Please enable JavaScript to use CodeHS

Fundamentals of Cybersecurity

Description

In this lesson, students explore the impacts of being online. Students reflect on social media use and their digital footprint as well as learn how to identify and respond to cyberbullying.

Objective

Students will be able to:

  • Analyze the impact of social media and technology use on the lives of teenagers
  • Explain how one’s digital footprint can impact their future employment options
  • Analyze their own digital footprint and explain how they can maintain a positive digital footprint
  • Define cyberbullying
  • Explain how to respond to cyberbullying
  • (Optional) Choose the best privacy settings to protect their digital footprint and prevent cyberbullying
Description

In this lesson, students explore the complex world of data collection. Students learn about the types of data that companies collect and what they do with it. Students also consider the ethics of data collection by working through a scenario about location tracking in school. Lastly, students learn about privacy within the context of law.

Objective

Students will be able to:

  • Explain why companies collect data and what they do with it
  • Analyze the benefits and consequences of data collection that may or may not be evidence to users
  • Consider the ethics of data collection with relation to privacy concerns
  • Define personally identifiable information
  • Explain personal data collection in the context of the law (GDPR, CCPA, and privacy policies)
Description

In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Objective

Students will be able to:

  • Evaluate the accuracy, relevance, comprehensiveness, appropriateness, and bias of electronic information resources
  • Evaluate quality of digital resources for reliability
  • Reflect on the growth of artificial intelligence in terms of trustworthy content
  • Explore and use search engine keywords and special characters to refine search results
Description

By the end of this lesson, students should have a better understanding of cyberethics, responsible internet use, and the impact of copyright and licenses on the digital world. They should also be more aware of the potential consequences of unethical online behavior.

Objective

Students will be able to:

  • Identify the difference between ethical hacking and malicious hacking
  • Discuss the principles of cyber ethics, focusing on responsible online behavior.
  • Discuss potential legal consequences of unethical online behavior
  • Debate intellectual laws and the beneficial and harmful effects that these laws have on innovation
Description

In this lesson, students learn about the importance of personal data security and explore different forms of authentication and browser security settings. Students then consider the tradeoffs between ease of use and security when implementing different authentication methods.

Objective

Students will be able to:

  • Explain password best practices
  • Define authentication terms: passphrase, multifactor authentication, 2FA, biometric authentication, password managers
  • Evaluate different forms of authentication
  • Explain how to use privacy settings on their browser to enhance security
  • Consider the tradeoffs between usability and security measures
Description

In this lesson, students are introduced to the core concepts of cybersecurity, focusing on the importance of protecting information and devices in the digital world. Students will explore key vocabulary terms, security frameworks, and the potential risks associated with the Internet of Things (IoT).

Objective

Students will be able to:

  • Define basic cybersecurity terminology
  • Explain the importance of information security and the CIA Triad (Confidentiality, Integrity, Availability)
  • Analyze how the AAA Security Framework (Authentication, Authorization, and Accounting) helps protect online information
  • Identify potential security risks associated with the Internet of Things (IoT) devices.
Description

In this lesson, students will learn how to navigate the digital world safely by understanding common cyber threats and implementing protective measures. Through interactive activities and creative storytelling, students will explore various cyberattacks, their consequences, and strategies for defense. This awareness will empower them to make responsible choices online and protect themselves from cybercrime.

Objective

Students will be able to:

  • Identify and define different types of cyberattacks (malware, viruses, ransomware, spyware, phishing)
  • Explain the importance of preventative measures like antivirus software, updates, HTTPS, and firewalls
  • Analyze real-world examples of phishing attacks and develop strategies for identifying suspicious online activities
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of basic cybersecurity concepts and its impacts through a multiple choice quiz
Description

In this lesson, students will learn about different encryption techniques and their historical significance. They will discover the limitations of certain methods and the evolution of cryptography throughout history. Lastly, students will also explore the future of cryptography and its potential applications.

Objective

Students will be able to:

  • Decode messages encrypted with Caesar and Vigenere ciphers
  • Explain the concept of encryption and its role in secure communication
  • Identify and compare different historical and modern encryption techniques
  • Analyze the limitations of certain decryption methods (brute force, letter frequency analysis)
  • Discuss the potential future applications of cryptography
Description

In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process.

Objective

Students will be able to:

  • Explain the characteristics of symmetric algorithms and use them to encode and decode text. Specific ciphers include block, substitution, and transposition ciphers.
  • Compare and contrast the strengths and weaknesses of symmetric ciphers.
Description

In this lesson, students will explore the concepts of key exchange and encryption, unlocking the secrets of how messages are protected online.

Objective

Students will be able to:

  • Identify the weaknesses with symmetric key encryption and why modern cryptography involves more complex mathematics
  • Explain the difference between symmetric and asymmetric encryption
  • Describe the key exchange process using the Diffie-Hellman algorithm (basic understanding).
  • Explain how public-key cryptography is used for encryption and decryption.
Description

In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security. They will also discover the concept of hashing and its application in data integrity.

Objective

Students will be able to:

  • Define digital certificates and explain their role in web security.
  • Describe the basic steps involved in the SSL/TLS handshake process.
  • Explain the concept of hashing and its importance in data verification.
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of cryptography through a multiple choice quiz
Description

In this project, students will apply their knowledge of ciphers and cryptography by designing and creating their own escape room experiences.

Objective

Students will be able to:

  • Demonstrate their understanding of different cryptographic techniques by creating puzzles
  • Develop a storyline and theme for their escape room, incorporating creativity and problem-solving skills
  • Collaborate effectively to design and implement their escape room experience
  • Provide and receive constructive feedback to improve their escape room design
Description

In this lesson, students will learn about the basic functions and types of operating systems. Students will also explore the process for upgrading and updating operating systems.

Objective

Students will be able to:

  • Explain the purpose of operating systems
  • Identify the main types of operating systems
  • Analyze the upgrade and installation process for operating systems
Description

This hands-on lab empowers students to personalize their computer experience by exploring display, sound, and storage settings, while also teaching them valuable troubleshooting skills. Students will learn to navigate their operating system and discover resources for further customization.

Objective

Students will be able to:

  • Identify their computer’s operating system
  • Explore and configure basic display, sound, and storage settings
  • Troubleshoot minor configuration issues
  • Identify resources for finding additional information about their system
Description

In this lesson, students delve deeper into the differences between the three main operating systems. They learn how operating systems store and manage files and the differences and similarities in each system’s interface.

Objective

Students will be able to:

  • Compare and contrast the interface of Mac, Windows, and Linux operating systems
  • Explain how operating systems use file systems to manage data
Description

In this lesson, students continue to compare and contrast different operating systems. Students learn how operating systems use file extensions to determine how to view different data types and how some extensions are only compatible with specific operating systems. Additionally, students learn about processors and the difference between a 32-bit processor and a 64-bit processor.

Objective

Students will be able to:

  • Compare and contrast file systems of different operating systems
  • Explain the role of the processor in a computer system
  • Explain the difference between a 32-bit and 64-bit processor and the impact it has on the operating system
Description

In this lesson, students will learn how to differentiate between laptops and tablets. Through brainstorming, activities, and discussions, students will explore the functionalities, strengths, and weaknesses of each device to make informed decisions about their own technology needs.

Objective

Students will be able to:

  • Identify key differences between laptops and tablets
  • Analyze the strengths and weaknesses of each device type
Description

In this lesson, students learn about the different types of software. Through interactive exercises, students explore how different software can be used in the workplace and our every day lives. Students also learn about single and cross-platform software.

Objective

Students will be able to:

  • Explain the different types of software (productivity, collaboration, business) and the purpose of each.
  • Explain the benefits and challenges of single and cross-platform software.
Description

In this lesson, students learn about the different types of software licenses as well as the different methods of installing software based on the application’s architecture.

Objective

Students will be able to:

  • Explain the different types of software licenses
  • Explain the different delivery methods and architecture models of installing software
Description

In this lesson, students will learn about the importance of application security and what they can do to protect applications once they have been installed on a device.

Objective

Students will be able to:

  • Explain the importance of application security
  • Explain the multiple methods for protecting software
Description

In this lesson, students will learn about browser security features and ways to configure their browsers to enhance security.

Objective

Students will be able to:

  • Configure their browser to enhance security and privacy
  • Explain how the following features impact their browser security: cache, client-side scripting, browser extensions, private browsing, proxy settings, certificates, and popup blockers
  • Describe appropriate browser security configurations
Description

In this lesson, students learn how to use user accounts and permissions to secure a device. Students also learn about system hardening and how to strengthen the security of a network by setting up and implementing host security.

Objective

Students will be able to:

  • Describe how creating user accounts and permissions enhances security
  • Define system hardening explain the importance of establishing baseline security, including deciding rules around authentication and authorization
  • Explain the importance of performing security audits
Description

In this lesson, students learn how to use the command line interface to interact with files and folders, and access information about computer processes.

Objective

Students will be able to:

  • Understand the connection between a command line (CLI) interface and a graphical line interface (GUI)
  • Use the appropriate command line tool for different tasks
Description

This hands-on lab will introduce students to the command line interface (CLI) by teaching them basic navigation commands. They will learn to move around their computer’s directories and open files using text-based commands.

Objective

Students will be able to:

  • Practice basic navigation commands in the CLI (cd, ls, open..)
    • Navigate to specific directories on their device
    • List the contents of a directory
    • Open files from the CLI.
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of system administration concepts and its impacts through a multiple choice quiz
Description

In this lesson, students will explore how computers use the binary number system to store and communicate information. Through hands-on activities, they will learn how sequences of 0s and 1s represent data in a computer, understanding the fundamental concept of binary code. This foundational knowledge will enable students to grasp how computers interpret complex information and the importance of secure data encoding in cybersecurity.

Objective

Students will be able to:

  • Explain the significance of binary in computer communication
  • Encode and decode messages using binary representation
  • Understand the role of transistors in storing and processing binary information
Description

In this lesson, students will learn how to convert between binary and decimal numbers, understand binary place values, and apply these concepts to encode and decode messages using ASCII.

Objective

Students will be able to:

  • Explain how text can be represented using a sequence of 0s and 1s (binary code)
  • Convert between binary and decimal numbers
  • Identify binary place values
  • Encode and decode messages using ASCII
  • Apply binary concepts to real-world scenarios
Description

In this lesson, students will learn how computers break down images into concrete values that can be stored. Students will learn how images are represented digitally using pixels.

Objective

Students will be able to:

  • Understand how images can be encoded as data
  • Create pixel images in color and black and white
  • Identify bit storage units by name and size
Description

In this lesson, students will explore the fundamental concepts of the internet, including its infrastructure and operation. Through videos, readings, and interactive activities, students will gain an understanding of wired and wireless networks, the role of submarine cables, and the foundational ideas behind the internet. The lesson culminates in a reflection activity where students articulate their understanding of the internet.

Objective

Students will be able to:

  • Define what the internet is and explain its significance
  • Differentiate between wired and wireless networks
  • Understand the role of submarine cables in global connectivity
  • Reflect on the foundational concepts of the internet as described by Vint Cerf
  • Articulate their understanding of the internet through open-ended responses
Description

In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol. They will also gain insight into IP addresses, including their function, how to read them, and their role in network communication.

Objective

Students will be able to:

  • Evaluate protocol effectiveness
  • Demonstrate an understanding of IP addresses
  • Identify IP addresses of devices in a simulated environment
  • Discuss privacy concerns related to IP addresses
Description

In this lesson, students explore how messages get from one address on the internet to another. Students explore the format for creating and reading packets, as defined by open protocols.

Objective

Students will be able to:

  • Explain how computers communicate using routers, and explain what considerations are made when choosing a route
  • Map messages across several routers of different statuses
  • Analyze the transmission of data between IP addresses using packets
  • Determine if TCP or UDP protocols are more appropriate for transferring several types of data
Description

In this lesson, students will explore how websites function, learning about key concepts such as IP addresses, web servers, DNS, and HTTP. Through interactive activities, students will gain a deeper understanding of how data travels across the internet and the role of protocols in delivering web content.

Objective

Students will be able to:

  • Understand the structure of a website and its components
  • Explain how web pages are stored and delivered using web servers and protocols
  • Demonstrate the process of sending and receiving data over the internet through activities
Description

In this lesson, students will explore the OSI (Open Systems Interconnection) Model, which is a conceptual framework used to understand how different networking protocols interact and work together. Students will learn about the seven layers of the OSI Model, the functions of each layer, and how it applies to real-world scenarios such as troubleshooting network issues.

Objective

Students will be able to:

  • Identify the seven layers of the OSI Model
  • Explain the purpose and function of each layer
  • Analyze real-world networking issues using the OSI Model framework
Description

In this lesson, students will explore the various impacts of the internet on society, including social, educational, and personal aspects. Through readings and the Compass Points thinking routine, students will articulate their thoughts and reflect on their understanding of the internet’s influence.

Objective

Students will be able to:

  • Describe the various impacts of the internet on social, educational, and personal life
  • Express their feelings about the internet using the Compass Points thinking routine
  • Conduct research on selected internet topics
  • Demonstrate an understanding of properly citing sources
  • Participate in discussions, comparing perspectives with peers
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Description

In this lesson, students will learn about the essential internal components that make up a computer. Component categories include the motherboard (system board), firmware (BIOS), CPU (processor), GPU (graphics processor), storage, cooling, and NIC (network adapter).

Objective

Students will be able to:

  • Explain the purpose of common internal computing components such as motherboards, BIOS, RAM, and more.
Description

In this hands-on lab, you will learn how to safely and efficiently disassemble a computer. You will practice using various tools, follow safety procedures, and understand the components and their functions. By the end of this lab, you will have a better understanding of computer hardware and the assembly process.

Objective

Students will be able to:

  • Identify and use appropriate tools for computer disassembly
  • Follow safety procedures to prevent damage to the computer or injury to oneself
  • Understand the components of a computer and their functions, including the motherboard, CPU, RAM, storage devices, and power supply
  • Disassemble a computer systematically, removing components in the correct order and storing them safely
  • Identify and troubleshoot potential issues during the disassembly process
Description

In this lesson, students will learn and explain the purposes and use of various peripheral types. They will classify the peripherals as input or output devices and explore different ways of installing them on a laptop or PC.

Objective

Students will be able to:

  • Explain the purposes and uses of various peripheral types
  • Classify common types of input/output device interfaces.
  • Explain how to install common peripheral devices to a laptop/PC
Description

In this lesson, students will learn about the different storage options including local storage, network storage, and cloud storage.

Objective

Students will be able to:

  • Compare and contrast storage types
  • Examine and discuss the security of cloud storage
  • Select suitable storage devices for given situations
Description

In this lesson, students will learn about different networking devices that allow devices to connect to other devices as well as the Internet. They will also learn different networking connection methods such as using dialup, DSL, coax cables, and fiber optic cables.

Objective

Students will be able to:

  • Compare and contrast common Internet service types
  • Compare and contrast common networking hardware devices
  • Explain basic cable types, features, and their purposes
Description

In this lab, you will design and explore the components of a distribution frame, a key element in managing telecommunication wiring. You will learn about the different parts, like the main distribution frame (MDF) and patch panels, and how they connect devices and cables in a network.

Objective

Students will be able to:

  • Define and explain the function of a distribution frame (MDF) and its role in a network
  • Design a distribution frame layout for a classroom or house, including connections for devices like routers, computers, and internet lines
  • Identify and explain the purpose of cable management tools like patch panels and cable trays
  • Describe the importance of power management in a network and the function of an uninterruptible power supply (UPS)
  • Create a labeled diagram or model of a distribution frame system, including devices, ports, circuits, and cables, for future reference or troubleshooting
Description

In this lesson, students will learn about the different network types and options that are available. This will include wireless networking standards and protocols.

Objective

Students will be able to:

  • Compare and contrast the different wireless network standards
  • Compare and contrast Internet connection types, network types, and their features
Description

Master your printer! This lab teaches you to adjust settings for duplex printing, collation, and orientation (portrait vs. landscape) to personalize your printing experience.

Objective

Students will be able to:

  • Locate and identify your computer’s operating system and printer model
  • Access printer settings and understand basic options like duplexing (printing on both sides)
  • Utilize duplex printing for a multi-page document and troubleshoot if necessary
  • Explain the benefits of duplex printing and collating (arranging pages in order)
  • Adjust printer settings for collation and paper orientation (portrait/landscape) based on document needs
Description

Master your mobile device! This lab teaches you to navigate settings and customize features like Wi-Fi, Bluetooth, and email for a personalized smartphone experience.

Objective

Students will be able to:

  • Identify a mobile device model and access its settings
  • Connect and manage Wi-Fi connections, understanding the difference between Wi-Fi and cellular data
  • Pair and manage Bluetooth devices, explaining scenarios for customizing settings
  • Research and explain mobile network technologies (CDMA, GSM, LTE, 5G)
  • Explore email settings and protocols (POP3, IMAP, SMTP, MIME)
Description

In this lesson, students will learn about different ports and protocols and how they can be protected using a firewall. They will explore port scans and how to set firewall rules.

Objective

Students will be able to:

  • Compare and contrast different ports, protocols and their purposes
  • Explain the purpose of a firewall and how it protects against unwanted traffic
Description

In this lesson, students will learn about different CLI commands and tools that will provide network information. Students will also take a look at network connection logs to determine the legitimacy of specific login attempts.

Objective

Students will be able to:

  • Explain and use appropriate network command line tools
  • Read and understand the basics of log reports
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Description

In this lesson, students explore what it means to be a cybersecurity professional. Students learn about a wide variety of cybersecurity careers, what each job entails, and what skills sets are needed to be successful. Students learn about the importance of communication and practice responding to a customer support call.

Objective

Students will be able to:

  • Explore skill sets and duties of multiple cybersecurity careers
  • Describe the skills involved in successful customer support
  • Utilize customer support and communication skills in a mock customer support call
Description

In this lesson, students are introduced to a systematic troubleshooting methodology through simulated IT support scenarios. Students will learn to identify problems, research solutions, test theories, and document the resolution process. By the end of the lesson, students will have applied this methodology to solve multiple IT issues.

Objective

Students will be able to:

  • Identify and articulate the steps involved in the troubleshooting process
  • Effectively communicate technical issues and solutions in a clear and concise manner
  • Develop and test hypotheses to resolve IT issues
  • Document the troubleshooting process and its outcome in a professional manner
Description

In this lesson, students continue to develop their customer service skills by writing a knowledge base article. Students will research a common network issue and create an article that effectively details the steps to resolve it. Students will also go through a peer review process as a way to practice giving and receiving feedback.

Objective

Students will be able to:

  • Explain the purpose of a knowledge base and describe the characteristics of an effective knowledge base article
  • Effectively provide instructions for how to troubleshoot a common network issue
Description

In this lesson, students learn about the planning and recording process of making an instructional video. Students will create their own video by first planning the topic and audience as well as writing a script and storyboard. Students will then learn how to record and edit their video.

Objective

Students will be able to:

  • Explain the role videos play in supporting customers and clients
  • Describe the characteristics of an effective instructional video
  • Develop a plan for an instructional video, including identifying the topic and audience, writing a script, and developing a storyboard
  • Record and edit an instructional video
Description

In this lesson, students will explore the different types and states of data and its value as a resource. Students will develop a critical understanding of data’s role in society and its ethical implications.

Objective

Students will be able to:

  • Differentiate between data, information, and knowledge
  • Explain the different states of data (in use, in transit, at rest) and provide examples of each
  • Analyze the role of data centers in modern society
Description

In this lesson, students are introduced to database management systems and the fundamentals of SQL. They will learn how to create tables, insert data, and retrieve information using basic SQL queries.

Objective

Students will be able to:

  • Identify and explain the major uses of a database management system
  • Define the different parts of a database (table, column, row)
  • Create new tables and entries using SQL code
  • Construct basic SQL queries using SELECT and WHERE keywords.
Description

In this lesson, students will explore how attackers can exploit weaknesses in websites and programs. They will learn about SQL Injection and Cross-Site Scripting (XSS), as well as programming errors that can cause vulnerabilities.

Objective

Students will be able to:

  • Identify the commands used in SQL Injection attacks
  • Explain how attackers gain unauthorized access through SQL Injection
  • Describe the importance of input validation in preventing security vulnerabilities
  • Explain how buffer and integer overflows can be exploited for security breaches
Description

In this lesson, students will dive into the world of developer tools, the secret weapons of web designers and programmers! Students will explore the code behind websites, participate in a capture-the-flag style game, and learn how to use developer tools to inspect and manipulate websites.

Objective

Students will be able to:

  • Identify major developer tools within the inspect element
  • Explain the purpose of developer tools
  • Utilize basic developer tools functions like “view-source” and the console.
  • Describe the potential vulnerabilities found within website code.
Description

In this lesson, students will learn about the importance of physical security as well as environmental controls. Students will understand that the security and functionality of a network goes beyond simply having the necessary devices - it includes proper security and maintenance of the devices.

Objective

Students will be able to:

  • Explain the importance of specific security measures: mantrap, door lock, biometric locks, USB locks, privacy screen
  • Explain environmental impacts on devices and implement appropriate controls
Description

In this lesson, students learn about vulnerabilities, cyber threats, and attacks on networks and organizations. Students simulate identifying and exploiting vulnerabilities.

Objective

Students will be able to:

  • Run and analyze simulated nmap scans
  • Identify key vulnerabilities in a fictional organization
  • Develop plans to attack vulnerabilities
Description

In this lesson, students are introduced to the Risk Management process. They will learn how to identify, analyze, reduce, and monitor risk.

Objective

Students will be able to:

  • Identify and explain the major steps of Risk Management
  • Utilize the Risk Management process to mitigate network threats and vulnerabilities
  • Identify how the Risk Management process can prevent attacks
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.

Description

In this project, students will design and create a board game or a card game that will help players to identify randomized security vulnerabilities and their appropriate defenses.

Objective

Students will be able to:

  • Brainstorm and create a risk management game
  • Create a prototype
  • Test with a focus group
Description

In this lesson, students will explore potential career paths, educational opportunities, and the value of certifications. Students will engage with various resources to gain a comprehensive understanding of the field and begin to envision their own cybersecurity journey.

Objective

Students will be able to:

  • Identify potential career roles within the cybersecurity industry
  • Explore educational pathways as a potential stepping stone to a cybersecurity career
  • Demonstrate critical thinking by analyzing career information and reflecting on their own career aspirations