses | 5 | Free Response |
13.3 Risk Response | Lesson | |
13.3.1 Risk Response | 1 | Video |
13.3.2 Risk Response | 5 | Check for Understanding |
13.3.3 Defense in Depth Risk Mitigation | 5 | Free Response |
13.3.4 Sample Risk Assessment Report | 5 | Connection |
13.3.5 Sample Risk Assessment Reflection | 5 | Free Response |
13.3.6 Delta Outage Video | 5 | Connection |
13.3.7 Delta Outage Reflection | 5 | Free Response |
13.3.8 What Happens When Your Servers Go Down | 5 | Connection |
13.3.9 What Happens When Your Servers Go Down Reflection | 5 | Free Response |
13.3.10 Server Upgrade Memo | 5 | Free Response |
13.4 Penetration Testing | Lesson | |
13.4.1 Penetration Testing | 1 | Video |
13.4.2 Penetration Testing | 5 | Check for Understanding |
13.4.3 Penetration Test Report | 5 | Connection |
13.4.4 Penetration Test Report | 5 | Free Response |
13.4.5 Chaos Engineering | 5 | Notes |
13.4.6 Chaos Engineering Reflection | 5 | Free Response |
13.4.7 Pen Test Simulation Handout | 5 | Resource |
13.4.8 Pen Test Simulation: Active Recon | 5 | Exercise |
13.4.9 Pen Test Simulation: Exploit Vulnerabilities | 5 | Exercise |
13.5 Risk Management Quiz | Lesson | |
13.5.1 Risk Management Quiz | 20 | Unit Quiz |
Final Exam | ||
14.1 Final Exam | Lesson | |
14.1.1 Final Exam | 25 | Final |
What's Next? | ||
15.1 After Fundamentals of Cybersecurity | Lesson | |
15.1.1 Cybersecurity Pathways | 1 | Notes |
15.1.2 CodeHS Advanced Cybersecurity | 1 | Connection |
15.1.3 College Pathway | 1 | Notes |
15.1.4 Certification Pathway | 1 | Connection |
15.1.5 Career Spotlight | 1 | Connection |
15.1.6 My Pathway | 5 | Free Response |
Programming Fundamentals | ||
16.1 Programming Concepts | Lesson | |
16.1.1 Programming Concepts | 1 | Video |
16.1.2 Programming Concepts Quiz | 5 | Check for Understanding |
16.1.3 Compilers vs. Interpreters | 1 | Connection |
16.1.4 Compilers vs. Interpreters | 5 | Free Response |
16.1.5 Variables in Action | 1 | Example |
16.1.6 Data Types using Typeof | 1 | Example |
16.1.7 Basic Variables | 1 | Example |
16.1.8 Daily Activities | 5 | Exercise |
16.2 Programming with Karel | Lesson | |
16.2.1 Learning to Program | 1 | Notes |
16.2.2 Programming With Karel | 1 | Video |
16.2.3 Quiz: Karel Commands | 1 | Check for Understanding |
16.2.4 Our First Karel Program | 1 | Example |
16.2.5 Your First Karel Program | 5 | Exercise |
16.2.6 Functions in Karel | 1 | Video |
16.2.7 Functions in Karel Quiz | 1 | Check for Understanding |
16.2.8 Turn Around | 1 | Example |
16.2.9 Digging Karel | 1 | Example |
16.2.10 Backflip | 5 | Exercise |
16.3 Looping | Lesson | |
16.3.1 For Loops | 1 | Video |
16.3.2 For Loops Quiz | 1 | Check for Understanding |
16.3.3 Take 'em All | 1 | Example |
16.3.4 For Loop Square | 1 | Example |
16.3.5 Lots of Hurdles | 5 | Exercise |
16.3.6 While Loops in Karel | 1 | Video |
16.3.7 While Loops in Karel Quiz | 2 | Check for Understanding |
16.3.8 Move to Wall | 1 | Example |
16.3.9 Big Tower | 1 | Example |
16.3.10 Follow The Yellow Ball Road | 5 | Exercise |
16.4 Branching | Lesson | |
16.4.1 If/Else Statements | 1 | Video |
16.4.2 If/Else Statements Quiz | 2 | Check for Understanding |
16.4.3 If/Else Statements | 1 | Example |
16.4.4 One Ball in Each Spot | 1 | Example |
16.4.5 Right Side Up | 5 | Exercise |
16.4.6 Programming with Karel Badge | 5 | Badge |
16.5 Arrays and Objects | Lesson | |
16.5.1 More JS Topics | 1 | Notes |
16.5.2 Arrays and Objects | 1 | Video |
16.5.3 Arrays and Objects | 5 | Check for Understanding |
16.5.4 Making an Array | 1 | Example |
16.5.5 List of Places to Travel | 5 | Exercise |
16.5.6 List of Prime Numbers | 5 | Exercise |
16.5.7 Phonebook | 1 | Example |
16.5.8 Sidekicks | 5 | Exercise |
16.6 Organizational Techniques | Lesson | |
16.6.1 Organizational Techniques | 1 | Video |
16.6.2 Organizational Techniques Quiz | 4 | Check for Understanding |
16.6.3 Hurdle Karel | 1 | Example |
16.6.4 One Ball in Each Spot | 5 | Exercise |
16.6.5 The Two Towers | 5 | Exercise |
16.6.6 Interactive Sequence Diagram | 1 | Example |
16.7 Programming Fundamentals Quiz | Lesson | |
16.7.1 Mindsets | 1 | Survey |
16.7.2 Programming Fundamentals Quiz | 15 | Unit Quiz |
Software Security | ||
17.1 Inside Web Apps | Lesson | |
17.1.1 Inside Web Apps | 1 | Video |
17.1.2 Inside Web Apps | 2 | Check for Understanding |
17.1.3 Using View Page Source | 5 | Free Response |
17.1.4 Recreate a Webpage? | 1 | Example |
17.1.5 Getting Started with OWASP | 1 | Connection |
17.1.6 Getting Started with OWASP | 5 | Free Response |
17.2 Developer Tools | Lesson | |
17.2.1 Developer Tools | 1 | Video |
17.2.2 Developer Tools | 3 | Check for Understanding |
17.2.3 Using the Developer Tools | 5 | Free Response |
17.2.4 Console Secrets | 5 | Exercise |
17.2.5 Local Storage | 1 | Example |
17.2.6 The Top Cybersecurity Blogs and Websites | 1 | Connection |
17.2.7 Selecting a Site to Follow | 5 | Free Response |
17.3 The Value of Data | Lesson | |
17.3.1 The Value of Data | 1 | Video |
17.3.2 The Value of Data Quiz | 5 | Check for Understanding |
17.3.3 Exploring Data Visualizations | 1 | Notes |
17.3.4 US Recorded Music Revenue | 1 | Connection |
17.3.5 National Parks | 1 | Connection |
17.3.6 March Madness | 1 | Connection |
17.3.7 Captain Marvel | 1 | Connection |
17.3.8 Respond: Visualizations | 5 | Free Response |
17.3.9 Free Response: Choosing a Visualization | 5 | Free Response |
17.3.10 Reflection: Design a Survey | 5 | Free Response |
17.4 Databases | Lesson | |
17.4.1 Databases | 1 | Video |
17.4.2 Databases | 1 | Check for Understanding |
17.4.3 Database Administrator Career | 1 | Connection |
17.4.4 Database Administrator Career | 5 | Free Response |
17.4.5 Parts of a Database | 1 | Video |
17.4.6 Parts of a Database | 1 | Check for Understanding |
17.4.7 SQL Database Diagram | 1 | Connection |
17.4.8 SQL Database Diagram | 5 | Free Response |
17.4.9 Schema Brainstorm | 5 | Free Response |
17.5 Clients and Servers | Lesson | |
17.5.1 Clients and Servers | 1 | Video |
17.5.2 Clients and Servers | 2 | Check for Understanding |
17.5.3 Inside a Google Data Center | 1 | Connection |
17.5.4 Inside a Google Data Center | 5 | Free Response |
17.5.5 Cloud Vulnerabilities | 1 | Connection |
17.5.6 Cloud Vulnerabilities Response | 5 | Free Response |
17.5.7 Client-Server Model | 1 | Video |
17.5.8 Client-Server Model | 2 | Check for Understanding |
17.5.9 The Future of User Privacy | 1 | Connection |
17.5.10 The Future of User Privacy | 5 | Free Response |
17.6 What is SQL? | Lesson | |
17.6.1 What is SQL Overview | 1 | Notes |
17.6.2 Intro to SQL | 1 | Video |
17.6.3 Quiz: What is SQL? | 1 | Check for Understanding |
17.6.4 How to Structure Data in SQL | 1 | Video |
17.6.5 How to Structure Data in SQL | 3 | Check for Understanding |
17.6.6 SQL Tables | 1 | Example |
17.6.7 SQL Tables Response | 5 | Free Response |
17.7 Basic Querying in SQL | Lesson | |
17.7.1 The SELECT Statement | 1 | Video |
17.7.2 Basic Querying in SQL | 1 | Check for Understanding |
17.7.3 Our First SELECT Statement | 1 | Example |
17.7.4 Your First SELECT Statement | 5 | Exercise |
17.7.5 More SELECT Statement | 1 | Video |
17.7.6 More SELECT Statement | 1 | Check for Understanding |
17.7.7 Selecting Specific Columns | 1 | Example |
17.7.8 Harry Potter Names | 5 | Exercise |
17.8 Filtering Queries in SQL | Lesson | |
17.8.1 The WHERE Clause | 1 | Video |
17.8.2 Condition Operators | 1 | Check for Understanding |
17.8.3 Ravenclaw House | 1 | Example |
17.8.4 People in Gryffindor | 1 | Example |
17.8.5 Filter By ID | 1 | Example |
17.8.6 The Weasleys | 5 | Exercise |
17.8.7 The Potters | 5 | Exercise |
17.9 Common Security Problems | Lesson | |
17.9.1 Common Security Problems | 1 | Video |
17.9.2 Common Security Problems | 1 | Check for Understanding |
17.9.3 Meet Security Engineers at Google | 1 | Connection |
17.9.4 Security Engineering Reflection | 5 | Free Response |
17.9.5 Living in a Digital World | 1 | Video |
17.9.6 Living in a Digital World | 5 | Free Response |
17.10 SQL Injection Overview | Lesson | |
17.10.1 SQL Injection Overview | 1 | Video |
17.10.2 SQL Injection Overview | 2 | Check for Understanding |
17.10.3 Equifax Security Breach | 1 | Connection |
17.10.4 Equifax Exposed Millions | 1 | Connection |
17.10.5 Equifax SQL Injection Attack | 5 | Free Response |
17.10.6 SQLi | 1 | Example |
17.11 Types of SQLi and Prevention | Lesson | |
17.11.1 Types of SQLi | 1 | Video |
17.11.2 Types of SQLi | 3 | Check for Understanding |
17.11.3 Preventing SQLi | 1 | Video |
17.11.4 Preventing SQLi | 2 | Check for Understanding |
17.11.5 Mitigating SQL Injection | 1 | Connection |
17.11.6 Reflection: Mitigating SQL Injection | 5 | Free Response |
17.11.7 SQL Injection Practice | 1 | Connection |
17.12 Software Security Quiz | Lesson | |
17.12.1 Software Security Quiz | 15 | Unit Quiz |
Advanced Networking | ||
18.1 Network Administrator | Lesson | |
18.1.1 Advanced Devices | 1 | Video |
18.1.2 Advanced Devices Quiz | 5 | Check for Understanding |
18.1.3 Network Administrator Career | 1 | Connection |
18.1.4 Network Administrator Career | 5 | Free Response |
18.1.5 Choosing the Best Devices | 5 | Free Response |
18.1.6 Network Diagram | 5 | Free Response |
18.2 Environmental Controls | Lesson | |
18.2.1 Environmental Controls | 1 | Video |
18.2.2 Environmental Controls Quiz | 5 | Check for Understanding |
18.2.3 Infographic | 1 | Connection |
18.2.4 Infographic FR | 5 | Free Response |
18.2.5 Your Security Systems | 5 | Free Response |
18.2.6 Security Design | 10 | Free Response |
18.3 Protocols and Standards | Lesson | |
18.3.1 Protocols | 1 | Video |
18.3.2 Protocols Quiz | 3 | Check for Understanding |
18.3.3 Standards | 1 | Video |
18.3.4 Standards Quiz | 2 | Check for Understanding |
18.3.5 The New Wireless Standard | 1 | Connection |
18.3.6 801.11ax | 1 | Connection |
18.3.7 801.11ax FR | 5 | Free Response |
18.4 Private Networks | Lesson | |
18.4.1 IP and MAC Addresses | 1 | Video |
18.4.2 IP and MAC Addresses Quiz | 2 | Check for Understanding |
18.4.3 Intranet Permissions | 1 | Example |
18.4.4 Coffee Shop: Design an Intranet | 5 | Free Response |
18.4.5 DMZs and VPNs | 1 | Video |
18.4.6 DMZs and VPNs Quiz | 3 | Check for Understanding |
18.4.7 Protecting Privacy with VPNs | 1 | Connection |
18.4.8 Protecting Privacy with VPNs | 5 | Free Response |
18.4.9 Coffee Shop: Network Plan | 5 | Free Response |
18.4.10 Coffee Shop: Network Diagram | 5 | Free Response |
18.4.11 SOHO Network | 1 | Video |
18.4.12 Network Topologies | 1 | Example |
18.5 Mobile Devices | Lesson | |
18.5.1 Mobile Devices | 1 | Video |
18.5.2 Mobile Devices Quiz | 5 | Check for Understanding |
18.5.3 How Apple FaceID Works | 1 | Connection |
18.5.4 How Apple FaceID Works Response | 5 | Free Response |
18.5.5 Biometric Data Debate | 5 | Free Response |
18.5.6 BYOD and MDM Concept Map | 1 | Connection |
18.5.7 BYOD and MDM Conclusions | 5 | Free Response |
18.6 Access Control | Lesson | |
18.6.1 Access Control | 1 | Video |
18.6.2 Access Control | 4 | Check for Understanding |
18.6.3 Multifactor Authentication | 1 | Example |
18.6.4 Two Factor Authentication | 1 | Example |
18.6.5 Two Factor Authentication Reflection | 5 | Free Response |
18.6.6 RADIUS Overview with AAA Protocol | 1 | Connection |
18.6.7 RADIUS Server Access Control | 1 | Connection |
18.6.8 RADIUS Reflection | 5 | Free Response |
18.7 Advanced Networking Quiz | Lesson | |
18.7.1 Advanced Networking Quiz | 20 | Unit Quiz |
Project: Put it in Writing! | ||
19.1 Level 1: Entry Event | Lesson | |
19.1.1 Company Development | 5 | Free Response |
19.1.2 Level 1: Attack! | 5 | Free Response |
19.1.3 Level 1: Project Overview | 1 | Video |
19.1.4 Put It In Writing! Rubric | 5 | Connection |
19.2 Level 2: User Training | Lesson | |
19.2.1 User Training Policy Development | 5 | Free Response |
19.2.2 Challenge: Employee Negligence 1 | 5 | Free Response |
19.2.3 Challenge: Employee Negligence 2 | 5 | Free Response |
19.2.4 Level 2 Debrief | 5 | Free Response |
19.3 Level 3: Incident Response | Lesson | |
19.3.1 Incident Response Plan Template | 5 | Connection |
19.3.2 Incident Response Plan Link | 5 | Free Response |
19.3.3 Challenge: Cyber Attack! | 5 | Free Response |
19.3.4 Level 3 Debrief | 5 | Free Response |
19.4 Level 4: Data and Licenses | Lesson | |
19.4.1 Data and Licenses | 5 | Video |
19.4.2 FTC Data Security Guide | 5 | Connection |
19.4.3 Data Policy Template | 5 | Connection |
19.4.4 Data Policy Link | 5 | Free Response |
19.4.5 Challenge: Data Breach 1 | 5 | Free Response |
19.4.6 Challenge: Data Breach 2 | 5 | Free Response |
19.4.7 Challenge: Data Breach 3 | 5 | Free Response |
19.4.8 Level 4 Debrief | 5 | Free Response |
19.5 Level 5: Change Management | Lesson | |
19.5.1 Change Management | 5 | Video |
19.5.2 Change Management Plan | 5 | Connection |
19.5.3 Change Management Plan Link | 5 | Free Response |
Project: Digital Forensics | ||
20.1 Digital Forensics | Lesson | |
20.1.1 Digital Forensics | 1 | Video |
20.1.2 Student Success Story | 1 | Connection |
20.1.3 Student Success Story Response | 5 | Free Response |
20.2 Forensic Case 1: Logs | Lesson | |
20.2.1 Network Logs | 1 | Notes |
20.2.2 Network Log Evidence | 1 | Example |
20.2.3 Network Logs Conclusion | 5 | Free Response |
20.3 Forensic Case 2: File Metadata | Lesson | |
20.3.1 File Metadata | 1 | Notes |
20.3.2 File Metadata Evidence | 1 | Example |
20.3.3 File Metadata Conclusion | 5 | Free Response |
20.4 Forensic Case 3: Exif Data | Lesson | |
20.4.1 Photo Exif | 1 | Notes |
20.4.2 Exif Using Inspector | 1 | Connection |
20.4.3 Exif Using the CLI | 1 | Example |
20.4.4 Photo Exif Conclusion | 5 | Free Response |
Cryptocurrency | ||
21.1 What is Currency? | Lesson | |
21.1.1 What is Currency? | 1 | Video |
21.1.2 What is Currency? | 2 | Check for Understanding |
21.1.3 What Gives Paper Money Its Actual Value | 1 | Connection |
21.1.4 What Gives Money Its Value | 5 | Free Response |
21.1.5 Money: What is it Good For? | 1 | Resource |
21.2 What is Cryptocurrency? | Lesson | |
21.2.1 Cryptocurrency Basics | 1 | Video |
21.2.2 Cryptocurrency Basics | 5 | Check for Understanding |
21.2.3 Cryptocurrency Module Overview | 1 | Video |
21.2.4 Cryptocurrencies Might Help Developing Countries | 1 | Connection |
21.2.5 Cryptocurrencies are Helping Developing Countries | 5 | Free Response |
21.2.6 Show Me the Money | 1 | Resource |
21.2.7 American Currency Exhibit | 5 | Free Response |
21.3 Intro to Blockchain | Lesson | |
21.3.1 Intro to Blockchain | 1 | Video |
21.3.2 Intro to Blockchain | 3 | Check for Understanding |
21.3.3 CryptoKitties | 1 | Connection |
21.3.4 CryptoKitties | 5 | Free Response |
21.4 Hashing | Lesson | |
21.4.1 Hashing | 1 | Video |
21.4.2 Hashing | 3 | Check for Understanding |
21.4.3 SHA256 Hash Generator | 1 | Connection |
21.4.4 Using the SHA256 Hash Generator | 5 | Free Response |
21.5 Proof of Work | Lesson | |
21.5.1 Proof of Work | 1 | Video |
21.5.2 Proof of Work | 3 | Check for Understanding |
21.5.3 Mining the Block | 1 | Video |
21.5.4 Mining the Block | 3 | Check for Understanding |
21.5.5 PoW vs. Proof of Stake | 1 | Connection |
21.5.6 PoW vs. PoS | 5 | Free Response |
21.5.7 Checking Proof of Work | 1 | Resource |
21.6 Advanced Blockchain | Lesson | |
21.6.1 Advanced Blockchain (part 1) | 1 | Video |
21.6.2 Advanced Blockchain (part 1) | 3 | Check for Understanding |
21.6.3 Blockchain Buzz | 1 | Connection |
21.6.4 Blockchain Buzz | 5 | Free Response |
21.6.5 Advanced Blockchain (part 2) | 1 | Video |
21.6.6 Advanced Blockchain (part 2) | 5 | Free Response |
21.6.7 Make a Blockchain | 1 | Resource |
21.6.8 SUPPLEMENTARY: How to TimeStamp a Document | 1 | Connection |
21.7 Cryptocurrencies | Lesson | |
21.7.1 Cryptocurrencies | 1 | Video |
21.7.2 Cryptocurrencies | 3 | Check for Understanding |
21.7.3 Shiny Toy Phenomenon | 5 | Free Response |
21.7.4 Walmart Using Blockchain to Stop Spread of Disease | 1 | Connection |
21.7.5 Walmart Use of Blockchain | 5 | Free Response |
21.8 Bitcoin | Lesson | |
21.8.1 Bitcoin | 1 | Video |
21.8.2 Bitcoin | 3 | Check for Understanding |
21.8.3 51% Attack Explained | 1 | Connection |
21.8.4 51% Attack | 5 | Free Response |
21.8.5 Why the Bitcoin Bubble will Burst in 2018 | 1 | Connection |
21.8.6 Bitcoin Bust | 5 | Free Response |
21.8.7 Explore the Bitcoin Blockchain | 1 | Resource |
21.9 Pros, Cons, and Future of Cryptocurrencies | Lesson | |
21.9.1 Pros, Cons, and Future of Cryptocurrencies | 1 | Video |
21.9.2 Pros, Cons and Future of Cryptocurrencies | 3 | Check for Understanding |
21.9.3 Pros, Cons and future of Cryptocurrencies | 5 | Free Response |
21.9.4 Cryptocurrency Pros and Cons | 1 | Connection |
21.9.5 Crypto Pros and Cons | 5 | Free Response |
21.9.6 What is HODL? | 1 | Connection |
21.9.7 What is HODL? | 5 | Free Response |
21.9.8 Pros, Cons, and Future of Cryptocurrencies | 5 | Free Response |
21.10 Project: Cryptocurrency Expert Panel Talk | Lesson | |
21.10.1 Overview | 5 | Free Response |
21.10.2 Preview Sample Expert Panels | 5 | Free Response |
21.10.3 Investigate a Cryptocurrency Topic | 5 | Free Response |
21.10.4 Write an Outline and Rehearse | 5 | Free Response |
21.10.5 Expert Panel Talk (Presentation) | 5 | Free Response |
21.11 Cryptocurrency Quiz | Lesson | |
21.11.1 Cryptocurrency Quiz | 10 | Unit Quiz |
21.11.2 Cryptocurrency Badge | 0 | Badge |
SQL Part II: The SQL | ||
22.1 More Filtering Practice | Lesson | |
22.1.1 Initials | 5 | Exercise |
22.1.2 Compound Queries with BETWEEN | 5 | Exercise |
22.1.3 Gryffindors With G Names | 5 | Exercise |
22.1.4 R First Names | 5 | Exercise |
22.1.5 FF Houses | 5 | Exercise |
22.2 Ordering Results | Lesson | |
22.2.1 The ORDER BY Keyword | 1 | Video |
22.2.2 ORDER BY | 1 | Notes |
22.2.3 ORDER BY First Name | 1 | Example |
22.2.4 Reverse Order | 1 | Example |
22.2.5 Order By Multiple Fields | 1 | Example |
22.2.6 House Ordering | 5 | Exercise |
22.2.7 Sort the P Names | 5 | Exercise |
22.3 Renaming Fields | Lesson | |
22.3.1 Renaming Fields with AS | 1 | Notes |
22.3.2 Renaming in the House Table | 1 | Example |
22.3.3 Changing Column Names | 5 | Exercise |
22.4 Joining Tables | Lesson | |
22.4.1 The JOIN command | 1 | Video |
22.4.2 Basic Joining | 1 | Notes |
22.4.3 Letters and Numbers | 1 | Example |
22.4.4 Person and House | 1 | Example |
22.4.5 Person and House (Correct) | 1 | Example |
22.4.6 Person and House (with namespacing) | 1 | Example |
22.4.7 List All Gryffindors | 5 | Exercise |
22.4.8 JOIN With Yourself | 1 | Video |
22.4.9 Renaming Tables | 1 | Notes |
22.4.10 Quidditch Matchups | 1 | Example |
22.4.11 Quidditch Matchups: Ravenclaw Away Games | 5 | Exercise |
22.5 More Joining Tables | Lesson | |
22.5.1 The Course Table | 1 | Example |
22.5.2 Courses and Professors | 5 | Exercise |
22.5.3 Courses, Professors, and Houses | 5 | Exercise |
22.5.4 Courses Taught By Gryffindors | 5 | Exercise |
22.5.5 The Enrollment Table | 1 | Example |
22.5.6 Students Taking Potions | 5 | Exercise |
22.5.7 Non-Slytherins Taking Potions | 5 | Exercise |
22.5.8 Defense Students by House | 5 | Exercise |
22.5.9 Neville's Courses | 5 | Exercise |
Web Development | ||
23.1 Introduction to HTML | Lesson | |
23.1.1 Introduction to HTML | 1 | Video |
23.1.2 Introduction to HTML Quiz | 1 | Check for Understanding |
23.1.3 Our First HTML Page | 1 | Example |
23.1.4 Say Hello! | 5 | Exercise |
23.2 Structure of an HTML Page | Lesson | |
23.2.1 Structure of an HTML Page | 1 | Video |
23.2.2 Structure of an HTML Page Quiz | 1 | Check for Understanding |
23.2.3 HTML Template | 1 | Example |
23.2.4 Hello World Page | 1 | Example |
23.2.5 The <title> Tag | 5 | Exercise |
23.2.6 Your First HTML Page | 5 | Exercise |
23.2.7 Structure Badge | 1 | Badge |
23.3 Formatting Text | Lesson | |
23.3.1 Formatting Text | 1 | Video |
23.3.2 Formatting Text Quiz | 1 | Check for Understanding |
23.3.3 Dictionary | 1 | Example |
23.3.4 That's Bold | 5 | Exercise |
23.3.5 Artificial Intelligence | 5 | Exercise |
23.3.6 State Capitals | 5 | Exercise |
23.4 Links | Lesson | |
23.4.1 Links | 1 | Video |
23.4.2 Links Quiz | 1 | Check for Understanding |
23.4.3 The <a> Tag | 1 | Example |
23.4.4 Simple Link | 5 | Exercise |
23.4.5 My Favorite Websites | 5 | Exercise |
23.5 Images | Lesson | |
23.5.1 Images | 1 | Video |
23.5.2 Images Quiz | 1 | Check for Understanding |
23.5.3 The <img> Tag | 1 | Example |
23.5.4 Building the CodeHS Homepage | 1 | Example |
23.5.5 Collage on a Theme | 5 | Exercise |
23.5.6 Linking an Image | 5 | Exercise |
23.5.7 Personal Library | 5 | Exercise |
23.5.8 Images Badge | 1 | Badge |
23.6 HTML Lists | Lesson | |
23.6.1 HTML Lists | 1 | Video |
23.6.2 HTML Lists Quiz | 1 | Check for Understanding |
23.6.3 Grocery Shopping | 1 | Example |
23.6.4 Favorite Things | 5 | Exercise |
23.6.5 To-Do List | 5 | Exercise |
23.6.6 List Article | 5 | Exercise |
23.7 HTML Tables | Lesson | |
23.7.1 HTML Tables | 1 | Video |
23.7.2 HTML Tables Quiz | 3 | Check for Understanding |
23.7.3 Address Book | 1 | Example |
23.7.4 Favorite Songs | 5 | Exercise |
23.7.5 Calendar | 5 | Exercise |
23.8 HTML Styling | Lesson | |
23.8.1 HTML Styling | 1 | Video |
23.8.2 HTML Styling Quiz | 1 | Check for Understanding |
23.8.3 Stylish Address Book | 1 | Example |
23.8.4 Background Colors | 5 | Exercise |
23.8.5 Style Your To-Do List | 5 | Exercise |
23.9 Introduction to CSS | Lesson | |
23.9.1 Introduction to CSS | 1 | Video |
23.9.2 Introduction to CSS Quiz | 2 | Check for Understanding |
23.9.3 Styling Your H1s | 1 | Example |
23.9.4 First Style with CSS | 5 | Exercise |
23.9.5 List Styling | 5 | Exercise |
23.10 CSS Select by Tag | Lesson | |
23.10.1 CSS Select by Tag | 1 | Video |
23.10.2 CSS Select by Tag Quiz | 1 | Check for Understanding |
23.10.3 Rainbow | 1 | Example |
23.10.4 Dog Styling | 1 | Example |
23.10.5 Restaurant Menu | 5 | Exercise |
23.10.6 Put Karel Together | 5 | Exercise |
23.11 CSS Select by Class | Lesson | |
23.11.1 CSS Select by Class | 1 | Video |
23.11.2 CSS Select by Class Quiz | 1 | Check for Understanding |
23.11.3 Simple Checkerboard | 1 | Example |
23.11.4 Tic Tac Toe | 5 | Exercise |
23.11.5 Music Library | 5 | Exercise |
23.12 CSS Select by ID | Lesson | |
23.12.1 CSS Select by ID | 1 | Video |
23.12.2 CSS Select by ID Quiz | 1 | Check for Understanding |
23.12.3 Logo | 1 | Example |
23.12.4 Favorite Dog | 5 | Exercise |
23.12.5 Bingo | 5 | Exercise |
23.12.6 CSS Badge | 1 | Badge |
23.13 Viewing Websites | Lesson | |
23.13.1 Viewing Websites | 1 | Video |
23.13.2 Viewing Websites Quiz | 5 | Check for Understanding |
23.13.3 Explaining a URL | 5 | Free Response |
23.14 Web Development Quiz | Lesson | |
23.14.1 Web Development Quiz | 15 | Unit Quiz |
23.15 Your First Website | Lesson | |
23.15.1 Set Up Your codehs.me Website | 10 | Challenge |
23.15.2 Practice PT: Your First Website | 10 | Challenge |
23.15.3 Website Badge | 1 | Badge |
Midterm | ||
24.1 Midterm | Lesson | |
24.1.1 Midterm | 15 | Midterm |
Final Course Project | ||
25.1 Final Course Project | Lesson | |
25.1.1 Choose Your Own Adventure | 1 | Notes |
25.1.2 Choose Your Adventure | 5 | Free Response |
25.1.3 Research | 5 | Free Response |
25.1.4 Choose Your Target Audience | 5 | Free Response |
25.1.5 Draft Your Presentation | 5 | Free Response |
25.1.6 Draft Your Flyer | 5 | Free Response |
25.1.7 Make Your Presentation with Handout! | 5 | Free Response |
Extra | ||
26.1 Lesson 1 | Lesson | |
26.1.1 Compound Queries | 5 | Example |
Cybersecurity Level 1 Certification Practice | ||
27.1 Cybersecurity Essentials | Lesson | |
27.1.1 Quiz: Cybersecurity Essentials | 8 | Quiz |
27.1.2 Cybersecurity Essentials Reflection | 5 | Notes |
27.2 Cryptography | Lesson | |
27.2.1 Quiz: Cryptography | 8 | Quiz |
27.2.2 Cryptography Reflection | 5 | Notes |
27.3 System Administration | Lesson | |
27.3.1 Quiz: System Administration | 8 | Quiz |
27.3.2 System Administration Reflection | 5 | Notes |
27.4 IT Concepts | Lesson | |
27.4.1 Quiz: IT Infrastructure | 8 | Quiz |
27.4.2 IT Concepts Reflection | 5 | Notes |
27.5 IT Infrastructure | Lesson | |
27.5.1 Quiz: Cybersecurity Essentials | 3 | Quiz |
27.5.2 IT Infrastructure Reflection | 5 | Notes |
27.6 Digital Safety and Data Security | Lesson | |
27.6.1 Quiz: Digital Safety and Data Security | 8 | Quiz |
27.6.2 Digital Safety and Data Security Reflection | 5 | Notes |
27.7 Mixed Practice Test | Lesson | |
27.7.1 Important Note | 5 | Notes |
27.7.2 Mixed Practice | 20 | Quiz |
27.7.3 Mixed Practice Reflection | 5 | Notes |
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.
Teacher SignupSign up as a student if you are in a school and have a class code given to you by your teacher.
Student Signup