Please enable JavaScript to use CodeHS

NCyTE Cybersecurity Concept Lessons (Python) - Outline

  1. Caesar Cipher

    1. 1.1 Caesar Ciphers

    2. Connection 1.1.1 Introduction to Caesar Ciphers
    3. Video 1.1.2 slides
    4. Connection 1.1.3 A Caesar Cipher
    5. Free Response 1.1.4 Encryption and Decryption
    6. Check for Understanding 1.1.5 Decryption Practice
    7. Exercise 1.1.6 Caesar Cipher Encryption
    8. 1.2 Decrypting and Breaking Caesar Ciphers

    9. Exercise 1.2.1 Caesar Cipher Decryption
    10. Exercise 1.2.2 Break Caesar's Cipher!
    11. Free Response 1.2.3 Reflection: Caesar's Cipher
    12. Connection 1.2.4 Ethics Moment: Apple v. Barr
    13. Free Response 1.2.5 Reflection: Apple v. Barr
  2. The CIA Triad

    1. 2.1 Introduction to Cybersecurity

    2. Notes 2.1.1 Warm-Up
    3. Video 2.1.2 Gone Phishing
    4. Connection 2.1.3 Deepfake Videos
    5. Free Response 2.1.4 Keeping Secrets
    6. Connection 2.1.5 Phishing Quiz
    7. Connection 2.1.6 How is Your Phishing IQ?
    8. Example 2.1.7 Phishing Simulator
    9. Free Response 2.1.8 Reflection: Phishing Emails
    10. Free Response 2.1.9 Think-Pair-Share Activity
    11. 2.2 CIA Triad

    12. Notes 2.2.1 Warm-Up
    13. Video 2.2.2 CIA Triad
    14. Free Response 2.2.3 Alice-Bob-Eve
    15. Free Response 2.2.4 PII
    16. Free Response 2.2.5 CIA Breach
    17. Free Response 2.2.6 Identity Theft
    18. Free Response 2.2.7 CIA and Phishing
    19. Free Response 2.2.8 Challenge: Create a Phishing Email
    20. Free Response 2.2.9 Challenge: Investigate Legalities
  3. CyberEthics

    1. 3.1 CyberEthics

    2. Video 3.1.1 Presentation
    3. Free Response 3.1.2 Topics
    4. Free Response 3.1.3 Problem Summary
    5. Free Response 3.1.4 Pros and Cons
    6. Free Response 3.1.5 Your Solution
    7. Free Response 3.1.6 Writing an Introduction
    8. Free Response 3.1.7 Developing your position
    9. Free Response 3.1.8 Conclusion
    10. Free Response 3.1.9 Position Paper
  4. Data Structures

    1. 4.1 Introduction to Lists

    2. Video 4.1.1 Intro to Lists
    3. Check for Understanding 4.1.2 List Introduction
    4. 4.2 Traversing a List

    5. Video 4.2.1 Traversing a List
    6. Check for Understanding 4.2.2 Traversing a List
    7. 4.3 Applying Iteration: Usernames and Passwords

    8. Video 4.3.1 Username and Password Creation
    9. Free Response 4.3.2 Usernames and Passwords: Pseudocode
    10. Exercise 4.3.3 Usernames and Passwords: Python
    11. Challenge 4.3.4 Username and Password Verification
    12. Connection 4.3.5 Ethics Moment: Facebook and AWS
    13. Free Response 4.3.6 Reflection: Facebook and AWS
  5. Identity, Authentication and Authorization

    1. 5.1 Identity Crisis

    2. Notes 5.1.1 Warm Up
    3. Video 5.1.2 Identity Crisis
    4. Connection 5.1.3 Sharing Passwords
    5. Free Response 5.1.4 Reflect: Sharing Passwords
    6. Connection 5.1.5 What is your password?
    7. Free Response 5.1.6 Identity crisis activity
    8. Free Response 5.1.7 World's Biggest Data Breaches
    9. Free Response 5.1.8 Research: Types of Attacks
    10. Example 5.1.9 You Can Be Tracked!
    11. 5.2 Let Me In

    12. Notes 5.2.1 Warm Up
    13. Video 5.2.2 Authenticate and Authorize
    14. Free Response 5.2.3 How do you protect your data?
    15. Free Response 5.2.4 Common Passwords
    16. Connection 5.2.5 Password Strength
    17. Free Response 5.2.6 Reflection: Password Strength
    18. Video 5.2.7 What Makes a Password Strong?
    19. Example 5.2.8 Multifactor Authentication
    20. Exercise 5.2.9 One Pager: Password Security
  6. Input Validation & Conditionals

    1. 6.1 Applying Conditionals - Password Validation

    2. Video 6.1.1 Input Validation and Conditionals
    3. AP Practice 6.1.2 Conditional Pseudocode Activity
    4. Exercise 6.1.3 Password Checker
    5. Connection 6.1.4 How are passwords saved?
    6. Free Response 6.1.5 Reflect: How are passwords saved?
    7. 6.2 Password Protection

    8. Video 6.2.1 Password Protection
    9. Exercise 6.2.2 Create a password
    10. Connection 6.2.3 Ethics Moment: Impact of Code
    11. Free Response 6.2.4 Reflection: Impact of Code
  7. Iterative Process

    1. 7.1 Iterative Process

    2. Video 7.1.1 Iterations
    3. AP Practice 7.1.2 Iterative Pseudocode Activity - Part 1
    4. AP Practice 7.1.3 Iterative Pseudocode Activity - Part 2
    5. Exercise 7.1.4 Verify the Password Length
    6. Exercise 7.1.5 Making a Stronger Password
    7. Exercise 7.1.6 Passwords with Letters and Numbers
    8. Connection 7.1.7 Ethics Moment: Sampling Music
    9. Free Response 7.1.8 Reflection: Sampling Music
  8. Secure Networking

    1. 8.1 Introduction to Networking

    2. Notes 8.1.1 Warm Up
    3. Connection 8.1.2 Ethics Moment: Equifax Data Breach
    4. Free Response 8.1.3 Reflection: Equifax Data Breach
    5. Exercise 8.1.4 Muddy City
    6. Free Response 8.1.5 Reflection: Muddy City
    7. 8.2 OSI model activity

    8. Free Response 8.2.1 Introduction
    9. Free Response 8.2.2 Event 1: Truck Payload Change
    10. Free Response 8.2.3 Event 2: Truck Payload Change
    11. Free Response 8.2.4 Event 3: Route Change
    12. Free Response 8.2.5 Event 4: Envelopes Never Arrive
    13. Free Response 8.2.6 Event 5: Missing One Box
    14. Free Response 8.2.7 Event 6: Box Payload Change
    15. Free Response 8.2.8 Organizing the Events
    16. Video 8.2.9 Relating this to the Internet
    17. 8.3 Network Attacks

    18. Notes 8.3.1 Warm Up
    19. Exercise 8.3.2 One Pager: Network Attacks
    20. Free Response 8.3.3 Reflection: Network Attacks
  9. Personal Data Vulnerabilities

    1. 9.1 Unintentional Data Sharing

    2. Notes 9.1.1 Warm up
    3. Video 9.1.2 Personal Data Vulnerabilities
    4. Free Response 9.1.3 Spokeo
    5. Connection 9.1.4 Cyber Insecurity
    6. Free Response 9.1.5 Who is this Person?
    7. Free Response 9.1.6 Who is this Person? - Car
    8. Free Response 9.1.7 Who is this Person? - Hobby
    9. Free Response 9.1.8 What can you learn from ...
    10. Example 9.1.9 Social Media Clean-up
    11. 9.2 Metadata and Data Collection

    12. Notes 9.2.1 Warm Up
    13. Video 9.2.2 Understanding Metadata
    14. Free Response 9.2.3 Image Data Extraction
    15. Free Response 9.2.4 Information about your images
    16. Free Response 9.2.5 Security Vulnerability
    17. Connection 9.2.6 Ethics Moment: Collection of Data
    18. Free Response 9.2.7 Reflection: Collection of Data
    19. Connection 9.2.8 Online Privacy
  10. Risk

    1. 10.1 Basic Cybersecurity Risk Concepts

    2. Notes 10.1.1 Warm up
    3. Video 10.1.2 Basic Cybersecurity Risk, Part 1
    4. Free Response 10.1.3 Personal Data Threats
    5. Video 10.1.4 Basic Cybersecurity Risk, Part 2
    6. Free Response 10.1.5 Risk and Consequences: Part 1
    7. Free Response 10.1.6 Risk and Consequences: Part 2
    8. Free Response 10.1.7 Digital Footprint
    9. 10.2 Cybersecurity Risk Model-Assessing Risk

    10. Notes 10.2.1 Warm up
    11. Video 10.2.2 Assessing Risk, Part 1
    12. Notes 10.2.3 Think, Pair, Share: Assets
    13. Video 10.2.4 Assessing Risk, Part 2
    14. Free Response 10.2.5 Risk Scenario Assessment 1: Malware
    15. Free Response 10.2.6 Risk Scenario Assessment 2: Identity Theft
    16. Free Response 10.2.7 Risk Scenario Assessment 3: Ransomware
    17. Free Response 10.2.8 Risk Scenario Assessment 4: Email Compromise
    18. Free Response 10.2.9 Asset Identification Activity
    19. 10.3 Cybersecurity Risk Model-Vulnerabilities

    20. Notes 10.3.1 Warm up
    21. Video 10.3.2 Vulnerabilities
    22. Check for Understanding 10.3.3 National Vulnerability Database Activity
    23. Free Response 10.3.4 Exploring Vulnerabilities
    24. 10.4 Cybersecurity Risk Model-Security Controls

    25. Notes 10.4.1 Warm up
    26. Connection 10.4.2 Internet of Things
    27. Video 10.4.3 Security Controls
    28. Free Response 10.4.4 Defense in Depth
    29. Connection 10.4.5 Ethics Moment: The Risk of AI
    30. Free Response 10.4.6 Reflect: The Risk of AI
  11. Steganography

    1. 11.1 Introduction to Steganography

    2. Connection 11.1.1 Introduction to Steganography
    3. Connection 11.1.2 What is steganography?
    4. Example 11.1.3 Hide Text
    5. Video 11.1.4 Steganography
    6. Free Response 11.1.5 Creating a Secret Message
    7. Exercise 11.1.6 Part 1: Loading images
    8. 11.2 Ethics of Steganography

    9. Video 11.2.1 Steganography - Part 2
    10. Connection 11.2.2 Government Surveillance and Reality Winner
    11. Free Response 11.2.3 Government Surveillance and Reality Winner
    12. Connection 11.2.4 Ethics Moment: Government Surveillance
    13. Free Response 11.2.5 Reflection: Government Surveillance
    14. Exercise 11.2.6 Upload your own photos
    15. Exercise 11.2.7 Part 2: The encrypt function
    16. 11.3 Steganography Exploration

    17. Connection 11.3.1 Data Hiding and Extraction
    18. Free Response 11.3.2 Reflect: Data Hiding and Extraction
    19. Exercise 11.3.3 Part 3: The decrypt function
  12. Symmetric and Public Key Encryption

    1. 12.1 Symmetric and Public Key Encryption

    2. Video 12.1.1 Symmetric and Public Key Encryption
    3. Connection 12.1.2 Diffie-Hellman Key Exchange
    4. Example 12.1.3 Diffie-Hellman Key Exchange
    5. Exercise 12.1.4 Public Key Programming Exercise
    6. Connection 12.1.5 RSA Encryption: Step 1
    7. Connection 12.1.6 RSA Encryption: Step 2
    8. Connection 12.1.7 RSA Encryption: Step 3
    9. Connection 12.1.8 RSA Encryption: Step 4
    10. Notes 12.1.9 RSA
    11. Free Response 12.1.10 RSA Reflection
    12. Connection 12.1.11 Ethics Moment: Ransomware
    13. Free Response 12.1.12 Reflection: Ransomware
  13. Vigenère Cipher

    1. 13.1 Vigenère Cipher

    2. Video 13.1.1 Vigenère Cipher
    3. Connection 13.1.2 One-Time Pad Cipher
    4. Connection 13.1.3 How a Vigenère Cipher Works
    5. Free Response 13.1.4 Vigenère Scavenger Hunt
    6. Free Response 13.1.5 Vigenère Pseudocode
    7. Exercise 13.1.6 Write your own Vigenère Cipher
    8. Free Response 13.1.7 Reflection: Vigenère Cipher
    9. Connection 13.1.8 Ethics Moment: Cryptography and the NSA
    10. Free Response 13.1.9 Reflection: Cryptography and the NSA