Please enable JavaScript to use CodeHS

Fundamentals of Cybersecurity

Description

In this lesson, students will explore the different types and states of data and its value as a resource. Students will develop a critical understanding of data’s role in society and its ethical implications.

Objective

Students will be able to:

  • Differentiate between data, information, and knowledge
  • Explain the different states of data (in use, in transit, at rest) and provide examples of each
  • Analyze the role of data centers in modern society
Description

In this lesson, students are introduced to database management systems and the fundamentals of SQL. They will learn how to create tables, insert data, and retrieve information using basic SQL queries.

Objective

Students will be able to:

  • Identify and explain the major uses of a database management system
  • Define the different parts of a database (table, column, row)
  • Create new tables and entries using SQL code
  • Construct basic SQL queries using SELECT and WHERE keywords.
Description

In this lesson, students will explore how attackers can exploit weaknesses in websites and programs. They will learn about SQL Injection and Cross-Site Scripting (XSS), as well as programming errors that can cause vulnerabilities.

Objective

Students will be able to:

  • Identify the commands used in SQL Injection attacks
  • Explain how attackers gain unauthorized access through SQL Injection
  • Describe the importance of input validation in preventing security vulnerabilities
  • Explain how buffer and integer overflows can be exploited for security breaches
Description

In this lesson, students will dive into the world of developer tools, the secret weapons of web designers and programmers! Students will explore the code behind websites, participate in a capture-the-flag style game, and learn how to use developer tools to inspect and manipulate websites.

Objective

Students will be able to:

  • Identify major developer tools within the inspect element
  • Explain the purpose of developer tools
  • Utilize basic developer tools functions like “view-source” and the console.
  • Describe the potential vulnerabilities found within website code.
Description

In this lesson, students will learn about the importance of physical security as well as environmental controls. Students will understand that the security and functionality of a network goes beyond simply having the necessary devices - it includes proper security and maintenance of the devices.

Objective

Students will be able to:

  • Explain the importance of specific security measures: mantrap, door lock, biometric locks, USB locks, privacy screen
  • Explain environmental impacts on devices and implement appropriate controls
Description

In this lesson, students learn about vulnerabilities, cyber threats, and attacks on networks and organizations. Students simulate identifying and exploiting vulnerabilities.

Objective

Students will be able to:

  • Run and analyze simulated nmap scans
  • Identify key vulnerabilities in a fictional organization
  • Develop plans to attack vulnerabilities
Description

In this lesson, students are introduced to the Risk Management process. They will learn how to identify, analyze, reduce, and monitor risk.

Objective

Students will be able to:

  • Identify and explain the major steps of Risk Management
  • Utilize the Risk Management process to mitigate network threats and vulnerabilities
  • Identify how the Risk Management process can prevent attacks
Description

In this lesson, students complete a summative assessment of the module’s learning objectives.