Please enable JavaScript to use CodeHS

Outline


1. What is Cybersecurity?
1.1 Module Overview - Cybersecurity
Video 1.1.1 Welcome to Cybersecurity
Check for Understanding 1.1.2 Welcome to Cybersecurity
Example 1.1.3 Intruder Alert!
Free Response 1.1.4 Cybersecurity and You
Free Response 1.1.5 Course Goals
1.2 What is Cybersecurity?
Video 1.2.1 What is Cybersecurity?
Check for Understanding 1.2.2 What is Cybersecurity?
Connection 1.2.3 City Services Ransomware
Free Response 1.2.4 Ransomware Reflection
Example 1.2.5 Ransomware Simulator
Connection 1.2.6 Internet of Things
Connection 1.2.7 Hackers vs. Smart Homes
Free Response 1.2.8 Internet of Things Reflection
1.3 Impact of Cybersecurity
Video 1.3.1 Impact of Cybersecurity
Check for Understanding 1.3.2 Impact of Cybersecurity
Example 1.3.3 Phishing Simulator
Connection 1.3.4 Phishing for Your Info
Free Response 1.3.5 Phishing Reflection
Connection 1.3.6 Cyber Game
Free Response 1.3.7 Cyber Game Reflection
Connection 1.3.8 Cyber Crime Time
Free Response 1.3.9 Cyber Crime Time Reflection
1.4 The CIA Triad
Video 1.4.1 CIA Triad
Check for Understanding 1.4.2 CIA Triad
Free Response 1.4.3 Which part of the CIA Triad?
Free Response 1.4.4 Which part of the CIA Triad?
Free Response 1.4.5 Breach of Confidentiality
Free Response 1.4.6 Breach of Availability
Free Response 1.4.7 CIA Connections
1.5 What is Cybersecurity? Quiz
Unit Quiz 1.5.1 What is Cybersecurity? Quiz
2. Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
Video 2.1.1 Digital Footprint and Reputation
Check for Understanding 2.1.2 Digital Footprint and Reputation
Example 2.1.3 Social Media Clean-up
Free Response 2.1.4 Building a Positive Digital Footprint
Connection 2.1.5 Right to be Forgotten?
Free Response 2.1.6 Right to be Forgotten
Free Response 2.1.7 What is your Digital Footprint?
2.2 Cyberbullying
Video 2.2.1 Cyberbullying
Check for Understanding 2.2.2 Cyberbullying
Free Response 2.2.3 Scenario: Student Ranking
Free Response 2.2.4 Scenario: Singled Out
Free Response 2.2.5 Stopping Cyberbullying
2.3 Internet Safety
Video 2.3.1 Internet Safety
Check for Understanding 2.3.2 Internet Safety
Free Response 2.3.3 Scenario: School Stranger
Free Response 2.3.4 Scenario: Vacation Pals
Free Response 2.3.5 Staying Safe
2.4 Privacy & Security
Video 2.4.1 What is Data Privacy & Security?
Check for Understanding 2.4.2 Privacy & Security Quiz
Connection 2.4.3 Google Privacy Policy Search
Free Response 2.4.4 Google Privacy Policy Search
Example 2.4.5 Guess: Password List
Example 2.4.6 Guess: Using an Algorithm
Example 2.4.7 Guess: Brute Force
Connection 2.4.8 How Strong is your Password?
Free Response 2.4.9 How Strong is your password?
Example 2.4.10 You Can Be Tracked!
2.5 Information Literacy
Video 2.5.1 Information Literacy
Check for Understanding 2.5.2 Information Literacy
Free Response 2.5.3 Effective Internet Searches
Connection 2.5.4 Evaluate the Source 1
Free Response 2.5.5 Respond: Evaluate the Source 1
Notes 2.5.6 Evaluate the Source 2
Free Response 2.5.7 Respond: Evaluate the Source 2
Connection 2.5.8 Hero Pig?
Free Response 2.5.9 Respond: Hero Pig?
2.6 Creative Credit & Copyright
Video 2.6.1 Creative Credit and Copyright
Check for Understanding 2.6.2 Creative Credit and Copyright
Free Response 2.6.3 Cite!
Connection 2.6.4 Exploring Creative Commons
Free Response 2.6.5 Respond: Creative Commons
Free Response 2.6.6 Task: Finding Images
Free Response 2.6.7 Reflection: Why is Copyright Important?
2.7 Hacking Ethics
Video 2.7.1 Hacking Ethics & Legality
Check for Understanding 2.7.2 Hacking Ethics & Legality
Connection 2.7.3 Penetration Testing
Free Response 2.7.4 Reflection: Penetration Testing
Connection 2.7.5 Hack the Pentagon?
Free Response 2.7.6 Reflection: Hack the Pentagon
Check for Understanding 2.7.7 Ethical Hacker Agreement
2.8 Digital Citizenship and Cybersecurity Quiz
Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
3. Project: Public Service Announcement
3.1 Project: Public Service Announcement
Free Response 3.1.1 Pick a Topic
Free Response 3.1.2 Research
Free Response 3.1.3 Choose Your Audience
Free Response 3.1.4 What kind of PSA?
Free Response 3.1.5 Draft your PSA
Free Response 3.1.6 Finalize your PSA!
4. The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
Example 4.1.3 Cryptogram Game!
Video 4.1.4 Why encrypt?
Check for Understanding 4.1.5 Why encrypt?
Example 4.1.6 Encrypt/Decrypt
4.2 History of Cryptography
Video 4.2.1 Cryptography: A Brief History
Check for Understanding 4.2.2 Cryptography History Quiz
Connection 4.2.3 How the Enigma Worked
Free Response 4.2.4 How the Enigma Worked
Connection 4.2.5 Unknown Languages and the Future of Cryptography
Free Response 4.2.6 The Future of Cybersecurity
4.3 Basic Crypto Systems: Caesar Cipher
Video 4.3.1 Caesar Cipher
Check for Understanding 4.3.2 Caesar Cipher
Example 4.3.3 Caesar Cipher Encryption
Example 4.3.4 Decrypt Caesar's Cipher!
4.4 Basic Crypto Systems: Cracking Caesar
Video 4.4.1 Cracking Caesar Cipher
Check for Understanding 4.4.2 Cracking Caesar Cipher
Example 4.4.3 Cracking Caesar with Brute Force
Example 4.4.4 Letter Frequency and Caesar
Free Response 4.4.5 Examining Caesar Cipher
4.5 Basic Crypto Systems: Vigenere Cipher
Video 4.5.1 Vigenere Cipher
Check for Understanding 4.5.2 Vigenere Cipher
Example 4.5.3 Vigenere Cipher Example
Example 4.5.4 Letter Frequency and Vigenere Cipher
Free Response 4.5.5 Examining Vigenere Cipher
Example 4.5.6 Improving Vigenere
4.6 The ABCs of Cryptography Quiz
Unit Quiz 4.6.1 The ABCs of Cryptography Quiz
5. Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
Notes 5.1.1 Overview
Notes 5.1.2 Investigate a Classic Cipher
Free Response 5.1.3 Write the Script and Rehearse
Free Response 5.1.4 Newscast Presentation
6. System Administration
6.1 Operating Systems
Video 6.1.1 Operating Systems
Check for Understanding 6.1.2 Operating Systems Quiz
Example 6.1.3 Detect My OS
Connection 6.1.4 Upgrading a Mac OS
Example 6.1.5 Windows OS Installation Simulation
Free Response 6.1.6 Installing an OS
6.2 Comparing Operating Systems
Video 6.2.1 Comparing Operating Systems
Check for Understanding 6.2.2 Comparing Operating Systems Quiz
Example 6.2.3 Windows Simulation
Example 6.2.4 MacOS Simulation
Connection 6.2.5 Choose a Linux Distro!
Free Response 6.2.6 Which would you choose?
6.3 Compatibility
Video 6.3.1 Compatibility
Check for Understanding 6.3.2 Compatibility Quiz
Example 6.3.3 What Processor? Windows
Example 6.3.4 What Processor? Mac
Free Response 6.3.5 What Processor are you running?
6.4 Software and Applications
Video 6.4.1 Software and Applications
Check for Understanding 6.4.2 Software and Applications Quiz
Example 6.4.3 Spreadsheet Simulation
Example 6.4.4 Messaging Simulation
Example 6.4.5 Kanban Board Simulation
Free Response 6.4.6 Software Simulations
6.5 Software Licenses
Video 6.5.1 Software Licenses
Check for Understanding 6.5.2 Software Licenses Quiz
Free Response 6.5.3 Do I need a Software License?
Free Response 6.5.4 Is This Original?
6.6 Application Security
Video 6.6.1 Application Security
Check for Understanding 6.6.2 Application Security
Example 6.6.3 Windows Updates
Connection 6.6.4 Windows Defender Antivirus
Free Response 6.6.5 Windows Defender Antivirus
Free Response 6.6.6 CodeHS System Restore
6.7 Browser Configuration
Video 6.7.1 Browser Configuration
Check for Understanding 6.7.2 Browser Configuration
Connection 6.7.3 Cached CodeHS
Free Response 6.7.4 Cached CodeHS
Example 6.7.5 Is Your Popup Blocker On?
Free Response 6.7.6 Browser Extensions Lab
6.8 System Administration
Video 6.8.1 User Accounts
Check for Understanding 6.8.2 User Accounts Quiz
Free Response 6.8.3 User Accounts
Free Response 6.8.4 Shared Folders and Files
Video 6.8.5 Host Security
Check for Understanding 6.8.6 Host Security Quiz
Free Response 6.8.7 Security Baseline
6.9 Command Line Interface
Notes 6.9.1 Linux/MacOS vs. Windows
Video 6.9.2 Command Line Interface
Check for Understanding 6.9.3 Command Line Interface Quiz
Resource 6.9.4 Command Equivalents
Video 6.9.5 Windows Command Prompt
Free Response 6.9.6 Windows Command Prompt
Free Response 6.9.7 Directory Directions
Connection 6.9.8 Neural Interface?
Free Response 6.9.9 Neural Interface?
6.10 System Administration Quiz
Survey 6.10.1 Mindsets
Unit Quiz 6.10.2 System Administration Quiz
7. Software Security
7.1 Inside Web Apps
Video 7.1.1 Inside Web Apps
Check for Understanding 7.1.2 Inside Web Apps
Free Response 7.1.3 Using View Page Source
Example 7.1.4 Recreate a Webpage?
Connection 7.1.5 Getting Started with OWASP
Free Response 7.1.6 Getting Started with OWASP
7.2 Developer Tools
Video 7.2.1 Developer Tools
Check for Understanding 7.2.2 Developer Tools
Free Response 7.2.3 Using the Developer Tools
Exercise 7.2.4 Console Secrets
Example 7.2.5 Local Storage
Connection 7.2.6 The Top Cybersecurity Blogs and Websites
Free Response 7.2.7 Selecting a Site to Follow
7.3 The Value of Data
Video 7.3.1 The Value of Data
Check for Understanding 7.3.2 The Value of Data Quiz
Notes 7.3.3 Exploring Data Visualizations
Connection 7.3.4 US Recorded Music Revenue
Connection 7.3.5 National Parks
Connection 7.3.6 March Madness
Connection 7.3.7 Captain Marvel
Free Response 7.3.8 Respond: Visualizations
Free Response 7.3.9 Free Response: Choosing a Visualization
Free Response 7.3.10 Reflection: Design a Survey
7.4 Databases
Video 7.4.1 Databases
Check for Understanding 7.4.2 Databases
Connection 7.4.3 Database Administrator Career
Free Response 7.4.4 Database Administrator Career
Video 7.4.5 Parts of a Database
Check for Understanding 7.4.6 Parts of a Database
Connection 7.4.7 SQL Database Diagram
Free Response 7.4.8 SQL Database Diagram
Free Response 7.4.9 Schema Brainstorm
7.5 Clients and Servers
Video 7.5.1 Clients and Servers
Check for Understanding 7.5.2 Clients and Servers
Connection 7.5.3 Inside a Google Data Center
Free Response 7.5.4 Inside a Google Data Center
Connection 7.5.5 Cloud Vulnerabilities
Free Response 7.5.6 Cloud Vulnerabilities Response
Video 7.5.7 Client-Server Model
Check for Understanding 7.5.8 Client-Server Model
Connection 7.5.9 The Future of User Privacy
Free Response 7.5.10 The Future of User Privacy
7.6 What is SQL?
Notes 7.6.1 What is SQL Overview
Video 7.6.2 Intro to SQL
Check for Understanding 7.6.3 Quiz: What is SQL?
Video 7.6.4 How to Structure Data in SQL
Check for Understanding 7.6.5 How to Structure Data in SQL
Example 7.6.6 SQL Tables
Free Response 7.6.7 SQL Tables Response
7.7 Basic Querying in SQL
Video 7.7.1 The SELECT Statement
Check for Understanding 7.7.2 Basic Querying in SQL
Example 7.7.3 Our First SELECT Statement
Exercise 7.7.4 Your First SELECT Statement
Video 7.7.5 More SELECT Statement
Check for Understanding 7.7.6 More SELECT Statement
Example 7.7.7 Selecting Specific Columns
Exercise 7.7.8 Harry Potter Names
7.8 Filtering Queries in SQL
Video 7.8.1 The WHERE Clause
Check for Understanding 7.8.2 Condition Operators
Example 7.8.3 Ravenclaw House
Example 7.8.4 People in Gryffindor
Example 7.8.5 Filter By ID
Exercise 7.8.6 The Weasleys
Exercise 7.8.7 The Potters
7.9 Common Security Problems
Video 7.9.1 Common Security Problems
Check for Understanding 7.9.2 Common Security Problems
Connection 7.9.3 Meet Security Engineers at Google
Free Response 7.9.4 Security Engineering Reflection
Video 7.9.5 Living in a Digital World
Free Response 7.9.6 Living in a Digital World
7.10 SQL Injection Overview
Video 7.10.1 SQL Injection Overview
Check for Understanding 7.10.2 SQL Injection Overview
Connection 7.10.3 Equifax Security Breach
Connection 7.10.4 Equifax Exposed Millions
Free Response 7.10.5 Equifax SQL Injection Attack
Example 7.10.6 SQLi
7.11 Types of SQLi and Prevention
Video 7.11.1 Types of SQLi
Check for Understanding 7.11.2 Types of SQLi
Video 7.11.3 Preventing SQLi
Check for Understanding 7.11.4 Preventing SQLi
Connection 7.11.5 Mitigating SQL Injection
Free Response 7.11.6 Reflection: Mitigating SQL Injection
Connection 7.11.7 SQL Injection Practice
7.12 Software Security Quiz
Unit Quiz 7.12.1 Software Security Quiz
8. What's Next?
8.1 After Fundamentals of Cybersecurity
Notes 8.1.1 Cybersecurity Pathways
Connection 8.1.2 CodeHS Advanced Cybersecurity
Notes 8.1.3 College Pathway
Connection 8.1.4 Certification Pathway
Connection 8.1.5 Career Spotlight
Free Response 8.1.6 My Pathway