Please enable JavaScript to use CodeHS

Introduction to Cybersecurity (Alberti) - Outline

  1. Introduction to Cybersecurity Pretest

    1. 1.1 Introduction to Cybersecurity Pretest

    2. Notes 1.1.1 About the Pretest
    3. Survey 1.1.2 Mindsets
    4. Quiz 1.1.3 Introduction to Cybersecurity Knowledge & Skills
  2. What is Cybersecurity?

    1. 2.1 Module Overview - Cybersecurity

    2. Video 2.1.1 Welcome to Cybersecurity
    3. Check for Understanding 2.1.2 Welcome to Cybersecurity
    4. Free Response 2.1.3 Cybersecurity and You
    5. Free Response 2.1.4 Course Goals
    6. 2.2 What is Cybersecurity?

    7. Video 2.2.1 What is Cybersecurity?
    8. Check for Understanding 2.2.2 What is Cybersecurity?
    9. Connection 2.2.3 WannaCry Ransomware Attack
    10. Free Response 2.2.4 WannaCry Reflection
    11. Connection 2.2.5 Internet of Things
    12. Connection 2.2.6 Cybersecurity and Connected Cars
    13. Free Response 2.2.7 Internet of Things Reflection
    14. Connection 2.2.8 Threat Map
    15. Free Response 2.2.9 Why Learn about Cybersecurity?
    16. 2.3 Impact of Cybersecurity

    17. Video 2.3.1 Impact of Cybersecurity
    18. Check for Understanding 2.3.2 Impact of Cybersecurity
    19. Connection 2.3.3 Yahoo! Attack
    20. Free Response 2.3.4 Yahoo! Reflection
    21. Connection 2.3.5 Fighting Cyber Crime
    22. Free Response 2.3.6 Cyber Crime Reflection
    23. Connection 2.3.7 FBI Cyber Crime
    24. Free Response 2.3.8 FBI Reflection
    25. 2.4 The CIA Triad

    26. Video 2.4.1 CIA Triad
    27. Check for Understanding 2.4.2 CIA Triad
    28. Free Response 2.4.3 Which part of the CIA Triad?
    29. Free Response 2.4.4 Which part of the CIA Triad?
    30. Free Response 2.4.5 Breach of Confidentiality
    31. Free Response 2.4.6 Breach of Availability
    32. 2.5 What is Cybersecurity? Quiz

    33. Quiz 2.5.1 What is Cybersecurity? Quiz
    34. Badge 2.5.2 Intro to Cybersecurity Badge
  3. Digital Citizenship and Cyber Hygiene

    1. 3.1 Digital Footprint and Reputation

    2. Video 3.1.1 Digital Footprint and Reputation
    3. Check for Understanding 3.1.2 Digital Footprint and Reputation
    4. Free Response 3.1.3 Building a Positive Digital Footprint
    5. Connection 3.1.4 Right to be Forgotten?
    6. Free Response 3.1.5 Right to be Forgotten
    7. Free Response 3.1.6 What is your Digital Footprint?
    8. 3.2 Cyberbullying

    9. Video 3.2.1 Cyberbullying
    10. Check for Understanding 3.2.2 Cyberbullying
    11. Free Response 3.2.3 Scenario: Student Ranking
    12. Free Response 3.2.4 Scenario: Singled Out
    13. Free Response 3.2.5 Stopping Cyberbullying
    14. 3.3 Internet Safety

    15. Video 3.3.1 Internet Safety
    16. Check for Understanding 3.3.2 Internet Safety
    17. Free Response 3.3.3 Scenario: School Stranger
    18. Free Response 3.3.4 Scenario: Vacation Pals
    19. Free Response 3.3.5 Staying Safe
    20. 3.4 Privacy & Security

    21. Video 3.4.1 What is Data Privacy & Security?
    22. Check for Understanding 3.4.2 Privacy & Security Quiz
    23. Connection 3.4.3 How Strong is your Password?
    24. Free Response 3.4.4 How Strong is your password?
    25. Connection 3.4.5 Google Privacy Policy Search
    26. Free Response 3.4.6 Google Privacy Policy Search
    27. 3.5 Information Literacy

    28. Video 3.5.1 Information Literacy
    29. Check for Understanding 3.5.2 Information Literacy
    30. Free Response 3.5.3 Effective Internet Searches
    31. Connection 3.5.4 Evaluate the Source 1
    32. Free Response 3.5.5 Respond: Evaluate the Source 1
    33. Connection 3.5.6 Evaluate the Source 2
    34. Free Response 3.5.7 Respond: Evaluate the Source 2
    35. Connection 3.5.8 Hero Pig?
    36. 3.6 Creative Credit & Copyright

    37. Video 3.6.1 Creative Credit and Copyright
    38. Check for Understanding 3.6.2 Creative Credit and Copyright
    39. Free Response 3.6.3 Cite!
    40. Connection 3.6.4 Exploring Creative Commons
    41. Free Response 3.6.5 Respond: Creative Commons
    42. Free Response 3.6.6 Task: Finding Images
    43. Free Response 3.6.7 Reflection: Why is Copyright Important?
    44. 3.7 Hacking Ethics

    45. Video 3.7.1 Hacking Ethics & Legality
    46. Check for Understanding 3.7.2 Hacking Ethics & Legality
    47. Connection 3.7.3 Penetration Testing
    48. Free Response 3.7.4 Reflection: Penetration Testing
    49. Connection 3.7.5 Hack the Pentagon?
    50. Free Response 3.7.6 Reflection: Hack the Pentagon
    51. Check for Understanding 3.7.7 Ethical Hacker Agreement
    52. 3.8 Project: Public Service Announcement

    53. Free Response 3.8.1 Pick a Topic
    54. Free Response 3.8.2 Research
    55. Free Response 3.8.3 Choose Your Audience
    56. Free Response 3.8.4 What kind of PSA?
    57. Free Response 3.8.5 Draft your PSA
    58. Free Response 3.8.6 Finalize your PSA!
    59. 3.9 Digital Citizenship and Cyber Hygiene Quiz

    60. Unit Quiz 3.9.1 Digital Citizenship and Cyber Hygiene Quiz
    61. Badge 3.9.2 Digital Citizenship and Cybersecurity Badge
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Connection 4.1.3 Securing the Cloud
    5. Free Response 4.1.4 Encryption Reflection
    6. 4.2 History of Cryptography

    7. Video 4.2.1 Cryptography: A Brief History
    8. Check for Understanding 4.2.2 Cryptography History Quiz
    9. Connection 4.2.3 How the Enigma Worked
    10. Free Response 4.2.4 How the Enigma Worked
    11. Connection 4.2.5 Unknown Languages and the Future of Cryptography
    12. Free Response 4.2.6 The Future of Cybersecurity
    13. 4.3 Why encrypt?

    14. Video 4.3.1 Why encrypt?
    15. Check for Understanding 4.3.2 Why encrypt?
    16. 4.4 Basic Crypto Systems: Caesar Cipher

    17. Video 4.4.1 Caesar Cipher
    18. Check for Understanding 4.4.2 Caesar Cipher
    19. Example 4.4.3 Caesar Cipher
    20. Exercise 4.4.4 Decrypting Caesar
    21. 4.5 Basic Crypto Systems: Cracking Caesar

    22. Video 4.5.1 Cracking Caesar Cipher
    23. Check for Understanding 4.5.2 Cracking Caesar Cipher
    24. Example 4.5.3 Cracking Caesar with Brute Force
    25. Example 4.5.4 Letter Frequency and Caesar
    26. Free Response 4.5.5 Examining Caesar Cipher
    27. 4.6 Basic Crypto Systems: Vigenere Cipher

    28. Video 4.6.1 Vigenere Cipher
    29. Check for Understanding 4.6.2 Vigenere Cipher
    30. Example 4.6.3 Vigenere Cipher Example
    31. Example 4.6.4 Letter Frequency and Vigenere Cipher
    32. Free Response 4.6.5 Examining Vigenere Cipher
    33. 4.7 Advanced Cryptography

    34. Video 4.7.1 Advanced Cryptography
    35. Check for Understanding 4.7.2 Advanced Cryptography
    36. Connection 4.7.3 Public Key Cryptography for Non-Geeks
    37. Free Response 4.7.4 Examining Public Key Cryptography
    38. Connection 4.7.5 Public Key Cryptography
    39. Free Response 4.7.6 Public Key Cryptography
    40. 4.8 Hash Functions

    41. Video 4.8.1 Hash Functions
    42. Check for Understanding 4.8.2 Hash Functions
    43. Connection 4.8.3 Google Shattered Crypto Algorithm
    44. Free Response 4.8.4 Hash Functions in the News
    45. Connection 4.8.5 Using a Hash Generator
    46. Free Response 4.8.6 Hash Generator
    47. 4.9 Hash Function Development

    48. Video 4.9.1 Hash Function Development
    49. Check for Understanding 4.9.2 Hash Function Development
    50. Exercise 4.9.3 Develop a Simple Hash Function
    51. 4.10 Project: Classic Cipher Newscast

    52. Notes 4.10.1 Overview
    53. Free Response 4.10.2 Preview Sample Newscasts
    54. Notes 4.10.3 Investigate a Classic Cipher
    55. Free Response 4.10.4 Write the Script and Rehearse
    56. Free Response 4.10.5 Newscast Presentation
    57. 4.11 The ABCs of Cryptography Quiz

    58. Quiz 4.11.1 The ABCs of Cryptography Quiz
    59. Badge 4.11.2 ABCs of Cryptography Badge
  5. Final Project: PSA

    1. 5.1 Project: PSA

    2. Free Response 5.1.1 Pick a Topic
    3. Free Response 5.1.2 Research
    4. Free Response 5.1.3 Choose Your Audience
    5. Free Response 5.1.4 What kind of PSA?
    6. Free Response 5.1.5 Draft your PSA
    7. Free Response 5.1.6 Make your PSA!
  6. Software Security

    1. 6.1 Inside Web Apps

    2. Notes 6.1.1 Getting Started
    3. Video 6.1.2 Inside Web Apps
    4. Check for Understanding 6.1.3 Inside Web Apps
    5. Free Response 6.1.4 Using View Page Source
    6. Connection 6.1.5 Getting Started with OWASP
    7. Free Response 6.1.6 Getting Started with OWASP
    8. 6.2 Developer Tools

    9. Video 6.2.1 Developer Tools
    10. Check for Understanding 6.2.2 Developer Tools
    11. Free Response 6.2.3 Using the Developer Tools
    12. Connection 6.2.4 The Top Cybersecurity Blogs and Websites
    13. Free Response 6.2.5 Selecting a Site to Follow
    14. 6.3 Databases

    15. Video 6.3.1 Databases
    16. Check for Understanding 6.3.2 Databases
    17. Connection 6.3.3 Database Administrator Career
    18. Free Response 6.3.4 Database Administrator Career
    19. Video 6.3.5 Parts of a Database
    20. Check for Understanding 6.3.6 Parts of a Database
    21. Connection 6.3.7 SQL Database Diagram
    22. Free Response 6.3.8 SQL Database Diagram
    23. 6.4 Clients and Servers

    24. Video 6.4.1 Clients and Servers
    25. Check for Understanding 6.4.2 Clients and Servers
    26. Connection 6.4.3 Inside a Google Data Center
    27. Free Response 6.4.4 Inside a Google Data Center
    28. Connection 6.4.5 Cloud Vulnerabilities
    29. Free Response 6.4.6 Cloud Vulnerabilities Response
    30. Video 6.4.7 Client-Server Model
    31. Check for Understanding 6.4.8 Client-Server Model
    32. Connection 6.4.9 The Future of User Privacy
    33. Free Response 6.4.10 The Future of User Privacy
    34. 6.5 What is SQL?

    35. Notes 6.5.1 What is SQL Overview
    36. Video 6.5.2 Intro to SQL
    37. Check for Understanding 6.5.3 Quiz: What is SQL?
    38. 6.6 Structuring Data in SQL

    39. Video 6.6.1 How to Structure Data in SQL
    40. Check for Understanding 6.6.2 How to Structure Data in SQL
    41. 6.7 Basic Querying in SQL

    42. Video 6.7.1 The SELECT Statement
    43. Check for Understanding 6.7.2 Basic Querying in SQL
    44. Example 6.7.3 Our First SELECT Statement
    45. Exercise 6.7.4 Your First SELECT Statement
    46. Video 6.7.5 More SELECT Statement
    47. Check for Understanding 6.7.6 More SELECT Statement
    48. Example 6.7.7 Selecting Specific Columns
    49. Exercise 6.7.8 Harry Potter Names
    50. 6.8 Filtering Queries in SQL

    51. Video 6.8.1 The WHERE Clause
    52. Check for Understanding 6.8.2 Condition Operators
    53. Example 6.8.3 Ravenclaw House
    54. Example 6.8.4 People in Gryffindor
    55. Example 6.8.5 Filter By ID
    56. Exercise 6.8.6 The Weasleys
    57. Exercise 6.8.7 The Potters
    58. 6.9 Common Security Problems

    59. Video 6.9.1 Common Security Problems
    60. Check for Understanding 6.9.2 Common Security Problems
    61. Connection 6.9.3 Meet Security Engineers at Google
    62. Free Response 6.9.4 Security Engineering Reflection
    63. Video 6.9.5 Living in a Digital World
    64. Free Response 6.9.6 Living in a Digital World
    65. 6.10 SQL Injection Overview

    66. Video 6.10.1 SQL Injection Overview
    67. Check for Understanding 6.10.2 SQL Injection Overview
    68. Connection 6.10.3 Equifax Security Breach
    69. Connection 6.10.4 Equifax Exposed Millions
    70. Free Response 6.10.5 Equifax SQL Injection Attack
    71. 6.11 Types of SQLi and Prevention

    72. Video 6.11.1 Types of SQLi
    73. Check for Understanding 6.11.2 Types of SQLi
    74. Video 6.11.3 Preventing SQLi
    75. Check for Understanding 6.11.4 Preventing SQLi
    76. Connection 6.11.5 Mitigating SQL Injection
    77. Free Response 6.11.6 Reflection: Mitigating SQL Injection
    78. 6.12 Cross-site Scripting

    79. Video 6.12.1 Cross-site Scripting
    80. Check for Understanding 6.12.2 Cross-site Scripting
    81. Connection 6.12.3 XSS Bug in Yahoo Mail
    82. Free Response 6.12.4 XSS Bug in Yahoo Mail
    83. Notes 6.12.5 XSS Demo Overview
    84. Connection 6.12.6 Google Application Security: XSS
    85. Connection 6.12.7 Google's Tutorial for XSS
    86. Free Response 6.12.8 XSS Reflection
    87. 6.13 Software Security Quiz

    88. Quiz 6.13.1 Software Security Quiz
    89. Badge 6.13.2 Software Security Badge
  7. Networking Fundamentals

    1. 7.1 Introduction to the Internet

    2. Notes 7.1.1 Getting Started
    3. Video 7.1.2 Welcome to the Internet
    4. Check for Understanding 7.1.3 Intro to the Internet
    5. Connection 7.1.4 Inside Facebook's Connectivity Lab
    6. Free Response 7.1.5 Connectivity Lab Reflection
    7. 7.2 Internet Hardware and Sending Information

    8. Video 7.2.1 Internet Hardware
    9. Check for Understanding 7.2.2 Internet Hardware
    10. Video 7.2.3 Sending Information
    11. Check for Understanding 7.2.4 Sending Information
    12. Connection 7.2.5 The Internet is in the Ocean
    13. Free Response 7.2.6 Internet in the Ocean Reflection
    14. 7.3 Internet Addresses

    15. Video 7.3.1 Internet Addresses
    16. Check for Understanding 7.3.2 Internet Addresses
    17. Free Response 7.3.3 The Need for Addresses
    18. Connection 7.3.4 IPv4 vs. IPv6
    19. Connection 7.3.5 The Long Transition to IPv6
    20. Free Response 7.3.6 Reflection: IPv4 vs IPv6
    21. 7.4 Domain Name System (DNS)

    22. Video 7.4.1 Domain Name System (DNS)
    23. Check for Understanding 7.4.2 Domain Name System
    24. Connection 7.4.3 How Does DNS Work?
    25. Free Response 7.4.4 How Does DNS Work?
    26. 7.5 Routing

    27. Video 7.5.1 Routing
    28. Check for Understanding 7.5.2 Routing
    29. Traceroute 7.5.3 Route Tracing
    30. Free Response 7.5.4 Redundancy
    31. 7.6 Packets & Protocols

    32. Video 7.6.1 Packets
    33. Check for Understanding 7.6.2 Packets
    34. Video 7.6.3 Protocols
    35. Check for Understanding 7.6.4 Protocols
    36. Resource 7.6.5 Passing Notes
    37. Connection 7.6.6 How the Internet Works
    38. Free Response 7.6.7 How the Internet Works Reflection
    39. 7.7 Viewing a Webpage

    40. Video 7.7.1 Viewing a Webpage
    41. Check for Understanding 7.7.2 Viewing a Webpage
    42. Free Response 7.7.3 Explaining a URL
    43. Connection 7.7.4 Net Neutrality Explained
    44. Connection 7.7.5 FCCs Net Neutrality Rules Officially Repealed
    45. Free Response 7.7.6 Take a Side on Net Neutrality
    46. Connection 7.7.7 Net Neutrality and Cybersecurity
    47. Free Response 7.7.8 Net Neutrality and Cybersecurity Research
    48. 7.8 Impact of the Internet

    49. Video 7.8.1 Impact of the Internet
    50. Check for Understanding 7.8.2 Impact of the Internet
    51. Free Response 7.8.3 The Internet and You
    52. Connection 7.8.4 Crucial Steps Needed to Close the U.S. Digital Div
    53. Free Response 7.8.5 Closing the Digital Divide
    54. 7.9 Network Attacks

    55. Video 7.9.1 Network Attacks Overview
    56. Free Response 7.9.2 Network Attacks
    57. Video 7.9.3 Common Network Attacks
    58. Check for Understanding 7.9.4 Network Attacks
    59. Connection 7.9.5 Social Engineering Hack
    60. Free Response 7.9.6 Social Engineering Reflection
    61. Connection 7.9.7 DDoS Attacks
    62. Free Response 7.9.8 DDoS Reflection
    63. Video 7.9.9 SUPPLEMENTARY: Other Network Attacks
    64. 7.10 Securing a Network

    65. Video 7.10.1 Access Control
    66. Check for Understanding 7.10.2 Access Control
    67. Connection 7.10.3 RADIUS Overview with AAA Protocol
    68. Connection 7.10.4 RADIUS Server Access Control
    69. Free Response 7.10.5 RADIUS Reflection
    70. Video 7.10.6 Detecting Intrusions to Secure a Network
    71. Quiz 7.10.7 Securing a Network
    72. Connection 7.10.8 How to Secure your IT Network
    73. Free Response 7.10.9 Secure your IT Network Basics
    74. Connection 7.10.10 Network Administrator Career
    75. Free Response 7.10.11 Network Administrator Career
    76. 7.11 Project: Secure the Company's Network

    77. Connection 7.11.1 Secure the Company's Network
    78. Free Response 7.11.2 Establish Firewall Rules
    79. Resource 7.11.3 Establish Firewall Rules Handout
    80. Free Response 7.11.4 Reading Logs
    81. Resource 7.11.5 Reading Logs Handout
    82. Example 7.11.6 SSH Logs
    83. Free Response 7.11.7 Project Reflection
    84. 7.12 Networking Fundamentals Quiz

    85. Quiz 7.12.1 Networking Fundamentals Quiz
    86. Badge 7.12.2 Networking Fundamentals Badge
  8. Final Course Project

    1. 8.1 Final Course Project

    2. Notes 8.1.1 Choose Your Own Adventure
    3. Free Response 8.1.2 Choose Your Adventure
    4. Free Response 8.1.3 Research
    5. Free Response 8.1.4 Choose Your Target Audience
    6. Free Response 8.1.5 Draft Your Presentation
    7. Free Response 8.1.6 Draft Your Flyer
    8. Free Response 8.1.7 Make Your Presentation with Handout!
  9. Cryptocurrency

    1. 9.1 What is Currency?

    2. Video 9.1.1 What is Currency?
    3. Check for Understanding 9.1.2 What is Currency?
    4. Connection 9.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 9.1.4 What Gives Money Its Value
    6. Resource 9.1.5 Money: What is it Good For?
    7. 9.2 What is Cryptocurrency?

    8. Video 9.2.1 Cryptocurrency Basics
    9. Check for Understanding 9.2.2 Cryptocurrency Basics
    10. Video 9.2.3 Cryptocurrency Module Overview
    11. Connection 9.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 9.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 9.2.6 Show Me the Money
    14. Free Response 9.2.7 American Currency Exhibit
    15. 9.3 Intro to Blockchain

    16. Video 9.3.1 Intro to Blockchain
    17. Check for Understanding 9.3.2 Intro to Blockchain
    18. Connection 9.3.3 CryptoKitties
    19. Free Response 9.3.4 CryptoKitties
    20. 9.4 Hashing

    21. Video 9.4.1 Hashing
    22. Check for Understanding 9.4.2 Hashing
    23. Connection 9.4.3 SHA256 Hash Generator
    24. Free Response 9.4.4 Using the SHA256 Hash Generator
    25. 9.5 Proof of Work

    26. Video 9.5.1 Proof of Work
    27. Check for Understanding 9.5.2 Proof of Work
    28. Video 9.5.3 Mining the Block
    29. Check for Understanding 9.5.4 Mining the Block
    30. Connection 9.5.5 PoW vs. Proof of Stake
    31. Free Response 9.5.6 PoW vs. PoS
    32. Resource 9.5.7 Checking Proof of Work
    33. 9.6 Advanced Blockchain

    34. Video 9.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 9.6.2 Advanced Blockchain (part 1)
    36. Connection 9.6.3 Blockchain Buzz
    37. Free Response 9.6.4 Blockchain Buzz
    38. Video 9.6.5 Advanced Blockchain (part 2)
    39. Free Response 9.6.6 Advanced Blockchain (part 2)
    40. Resource 9.6.7 Make a Blockchain
    41. Connection 9.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 9.7 Cryptocurrencies

    43. Video 9.7.1 Cryptocurrencies
    44. Check for Understanding 9.7.2 Cryptocurrencies
    45. Free Response 9.7.3 Shiny Toy Phenomenon
    46. Connection 9.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 9.7.5 Walmart Use of Blockchain
    48. 9.8 Bitcoin

    49. Video 9.8.1 Bitcoin
    50. Check for Understanding 9.8.2 Bitcoin
    51. Connection 9.8.3 51% Attack Explained
    52. Free Response 9.8.4 51% Attack
    53. Connection 9.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 9.8.6 Bitcoin Bust
    55. Resource 9.8.7 Explore the Bitcoin Blockchain
    56. 9.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 9.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 9.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 9.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 9.9.4 Cryptocurrency Pros and Cons
    61. Free Response 9.9.5 Crypto Pros and Cons
    62. Connection 9.9.6 What is HODL?
    63. Free Response 9.9.7 What is HODL?
    64. Free Response 9.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 9.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 9.10.1 Overview
    67. Free Response 9.10.2 Preview Sample Expert Panels
    68. Free Response 9.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 9.10.4 Write an Outline and Rehearse
    70. Free Response 9.10.5 Expert Panel Talk (Presentation)
    71. 9.11 Cryptocurrency Quiz

    72. Unit Quiz 9.11.1 Cryptocurrency Quiz
    73. Badge 9.11.2 Cryptocurrency Badge
  10. Project: Security Assessment Report

    1. 10.1 Project: Security Assessment Report

    2. Free Response 10.1.1 Security Assessment Report
    3. Connection 10.1.2 Supercar Showdown Website
    4. Free Response 10.1.3 SQL Injection Testing
    5. Resource 10.1.4 SQLi Testing Handout
    6. Free Response 10.1.5 Cross-site Scripting Testing
    7. Resource 10.1.6 Cross-site Scripting Handout
    8. Free Response 10.1.7 Project Reflection