Please enable JavaScript to use CodeHS

Fundamentals of Cybersecurity (Security) - Outline

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Video 1.1.1 Welcome to Cybersecurity
    3. Check for Understanding 1.1.2 Welcome to Cybersecurity
    4. Example 1.1.3 Intruder Alert!
    5. Free Response 1.1.4 Cybersecurity and You
    6. Free Response 1.1.5 Course Goals
    7. 1.2 What is Cybersecurity?

    8. Video 1.2.1 What is Cybersecurity?
    9. Check for Understanding 1.2.2 What is Cybersecurity?
    10. Connection 1.2.3 City Services Ransomware
    11. Free Response 1.2.4 Ransomware Reflection
    12. Example 1.2.5 Ransomware Simulator
    13. Connection 1.2.6 Internet of Things
    14. Connection 1.2.7 Hackers vs. Smart Homes
    15. Free Response 1.2.8 Internet of Things Reflection
    16. 1.3 Impact of Cybersecurity

    17. Video 1.3.1 Impact of Cybersecurity
    18. Check for Understanding 1.3.2 Impact of Cybersecurity
    19. Example 1.3.3 Phishing Simulator
    20. Connection 1.3.4 Phishing for Your Info
    21. Free Response 1.3.5 Phishing Reflection
    22. Connection 1.3.6 Cyber Game
    23. Free Response 1.3.7 Cyber Game Reflection
    24. Connection 1.3.8 Cyber Crime Time
    25. Free Response 1.3.9 Cyber Crime Time Reflection
    26. 1.4 The CIA Triad

    27. Video 1.4.1 CIA Triad
    28. Check for Understanding 1.4.2 CIA Triad
    29. Free Response 1.4.3 Which part of the CIA Triad?
    30. Free Response 1.4.4 Which part of the CIA Triad?
    31. Free Response 1.4.5 Breach of Confidentiality
    32. Free Response 1.4.6 Breach of Availability
    33. Free Response 1.4.7 CIA Connections
    34. 1.5 What is Cybersecurity? Quiz

    35. Unit Quiz 1.5.1 What is Cybersecurity? Quiz
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Example 2.1.3 Social Media Clean-up
    5. Free Response 2.1.4 Building a Positive Digital Footprint
    6. Connection 2.1.5 Right to be Forgotten?
    7. Free Response 2.1.6 Right to be Forgotten
    8. Free Response 2.1.7 What is your Digital Footprint?
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Free Response 2.2.5 Stopping Cyberbullying
    15. 2.3 Internet Safety

    16. Video 2.3.1 Internet Safety
    17. Check for Understanding 2.3.2 Internet Safety
    18. Free Response 2.3.3 Scenario: School Stranger
    19. Free Response 2.3.4 Scenario: Vacation Pals
    20. Free Response 2.3.5 Staying Safe
    21. 2.4 Privacy & Security

    22. Video 2.4.1 What is Data Privacy & Security?
    23. Check for Understanding 2.4.2 Privacy & Security Quiz
    24. Connection 2.4.3 Google Privacy Policy Search
    25. Free Response 2.4.4 Google Privacy Policy Search
    26. Example 2.4.5 Guess: Password List
    27. Example 2.4.6 Guess: Using an Algorithm
    28. Example 2.4.7 Guess: Brute Force
    29. Connection 2.4.8 How Strong is your Password?
    30. Free Response 2.4.9 How Strong is your password?
    31. Example 2.4.10 You Can Be Tracked!
    32. 2.5 Information Literacy

    33. Video 2.5.1 Information Literacy
    34. Check for Understanding 2.5.2 Information Literacy
    35. Free Response 2.5.3 Effective Internet Searches
    36. Connection 2.5.4 Evaluate the Source 1
    37. Free Response 2.5.5 Respond: Evaluate the Source 1
    38. Notes 2.5.6 Evaluate the Source 2
    39. Free Response 2.5.7 Respond: Evaluate the Source 2
    40. Connection 2.5.8 Hero Pig?
    41. Free Response 2.5.9 Respond: Hero Pig?
    42. 2.6 Creative Credit & Copyright

    43. Video 2.6.1 Creative Credit and Copyright
    44. Check for Understanding 2.6.2 Creative Credit and Copyright
    45. Free Response 2.6.3 Cite!
    46. Connection 2.6.4 Exploring Creative Commons
    47. Free Response 2.6.5 Respond: Creative Commons
    48. Free Response 2.6.6 Task: Finding Images
    49. Free Response 2.6.7 Reflection: Why is Copyright Important?
    50. 2.7 Hacking Ethics

    51. Video 2.7.1 Hacking Ethics & Legality
    52. Check for Understanding 2.7.2 Hacking Ethics & Legality
    53. Connection 2.7.3 Penetration Testing
    54. Free Response 2.7.4 Reflection: Penetration Testing
    55. Connection 2.7.5 Hack the Pentagon?
    56. Free Response 2.7.6 Reflection: Hack the Pentagon
    57. Check for Understanding 2.7.7 Ethical Hacker Agreement
    58. 2.8 Digital Citizenship and Cybersecurity Quiz

    59. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Example 4.1.3 Cryptogram Game!
    5. Video 4.1.4 Why encrypt?
    6. Check for Understanding 4.1.5 Why encrypt?
    7. Example 4.1.6 Encrypt/Decrypt
    8. 4.2 History of Cryptography

    9. Video 4.2.1 Cryptography: A Brief History
    10. Check for Understanding 4.2.2 Cryptography History Quiz
    11. Connection 4.2.3 How the Enigma Worked
    12. Free Response 4.2.4 How the Enigma Worked
    13. Connection 4.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 4.2.6 The Future of Cybersecurity
    15. 4.3 Basic Crypto Systems: Caesar Cipher

    16. Video 4.3.1 Caesar Cipher
    17. Check for Understanding 4.3.2 Caesar Cipher
    18. Example 4.3.3 Caesar Cipher Encryption
    19. Example 4.3.4 Decrypt Caesar's Cipher!
    20. 4.4 Basic Crypto Systems: Cracking Caesar

    21. Video 4.4.1 Cracking Caesar Cipher
    22. Check for Understanding 4.4.2 Cracking Caesar Cipher
    23. Example 4.4.3 Cracking Caesar with Brute Force
    24. Example 4.4.4 Letter Frequency and Caesar
    25. Free Response 4.4.5 Examining Caesar Cipher
    26. 4.5 Basic Crypto Systems: Vigenere Cipher

    27. Video 4.5.1 Vigenere Cipher
    28. Check for Understanding 4.5.2 Vigenere Cipher
    29. Example 4.5.3 Vigenere Cipher Example
    30. Example 4.5.4 Letter Frequency and Vigenere Cipher
    31. Free Response 4.5.5 Examining Vigenere Cipher
    32. Example 4.5.6 Improving Vigenere
    33. 4.6 The ABCs of Cryptography Quiz

    34. Unit Quiz 4.6.1 The ABCs of Cryptography Quiz
  5. Project: Classic Cipher Newscast

    1. 5.1 Project: Classic Cipher Newscast

    2. Notes 5.1.1 Overview
    3. Notes 5.1.2 Investigate a Classic Cipher
    4. Free Response 5.1.3 Write the Script and Rehearse
    5. Free Response 5.1.4 Newscast Presentation
  6. System Administration

    1. 6.1 Operating Systems

    2. Video 6.1.1 Operating Systems
    3. Check for Understanding 6.1.2 Operating Systems Quiz
    4. Example 6.1.3 Detect My OS
    5. Connection 6.1.4 Upgrading a Mac OS
    6. Example 6.1.5 Windows OS Installation Simulation
    7. Free Response 6.1.6 Installing an OS
    8. 6.2 Comparing Operating Systems

    9. Video 6.2.1 Comparing Operating Systems
    10. Check for Understanding 6.2.2 Comparing Operating Systems Quiz
    11. Example 6.2.3 Windows Simulation
    12. Example 6.2.4 MacOS Simulation
    13. Connection 6.2.5 Choose a Linux Distro!
    14. Free Response 6.2.6 Which would you choose?
    15. 6.3 Compatibility

    16. Video 6.3.1 Compatibility
    17. Check for Understanding 6.3.2 Compatibility Quiz
    18. Example 6.3.3 What Processor? Windows
    19. Example 6.3.4 What Processor? Mac
    20. Free Response 6.3.5 What Processor are you running?
    21. 6.4 Software and Applications

    22. Video 6.4.1 Software and Applications
    23. Check for Understanding 6.4.2 Software and Applications Quiz
    24. Example 6.4.3 Spreadsheet Simulation
    25. Example 6.4.4 Messaging Simulation
    26. Example 6.4.5 Kanban Board Simulation
    27. Free Response 6.4.6 Software Simulations
    28. 6.5 Software Licenses

    29. Video 6.5.1 Software Licenses
    30. Check for Understanding 6.5.2 Software Licenses Quiz
    31. Free Response 6.5.3 Do I need a Software License?
    32. Free Response 6.5.4 Is This Original?
    33. 6.6 Application Security

    34. Video 6.6.1 Application Security
    35. Check for Understanding 6.6.2 Application Security
    36. Example 6.6.3 Windows Updates
    37. Connection 6.6.4 Windows Defender Antivirus
    38. Free Response 6.6.5 Windows Defender Antivirus
    39. Free Response 6.6.6 CodeHS System Restore
    40. 6.7 Browser Configuration

    41. Video 6.7.1 Browser Configuration
    42. Check for Understanding 6.7.2 Browser Configuration
    43. Connection 6.7.3 Cached CodeHS
    44. Free Response 6.7.4 Cached CodeHS
    45. Example 6.7.5 Is Your Popup Blocker On?
    46. Free Response 6.7.6 Browser Extensions Lab
    47. 6.8 System Administration

    48. Video 6.8.1 User Accounts
    49. Check for Understanding 6.8.2 User Accounts Quiz
    50. Free Response 6.8.3 User Accounts
    51. Free Response 6.8.4 Shared Folders and Files
    52. Video 6.8.5 Host Security
    53. Check for Understanding 6.8.6 Host Security Quiz
    54. Free Response 6.8.7 Security Baseline
    55. 6.9 Command Line Interface

    56. Notes 6.9.1 Linux/MacOS vs. Windows
    57. Video 6.9.2 Command Line Interface
    58. Check for Understanding 6.9.3 Command Line Interface Quiz
    59. Resource 6.9.4 Command Equivalents
    60. Video 6.9.5 Windows Command Prompt
    61. Free Response 6.9.6 Windows Command Prompt
    62. Free Response 6.9.7 Directory Directions
    63. Connection 6.9.8 Neural Interface?
    64. Free Response 6.9.9 Neural Interface?
    65. 6.10 System Administration Quiz

    66. Survey 6.10.1 Mindsets
    67. Unit Quiz 6.10.2 System Administration Quiz
  7. Software Security

    1. 7.1 Inside Web Apps

    2. Video 7.1.1 Inside Web Apps
    3. Check for Understanding 7.1.2 Inside Web Apps
    4. Free Response 7.1.3 Using View Page Source
    5. Example 7.1.4 Recreate a Webpage?
    6. Connection 7.1.5 Getting Started with OWASP
    7. Free Response 7.1.6 Getting Started with OWASP
    8. 7.2 Developer Tools

    9. Video 7.2.1 Developer Tools
    10. Check for Understanding 7.2.2 Developer Tools
    11. Free Response 7.2.3 Using the Developer Tools
    12. Exercise 7.2.4 Console Secrets
    13. Example 7.2.5 Local Storage
    14. Connection 7.2.6 The Top Cybersecurity Blogs and Websites
    15. Free Response 7.2.7 Selecting a Site to Follow
    16. 7.3 The Value of Data

    17. Video 7.3.1 The Value of Data
    18. Check for Understanding 7.3.2 The Value of Data Quiz
    19. Notes 7.3.3 Exploring Data Visualizations
    20. Connection 7.3.4 US Recorded Music Revenue
    21. Connection 7.3.5 National Parks
    22. Connection 7.3.6 March Madness
    23. Connection 7.3.7 Captain Marvel
    24. Free Response 7.3.8 Respond: Visualizations
    25. Free Response 7.3.9 Free Response: Choosing a Visualization
    26. Free Response 7.3.10 Reflection: Design a Survey
    27. 7.4 Databases

    28. Video 7.4.1 Databases
    29. Check for Understanding 7.4.2 Databases
    30. Connection 7.4.3 Database Administrator Career
    31. Free Response 7.4.4 Database Administrator Career
    32. Video 7.4.5 Parts of a Database
    33. Check for Understanding 7.4.6 Parts of a Database
    34. Connection 7.4.7 SQL Database Diagram
    35. Free Response 7.4.8 SQL Database Diagram
    36. Free Response 7.4.9 Schema Brainstorm
    37. 7.5 Clients and Servers

    38. Video 7.5.1 Clients and Servers
    39. Check for Understanding 7.5.2 Clients and Servers
    40. Connection 7.5.3 Inside a Google Data Center
    41. Free Response 7.5.4 Inside a Google Data Center
    42. Connection 7.5.5 Cloud Vulnerabilities
    43. Free Response 7.5.6 Cloud Vulnerabilities Response
    44. Video 7.5.7 Client-Server Model
    45. Check for Understanding 7.5.8 Client-Server Model
    46. Connection 7.5.9 The Future of User Privacy
    47. Free Response 7.5.10 The Future of User Privacy
    48. 7.6 What is SQL?

    49. Notes 7.6.1 What is SQL Overview
    50. Video 7.6.2 Intro to SQL
    51. Check for Understanding 7.6.3 Quiz: What is SQL?
    52. Video 7.6.4 How to Structure Data in SQL
    53. Check for Understanding 7.6.5 How to Structure Data in SQL
    54. Example 7.6.6 SQL Tables
    55. Free Response 7.6.7 SQL Tables Response
    56. 7.7 Basic Querying in SQL

    57. Video 7.7.1 The SELECT Statement
    58. Check for Understanding 7.7.2 Basic Querying in SQL
    59. Example 7.7.3 Our First SELECT Statement
    60. Exercise 7.7.4 Your First SELECT Statement
    61. Video 7.7.5 More SELECT Statement
    62. Check for Understanding 7.7.6 More SELECT Statement
    63. Example 7.7.7 Selecting Specific Columns
    64. Exercise 7.7.8 Harry Potter Names
    65. 7.8 Filtering Queries in SQL

    66. Video 7.8.1 The WHERE Clause
    67. Check for Understanding 7.8.2 Condition Operators
    68. Example 7.8.3 Ravenclaw House
    69. Example 7.8.4 People in Gryffindor
    70. Example 7.8.5 Filter By ID
    71. Exercise 7.8.6 The Weasleys
    72. Exercise 7.8.7 The Potters
    73. 7.9 Common Security Problems

    74. Video 7.9.1 Common Security Problems
    75. Check for Understanding 7.9.2 Common Security Problems
    76. Connection 7.9.3 Meet Security Engineers at Google
    77. Free Response 7.9.4 Security Engineering Reflection
    78. Video 7.9.5 Living in a Digital World
    79. Free Response 7.9.6 Living in a Digital World
    80. 7.10 SQL Injection Overview

    81. Video 7.10.1 SQL Injection Overview
    82. Check for Understanding 7.10.2 SQL Injection Overview
    83. Connection 7.10.3 Equifax Security Breach
    84. Connection 7.10.4 Equifax Exposed Millions
    85. Free Response 7.10.5 Equifax SQL Injection Attack
    86. Example 7.10.6 SQLi
    87. 7.11 Types of SQLi and Prevention

    88. Video 7.11.1 Types of SQLi
    89. Check for Understanding 7.11.2 Types of SQLi
    90. Video 7.11.3 Preventing SQLi
    91. Check for Understanding 7.11.4 Preventing SQLi
    92. Connection 7.11.5 Mitigating SQL Injection
    93. Free Response 7.11.6 Reflection: Mitigating SQL Injection
    94. Connection 7.11.7 SQL Injection Practice
    95. 7.12 Software Security Quiz

    96. Unit Quiz 7.12.1 Software Security Quiz
  8. Project: Security Assessment Report

    1. 8.1 Project: Security Assessment Report

    2. Notes 8.1.1 Project Requirements
    3. Connection 8.1.2 Supercar Showdown Website
    4. Free Response 8.1.3 SQL Injection Testing
    5. Resource 8.1.4 SQLi Testing Handout
    6. Free Response 8.1.5 Security Assessment Report
    7. Free Response 8.1.6 Project Reflection
  9. What's Next?

    1. 9.1 After Fundamentals of Cybersecurity

    2. Notes 9.1.1 Cybersecurity Pathways
    3. Connection 9.1.2 CodeHS Advanced Cybersecurity
    4. Notes 9.1.3 College Pathway
    5. Connection 9.1.4 Certification Pathway
    6. Connection 9.1.5 Career Spotlight
    7. Free Response 9.1.6 My Pathway
  10. Project: Digital Forensics

    1. 10.1 Digital Forensics

    2. Video 10.1.1 Digital Forensics
    3. Connection 10.1.2 Student Success Story
    4. Free Response 10.1.3 Student Success Story Response
    5. 10.2 Forensic Case 1: Logs

    6. Notes 10.2.1 Network Logs
    7. Example 10.2.2 Network Log Evidence
    8. Free Response 10.2.3 Network Logs Conclusion
    9. 10.3 Forensic Case 2: File Metadata

    10. Notes 10.3.1 File Metadata
    11. Example 10.3.2 File Metadata Evidence
    12. Free Response 10.3.3 File Metadata Conclusion
    13. 10.4 Forensic Case 3: Exif Data

    14. Notes 10.4.1 Photo Exif
    15. Connection 10.4.2 Exif Using Inspector
    16. Example 10.4.3 Exif Using the CLI
    17. Free Response 10.4.4 Photo Exif Conclusion
  11. Cryptocurrency

    1. 11.1 What is Currency?

    2. Video 11.1.1 What is Currency?
    3. Check for Understanding 11.1.2 What is Currency?
    4. Connection 11.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 11.1.4 What Gives Money Its Value
    6. Resource 11.1.5 Money: What is it Good For?
    7. 11.2 What is Cryptocurrency?

    8. Video 11.2.1 Cryptocurrency Basics
    9. Check for Understanding 11.2.2 Cryptocurrency Basics
    10. Video 11.2.3 Cryptocurrency Module Overview
    11. Connection 11.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 11.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 11.2.6 Show Me the Money
    14. Free Response 11.2.7 American Currency Exhibit
    15. 11.3 Intro to Blockchain

    16. Video 11.3.1 Intro to Blockchain
    17. Check for Understanding 11.3.2 Intro to Blockchain
    18. Connection 11.3.3 CryptoKitties
    19. Free Response 11.3.4 CryptoKitties
    20. 11.4 Hashing

    21. Video 11.4.1 Hashing
    22. Check for Understanding 11.4.2 Hashing
    23. Connection 11.4.3 SHA256 Hash Generator
    24. Free Response 11.4.4 Using the SHA256 Hash Generator
    25. 11.5 Proof of Work

    26. Video 11.5.1 Proof of Work
    27. Check for Understanding 11.5.2 Proof of Work
    28. Video 11.5.3 Mining the Block
    29. Check for Understanding 11.5.4 Mining the Block
    30. Connection 11.5.5 PoW vs. Proof of Stake
    31. Free Response 11.5.6 PoW vs. PoS
    32. Resource 11.5.7 Checking Proof of Work
    33. 11.6 Advanced Blockchain

    34. Video 11.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 11.6.2 Advanced Blockchain (part 1)
    36. Connection 11.6.3 Blockchain Buzz
    37. Free Response 11.6.4 Blockchain Buzz
    38. Video 11.6.5 Advanced Blockchain (part 2)
    39. Free Response 11.6.6 Advanced Blockchain (part 2)
    40. Resource 11.6.7 Make a Blockchain
    41. Connection 11.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 11.7 Cryptocurrencies

    43. Video 11.7.1 Cryptocurrencies
    44. Check for Understanding 11.7.2 Cryptocurrencies
    45. Free Response 11.7.3 Shiny Toy Phenomenon
    46. Connection 11.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 11.7.5 Walmart Use of Blockchain
    48. 11.8 Bitcoin

    49. Video 11.8.1 Bitcoin
    50. Check for Understanding 11.8.2 Bitcoin
    51. Connection 11.8.3 51% Attack Explained
    52. Free Response 11.8.4 51% Attack
    53. Connection 11.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 11.8.6 Bitcoin Bust
    55. Resource 11.8.7 Explore the Bitcoin Blockchain
    56. 11.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 11.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 11.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 11.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 11.9.4 Cryptocurrency Pros and Cons
    61. Free Response 11.9.5 Crypto Pros and Cons
    62. Connection 11.9.6 What is HODL?
    63. Free Response 11.9.7 What is HODL?
    64. Free Response 11.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 11.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 11.10.1 Overview
    67. Free Response 11.10.2 Preview Sample Expert Panels
    68. Free Response 11.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 11.10.4 Write an Outline and Rehearse
    70. Free Response 11.10.5 Expert Panel Talk (Presentation)
    71. 11.11 Cryptocurrency Quiz

    72. Unit Quiz 11.11.1 Cryptocurrency Quiz
    73. Badge 11.11.2 Cryptocurrency Badge
  12. SQL Part II: The SQL

    1. 12.1 More Filtering Practice

    2. Exercise 12.1.1 Initials
    3. Exercise 12.1.2 Compound Queries with BETWEEN
    4. Exercise 12.1.3 Gryffindors With G Names
    5. Exercise 12.1.4 R First Names
    6. Exercise 12.1.5 FF Houses
    7. 12.2 Ordering Results

    8. Video 12.2.1 The ORDER BY Keyword
    9. Notes 12.2.2 ORDER BY
    10. Example 12.2.3 ORDER BY First Name
    11. Example 12.2.4 Reverse Order
    12. Example 12.2.5 Order By Multiple Fields
    13. Exercise 12.2.6 House Ordering
    14. Exercise 12.2.7 Sort the P Names
    15. 12.3 Renaming Fields

    16. Notes 12.3.1 Renaming Fields with AS
    17. Example 12.3.2 Renaming in the House Table
    18. Exercise 12.3.3 Changing Column Names
    19. 12.4 Joining Tables

    20. Video 12.4.1 The JOIN command
    21. Notes 12.4.2 Basic Joining
    22. Example 12.4.3 Letters and Numbers
    23. Example 12.4.4 Person and House
    24. Example 12.4.5 Person and House (Correct)
    25. Example 12.4.6 Person and House (with namespacing)
    26. Exercise 12.4.7 List All Gryffindors
    27. Video 12.4.8 JOIN With Yourself
    28. Notes 12.4.9 Renaming Tables
    29. Example 12.4.10 Quidditch Matchups
    30. Exercise 12.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 12.5 More Joining Tables

    32. Example 12.5.1 The Course Table
    33. Exercise 12.5.2 Courses and Professors
    34. Exercise 12.5.3 Courses, Professors, and Houses
    35. Exercise 12.5.4 Courses Taught By Gryffindors
    36. Example 12.5.5 The Enrollment Table
    37. Exercise 12.5.6 Students Taking Potions
    38. Exercise 12.5.7 Non-Slytherins Taking Potions
    39. Exercise 12.5.8 Defense Students by House
    40. Exercise 12.5.9 Neville's Courses
  13. Web Development

    1. 13.1 Introduction to HTML

    2. Video 13.1.1 Introduction to HTML
    3. Check for Understanding 13.1.2 Introduction to HTML Quiz
    4. Example 13.1.3 Our First HTML Page
    5. Exercise 13.1.4 Say Hello!
    6. 13.2 Structure of an HTML Page

    7. Video 13.2.1 Structure of an HTML Page
    8. Check for Understanding 13.2.2 Structure of an HTML Page Quiz
    9. Example 13.2.3 HTML Template
    10. Example 13.2.4 Hello World Page
    11. Exercise 13.2.5 The <title> Tag
    12. Exercise 13.2.6 Your First HTML Page
    13. Badge 13.2.7 Structure Badge
    14. 13.3 Formatting Text

    15. Video 13.3.1 Formatting Text
    16. Check for Understanding 13.3.2 Formatting Text Quiz
    17. Example 13.3.3 Dictionary
    18. Exercise 13.3.4 That's Bold
    19. Exercise 13.3.5 Artificial Intelligence
    20. Exercise 13.3.6 State Capitals
    21. 13.4 Links

    22. Video 13.4.1 Links
    23. Check for Understanding 13.4.2 Links Quiz
    24. Example 13.4.3 The <a> Tag
    25. Exercise 13.4.4 Simple Link
    26. Exercise 13.4.5 My Favorite Websites
    27. 13.5 Images

    28. Video 13.5.1 Images
    29. Check for Understanding 13.5.2 Images Quiz
    30. Example 13.5.3 The <img> Tag
    31. Example 13.5.4 Building the CodeHS Homepage
    32. Exercise 13.5.5 Collage on a Theme
    33. Exercise 13.5.6 Linking an Image
    34. Exercise 13.5.7 Personal Library
    35. Badge 13.5.8 Images Badge
    36. 13.6 HTML Lists

    37. Video 13.6.1 HTML Lists
    38. Check for Understanding 13.6.2 HTML Lists Quiz
    39. Example 13.6.3 Grocery Shopping
    40. Exercise 13.6.4 Favorite Things
    41. Exercise 13.6.5 To-Do List
    42. Exercise 13.6.6 List Article
    43. 13.7 HTML Tables

    44. Video 13.7.1 HTML Tables
    45. Check for Understanding 13.7.2 HTML Tables Quiz
    46. Example 13.7.3 Address Book
    47. Exercise 13.7.4 Favorite Songs
    48. Exercise 13.7.5 Calendar
    49. 13.8 HTML Styling

    50. Video 13.8.1 HTML Styling
    51. Check for Understanding 13.8.2 HTML Styling Quiz
    52. Example 13.8.3 Stylish Address Book
    53. Exercise 13.8.4 Background Colors
    54. Exercise 13.8.5 Style Your To-Do List
    55. 13.9 Introduction to CSS

    56. Video 13.9.1 Introduction to CSS
    57. Check for Understanding 13.9.2 Introduction to CSS Quiz
    58. Example 13.9.3 Styling Your H1s
    59. Exercise 13.9.4 First Style with CSS
    60. Exercise 13.9.5 List Styling
    61. 13.10 CSS Select by Tag

    62. Video 13.10.1 CSS Select by Tag
    63. Check for Understanding 13.10.2 CSS Select by Tag Quiz
    64. Example 13.10.3 Rainbow
    65. Example 13.10.4 Dog Styling
    66. Exercise 13.10.5 Restaurant Menu
    67. Exercise 13.10.6 Put Karel Together
    68. 13.11 CSS Select by Class

    69. Video 13.11.1 CSS Select by Class
    70. Check for Understanding 13.11.2 CSS Select by Class Quiz
    71. Example 13.11.3 Simple Checkerboard
    72. Exercise 13.11.4 Tic Tac Toe
    73. Exercise 13.11.5 Music Library
    74. 13.12 CSS Select by ID

    75. Video 13.12.1 CSS Select by ID
    76. Check for Understanding 13.12.2 CSS Select by ID Quiz
    77. Example 13.12.3 Logo
    78. Exercise 13.12.4 Favorite Dog
    79. Exercise 13.12.5 Bingo
    80. Badge 13.12.6 CSS Badge
    81. 13.13 Viewing Websites

    82. Video 13.13.1 Viewing Websites
    83. Check for Understanding 13.13.2 Viewing Websites Quiz
    84. Free Response 13.13.3 Explaining a URL
    85. 13.14 Web Development Quiz

    86. Unit Quiz 13.14.1 Web Development Quiz
    87. 13.15 Your First Website

    88. Challenge 13.15.1 Set Up Your codehs.me Website
    89. Challenge 13.15.2 Practice PT: Your First Website
    90. Badge 13.15.3 Website Badge