Please enable JavaScript to use CodeHS

Advanced Cybersecurity

Description

This lesson introduces students to the Advanced Cybersecurity course, with the goal of getting students invested in and excited about the content. Students will explore the wide variety of pathways in the cybersecurity field and will learn about the role cryptography plays in keeping networks and data secure.

Objective

Students will be able to:

  • Explain the importance of cybersecurity in the current landscape
  • Explore the multitude of cybersecurity careers and pathways, their requirements, and job projections
  • Set goals for the course
Description

In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers impacts the decryption process. Students will also learn about the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard).

Objective

Students will be able to:

  • Explain the characteristics of symmetric algorithms and use them to encode and decode text. Specific ciphers include block, substitution, and transposition ciphers.
  • Compare and contrast the strengths and weaknesses of symmetric ciphers.
  • Compare and contrast the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard).
Description

In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.

Objective

Students will be able to:

  • Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics

  • Explain the difference between symmetric and asymmetric encryption

Description

In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.

Objective

Students will be able to:

  • Identify what a hashing algorithm is and its related vocabulary, such as digest and collisions
  • Describe what makes an ideal hashing algorithm and why they are important in encryption and cybersecurity overall
  • Describe how malicious actors try to crack hashing algorithms
Description

In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.

Objective

Students will be able to:

  • Solve simple modulo problems
  • Explain why modulo math is useful in hashing algorithms and protecting data in cybersecurity
Description

In this lesson, students learn how asymmetric encryption uses public and private keys to encrypt data and they learn how the RSA algorithm addresses the security issue of key authentication. Students also explore different examples of asymmetric encryption algorithms and evaluate them to determine what aspects make an algorithm strong.

Objective

Students will be able to:

  • Explain how asymmetric encryption uses a public and private key to encrypt data
  • Explain how the RSA algorithm addresses security vulnerabilities
  • Evaluate asymmetric encryption algorithms to determine what characteristics make an algorithm strong
Description

In this lesson, students will learn about SSL certificates: what they are, where they come from, how they work, and why they are essential to internet security.

Objective

Students will be able to:

  • Explain the role of SSL certificates in internet security
  • Explain how certificates work, including how to obtain one, their relationship with public and private keys, and how the chain of trust is used to create trust additional checks of authenticity
  • Explain how stapling and pinning strengthen the security of a certificate
Description

In this lesson, students review content with a 15 question Unit Quiz.

Objective

Students will be able to:

  • Demonstrate their understanding of advanced cryptography topics