Please enable JavaScript to use CodeHS

Fundamentals of Cybersecurity (2020)

Description

In this lesson, students will look under the hood of web sites and web applications by using “view page source” in a browser. This will enable them to see HTML markup for images, navigation, and page layouts, CSS styling, and even JavaScript source code or links to JS files. Students will also view code that has been minified and understand what that means. Lastly, students will also take a first look at OWASP (Open Web Application Security Project) which is an important organization in cybersecurity.

Objective

Students will be able to:

  • Identify major sections of code within the view source of a web page/app
  • Understand the importance of OWASP and how it relates to the field of cybersecurity
Description

In this lesson, students will learn about and use the developer tools in a browser. Web developers actually use these to help build and test websites. Cyber professionals need to be very familiar with the different ways of looking at how sites and apps function so they can use various tools to detect vulnerabilities or even detect attacks as they are starting.

Objective

Students will be able to:

  • Identify major developer tools within the inspect element
  • Explain the major difference between view page source and what is rendered in the inspect tools
  • Explain in general terms what each major tool in the inspect area can show a developer
  • Explain how the developer tools can help web developers build and maintain sites, and how understanding the tools can potentially help cyber professionals who are trying to keep sites and data secure
Description

In this lesson, students will learn about the impact of visually representing data to make information easier to analyze and use.

Objective

Students will be able to:

  • Explain the importance of visually depicting data to make information easier to use and to understand trends and changes in information
Description

In this lesson, students will take a look at what databases are, how they are organized and used, the major parts of a database, and what a database schema is and generally looks like.

Objective

Students will be able to:

  • Explain the primary purposes of a database
  • Identify and explain the major parts of a database
  • Understand the implications of database storage on the protection of data within the field of cybersecurity
Description

In this lesson, students take a look at what client and server devices and applications are, the client-server model, and how databases are part of that client-server model. They will get a high-level view of how clients and servers work together to help exchange information and data over a network or the Internet.

Objective

Students will be able to:

  • Identify a client device and explain its purpose
  • Identify a server device and explain its purpose
  • Explain the client-server model
Description

In this lesson, students will be introduced to SQL (structured query language). Students will also learn how a database is structured into tables and rows.

Objective

Students will be able to:

  • Explain what the SQL programming language does
  • Define the different parts of a database (table, column, row)
  • Define what a schema is in relation to a database
Description

In this lesson, we learn about and use the SELECT statement in SQL. The SELECT statement is used to query the database and return a row or multiple rows from a table in the database.

Objective

Students will be able to:

  • Use a SELECT statement in SQL to query a database using * or the FROM statement
Description

In this lesson, students learn about the WHERE clause and basic filtering of queries in SQL.

Objective

Students will be able to:

  • Use a WHERE clause in a statement in SQL to filter queries
Description

In this lesson, students learn the overall concept of security: what it means to them personally and what it means to organizations in a digital world. They will reflect on what makes them feel secure.

Objective

Students will be able to:

  • Explain what security means on a personal and organizational level
Description

This lesson provides an overview of what SQL injection is, the impact, how it works, and how hackers use SQL to attack a site. The lesson also has connections on the Equifax cyber attack that was a very large scale SQL injection.

Objective

Students will be able to:

  • Understand and explain what a SQL injection attack is and the ongoing, pervasive impact of SQLi cyber attacks
Description

In this lesson, students will learn and discuss types of SQLi and ways to prevent or at least mitigate an attack.

Objective

Students will be able to:

  • Explain the 3 types of SQLi and the vulnerability associated with each
  • Understand the fundamentals of how SQL injections are prevented or at least mitigated