Please enable JavaScript to use CodeHS

Advanced Cybersecurity - Outline

  1. Advanced Cryptography

    1. 1.1 Welcome to Advanced Cybersecurity!

    2. Notes 1.1.1 Course Introduction
    3. Connection 1.1.2 Cybersecurity 101
    4. Free Response 1.1.3 Cyber Heat Map
    5. Free Response 1.1.4 Career Pathways
    6. Connection 1.1.5 Starting with Cryptography
    7. Free Response 1.1.6 Course Goals
    8. 1.2 Encryption Algorithms

    9. Video 1.2.1 Ciphers
    10. Check for Understanding 1.2.2 Ciphers Quiz
    11. Free Response 1.2.3 Enhanced Caesar Cipher
    12. Free Response 1.2.4 Mixed Alphabet Cipher
    13. Example 1.2.5 Pigpen Encoder
    14. Free Response 1.2.6 Pigpen Cipher
    15. Free Response 1.2.7 Rail Fence Cipher
    16. Video 1.2.8 Encryption Standards
    17. Check for Understanding 1.2.9 Encryption Standards Quiz
    18. 1.3 Advanced Cryptography

    19. Video 1.3.1 Advanced Cryptography
    20. Check for Understanding 1.3.2 Advanced Cryptography
    21. Connection 1.3.3 Public Key Cryptography for Non-Geeks
    22. Free Response 1.3.4 Examining Public Key Cryptography
    23. Connection 1.3.5 Public Key Cryptography
    24. Free Response 1.3.6 Public Key Cryptography
    25. 1.4 Hash Functions

    26. Video 1.4.1 Hash Functions
    27. Check for Understanding 1.4.2 Hash Functions
    28. Connection 1.4.3 Google Shattered Crypto Algorithm
    29. Free Response 1.4.4 Hash Functions in the News
    30. Connection 1.4.5 Using a Hash Generator
    31. Free Response 1.4.6 Hash Generator
    32. Connection 1.4.7 Password Salting
    33. Free Response 1.4.8 Password Salting
    34. 1.5 Hash Function Development

    35. Video 1.5.1 Hash Function Development
    36. Check for Understanding 1.5.2 Hash Function Development
    37. Example 1.5.3 Modulo Math Calculator
    38. Example 1.5.4 Understanding Modulo Math
    39. Example 1.5.5 Modulo Game!
    40. Exercise 1.5.6 Develop a Simple Hash Function
    41. 1.6 Asymmetric Encryption

    42. Video 1.6.1 Asymmetric Encryption
    43. Check for Understanding 1.6.2 Asymmetric Encryption Quiz
    44. Example 1.6.3 Diffie-Hellman Key Exchange
    45. Free Response 1.6.4 Affine Cipher
    46. Free Response 1.6.5 Trapdoor Functions
    47. Notes 1.6.6 RSA
    48. Free Response 1.6.7 RSA Reflection
    49. 1.7 Digital Certificates

    50. Video 1.7.1 Digital Certificates
    51. Check for Understanding 1.7.2 Digital Certificates
    52. Connection 1.7.3 SSL Explained
    53. Free Response 1.7.4 SSL Explained
    54. Free Response 1.7.5 SSL Connection
    55. Connection 1.7.6 In The News
    56. Free Response 1.7.7 In The News Response
    57. Free Response 1.7.8 Become a Certificate Authority!
    58. 1.8 Advanced Cryptography Quiz

    59. Unit Quiz 1.8.1 Advanced Cryptography Quiz
  2. Project: Steganography

    1. 2.1 Project: Steganography

    2. Video 2.1.1 Project Opener
    3. Connection 2.1.2 Government Surveillance and Reality Winner
    4. Free Response 2.1.3 Government Surveillance and Reality Winner
    5. Connection 2.1.4 Data Hiding and Extraction
    6. Free Response 2.1.5 Reflect: Data Hiding and Extraction
    7. Example 2.1.6 Hide Text
    8. Example 2.1.7 Hidden Message
    9. Free Response 2.1.8 Your turn: Encryption Algorithm
    10. Challenge 2.1.9 Your turn: Image Creation
    11. Free Response 2.1.10 Final Algorithm and Partner Decode
    12. Free Response 2.1.11 Final Reflection
  3. Advanced Networking

    1. 3.1 Advanced Devices

    2. Video 3.1.1 Advanced Devices
    3. Check for Understanding 3.1.2 Advanced Devices Quiz
    4. Connection 3.1.3 Network Administrator Career
    5. Free Response 3.1.4 Network Administrator Career
    6. Free Response 3.1.5 Choosing the Best Devices
    7. Free Response 3.1.6 Network Diagram
    8. 3.2 Environmental Controls

    9. Video 3.2.1 Environmental Controls
    10. Check for Understanding 3.2.2 Environmental Controls Quiz
    11. Connection 3.2.3 Infographic
    12. Free Response 3.2.4 Infographic FR
    13. Free Response 3.2.5 Your Security Systems
    14. Free Response 3.2.6 Security Design
    15. 3.3 Protocols and Standards

    16. Video 3.3.1 Protocols
    17. Check for Understanding 3.3.2 Protocols Quiz
    18. Video 3.3.3 Standards
    19. Check for Understanding 3.3.4 Standards Quiz
    20. Connection 3.3.5 The New Wireless Standard
    21. Connection 3.3.6 801.11ax
    22. Free Response 3.3.7 801.11ax FR
    23. 3.4 Private Networks

    24. Video 3.4.1 IP and MAC Addresses
    25. Check for Understanding 3.4.2 IP and MAC Addresses Quiz
    26. Example 3.4.3 Intranet Permissions
    27. Free Response 3.4.4 Coffee Shop: Design an Intranet
    28. Video 3.4.5 DMZs and VPNs
    29. Check for Understanding 3.4.6 DMZs and VPNs Quiz
    30. Connection 3.4.7 Protecting Privacy with VPNs
    31. Free Response 3.4.8 Protecting Privacy with VPNs
    32. Free Response 3.4.9 Coffee Shop: Network Plan
    33. Free Response 3.4.10 Coffee Shop: Network Diagram
    34. Video 3.4.11 SOHO Network
    35. Example 3.4.12 Network Topologies
    36. 3.5 Mobile Devices

    37. Video 3.5.1 Mobile Devices
    38. Check for Understanding 3.5.2 Mobile Devices Quiz
    39. Connection 3.5.3 How Apple FaceID Works
    40. Free Response 3.5.4 How Apple FaceID Works Response
    41. Free Response 3.5.5 Biometric Data Debate
    42. Connection 3.5.6 BYOD and MDM Concept Map
    43. Free Response 3.5.7 BYOD and MDM Conclusions
    44. 3.6 Access Control

    45. Video 3.6.1 Access Control
    46. Check for Understanding 3.6.2 Access Control
    47. Example 3.6.3 Multifactor Authentication
    48. Example 3.6.4 Two Factor Authentication
    49. Free Response 3.6.5 Two Factor Authentication Reflection
    50. Connection 3.6.6 RADIUS Overview with AAA Protocol
    51. Connection 3.6.7 RADIUS Server Access Control
    52. Free Response 3.6.8 RADIUS Reflection
    53. 3.7 Advanced Networking Quiz

    54. Unit Quiz 3.7.1 Advanced Networking Quiz
  4. Project: IT Professional

    1. 4.1 Communication is Key!

    2. Notes 4.1.1 Do you have what it takes?
    3. Free Response 4.1.2 Cybersecurity Careers
    4. Connection 4.1.3 Customer Service Skills
    5. Free Response 4.1.4 Customer Service Skills
    6. Free Response 4.1.5 Act it Out!
    7. 4.2 Building a Knowledge Base

    8. Connection 4.2.1 What is a Knowledge Base?
    9. Free Response 4.2.2 Draft a KB Article
    10. Free Response 4.2.3 Share your KB Article
    11. Free Response 4.2.4 Finalize your KB Article
    12. 4.3 Star in a Video!

    13. Connection 4.3.1 Instructional Videos
    14. Free Response 4.3.2 Instructional Video Plan
    15. Free Response 4.3.3 Write the Script
    16. Free Response 4.3.4 Create the Storyboard
    17. Free Response 4.3.5 Record Your Video
  5. Cyber Defense

    1. 5.1 Network Attacks

    2. Video 5.1.1 Network Attacks Overview
    3. Check for Understanding 5.1.2 Network Attacks Quiz
    4. Notes 5.1.3 Check for Vulnerabilities
    5. Connection 5.1.4 Bug Bounty Hunting
    6. Free Response 5.1.5 Bug Bounty Hunting
    7. Connection 5.1.6 Common Port Targets
    8. Example 5.1.7 Port Scanner Simulation
    9. Free Response 5.1.8 Open Port Reflection
    10. 5.2 Malware Types and Prevention

    11. Video 5.2.1 Malware Types and Prevention
    12. Check for Understanding 5.2.2 Malware Types and Prevention
    13. Connection 5.2.3 How Anti-malware Works
    14. Free Response 5.2.4 How Anti-malware Works
    15. Free Response 5.2.5 OS Malware Security
    16. Free Response 5.2.6 Reverse Engineering Malware
    17. 5.3 Common Network Attacks

    18. Video 5.3.1 Common Network Attacks
    19. Check for Understanding 5.3.2 Network Attacks
    20. Connection 5.3.3 Social Engineering Hack
    21. Free Response 5.3.4 Social Engineering Reflection
    22. Connection 5.3.5 DDoS Attacks
    23. Example 5.3.6 DDoS Simulation
    24. Free Response 5.3.7 DDoS Reflection
    25. 5.4 Additional Attacks

    26. Video 5.4.1 Additional Attacks
    27. Check for Understanding 5.4.2 Additional Attacks Quiz
    28. Connection 5.4.3 Botnet Attacks - Mirai
    29. Connection 5.4.4 Botnet Attacks - 3ve
    30. Connection 5.4.5 Botnet Attacks - 3ve Video
    31. Free Response 5.4.6 Botnet Attacks - Reflection
    32. Connection 5.4.7 Zero-day Exploit: Stuxnet
    33. Notes 5.4.8 Zero-day Exploit: Stuxnet
    34. Free Response 5.4.9 Zero-day Exploit Reflection
    35. Free Response 5.4.10 US-CERT Current Activity
    36. 5.5 Cross-site Scripting

    37. Video 5.5.1 Cross-site Scripting
    38. Check for Understanding 5.5.2 Cross-site Scripting
    39. Connection 5.5.3 XSS Bug in Yahoo Mail
    40. Free Response 5.5.4 XSS Bug in Yahoo Mail
    41. Notes 5.5.5 XSS Demo Overview
    42. Connection 5.5.6 Google Application Security: XSS
    43. Connection 5.5.7 Google's Tutorial for XSS
    44. Free Response 5.5.8 XSS Reflection
    45. 5.6 Internal Threats

    46. Video 5.6.1 Internal Threats
    47. Check for Understanding 5.6.2 Internal Threats
    48. Connection 5.6.3 BIOS/UEFI Attack Example
    49. Notes 5.6.4 Accessing BIOS/UEFI
    50. Connection 5.6.5 Causes of Data Breaches
    51. Free Response 5.6.6 Causes of Data Breaches
    52. Connection 5.6.7 Protecting Data at All Times
    53. Free Response 5.6.8 Protecting Data at All Times
    54. 5.7 Cyber Defense Quiz

    55. Unit Quiz 5.7.1 Cyber Defense Quiz
  6. Project: Security Assessment Report

    1. 6.1 Project Security Assessment Report

    2. Notes 6.1.1 Project Requirements
    3. Connection 6.1.2 Supercar Showdown Website
    4. Free Response 6.1.3 Cross-site Scripting Testing
    5. Resource 6.1.4 Cross-site Scripting Handout
    6. Free Response 6.1.5 Security Assessment Report
    7. Free Response 6.1.6 Project Reflection
  7. Project: Put it in Writing!

    1. 7.1 Level 1: Entry Event

    2. Free Response 7.1.1 Company Development
    3. Free Response 7.1.2 Level 1: Attack!
    4. Video 7.1.3 Level 1: Project Overview
    5. Connection 7.1.4 Put It In Writing! Rubric
    6. 7.2 Level 2: User Training

    7. Free Response 7.2.1 User Training Policy Development
    8. Free Response 7.2.2 Challenge: Employee Negligence 1
    9. Free Response 7.2.3 Challenge: Employee Negligence 2
    10. Free Response 7.2.4 Level 2 Debrief
    11. 7.3 Level 3: Incident Response

    12. Connection 7.3.1 Incident Response Plan Template
    13. Free Response 7.3.2 Incident Response Plan Link
    14. Free Response 7.3.3 Challenge: Cyber Attack!
    15. Free Response 7.3.4 Level 3 Debrief
    16. 7.4 Level 4: Data and Licenses

    17. Video 7.4.1 Data and Licenses
    18. Connection 7.4.2 FTC Data Security Guide
    19. Connection 7.4.3 Data Policy Template
    20. Free Response 7.4.4 Data Policy Link
    21. Free Response 7.4.5 Challenge: Data Breach 1
    22. Free Response 7.4.6 Challenge: Data Breach 2
    23. Free Response 7.4.7 Challenge: Data Breach 3
    24. Free Response 7.4.8 Level 4 Debrief
    25. 7.5 Level 5: Change Management

    26. Video 7.5.1 Change Management
    27. Connection 7.5.2 Change Management Plan
    28. Free Response 7.5.3 Change Management Plan Link
  8. Risk Management

    1. 8.1 Identifying Risks

    2. Video 8.1.1 Identifying Risks
    3. Check for Understanding 8.1.2 Identifying Risks Quiz
    4. Connection 8.1.3 What is a Honeypot?
    5. Connection 8.1.4 Honeypot Attacks
    6. Free Response 8.1.5 Honeypot Attacks
    7. Connection 8.1.6 Whois
    8. Free Response 8.1.7 Whois Response
    9. Connection 8.1.8 Packet Sniffing
    10. Free Response 8.1.9 Packet Sniffing Response
    11. Free Response 8.1.10 Breach Trends
    12. 8.2 Assessing Risks

    13. Notes 8.2.1 Assessing Risks
    14. Free Response 8.2.2 Malware Risk Assessment
    15. Free Response 8.2.3 Poor Password Assessment
    16. Free Response 8.2.4 Social Engineering Assessment
    17. Video 8.2.5 Assessing Risks
    18. Check for Understanding 8.2.6 Assessing Risks Quiz
    19. Connection 8.2.7 End-of-Life OS
    20. Free Response 8.2.8 End-of-Life Proposal
    21. Example 8.2.9 Input Handling
    22. Free Response 8.2.10 Input Handling Responses
    23. Example 8.2.11 Input Validation
    24. Free Response 8.2.12 Input Validation Responses
    25. 8.3 Risk Response

    26. Video 8.3.1 Risk Response
    27. Check for Understanding 8.3.2 Risk Response
    28. Free Response 8.3.3 Defense in Depth Risk Mitigation
    29. Connection 8.3.4 Sample Risk Assessment Report
    30. Free Response 8.3.5 Sample Risk Assessment Reflection
    31. Connection 8.3.6 Delta Outage Video
    32. Free Response 8.3.7 Delta Outage Reflection
    33. Connection 8.3.8 What Happens When Your Servers Go Down
    34. Free Response 8.3.9 What Happens When Your Servers Go Down Reflection
    35. Free Response 8.3.10 Server Upgrade Memo
    36. 8.4 Penetration Testing

    37. Video 8.4.1 Penetration Testing
    38. Check for Understanding 8.4.2 Penetration Testing
    39. Connection 8.4.3 Penetration Test Report
    40. Free Response 8.4.4 Penetration Test Report
    41. Notes 8.4.5 Chaos Engineering
    42. Free Response 8.4.6 Chaos Engineering Reflection
    43. Resource 8.4.7 Pen Test Simulation Handout
    44. Exercise 8.4.8 Pen Test Simulation: Active Recon
    45. Exercise 8.4.9 Pen Test Simulation: Exploit Vulnerabilities
    46. 8.5 Risk Management Quiz

    47. Unit Quiz 8.5.1 Risk Management Quiz
  9. Project: The Game of Risk

    1. 9.1 The Game of Risk

    2. Notes 9.1.1 Group Project Intro
    3. Free Response 9.1.2 Brainstorm: Type of Game
    4. Free Response 9.1.3 Brainstorm: SLE
    5. Free Response 9.1.4 Brainstorm: Materials
    6. Free Response 9.1.5 Prototype Game and Instructions
    7. Free Response 9.1.6 Test Your Game!
    8. Resource 9.1.7 Testing Feedback Form
    9. Free Response 9.1.8 Create Your Final Version!
  10. Midterm

    1. 10.1 Midterm

    2. Midterm 10.1.1 Midterm
  11. Final Exam

    1. 11.1 Final Exam

    2. Final 11.1.1 Final Exam
  12. What's Next?

    1. 12.1 After Advanced Cybersecurity

    2. Notes 12.1.1 Cybersecurity Pathways
    3. Connection 12.1.2 CodeHS Programming Courses
    4. Notes 12.1.3 College Pathway
    5. Connection 12.1.4 Certification Pathway
    6. Connection 12.1.5 Career Spotlight
    7. Free Response 12.1.6 My Pathway
  13. Programming Fundamentals

    1. 13.1 Programming Concepts

    2. Video 13.1.1 Programming Concepts
    3. Check for Understanding 13.1.2 Programming Concepts Quiz
    4. Connection 13.1.3 Compilers vs. Interpreters
    5. Free Response 13.1.4 Compilers vs. Interpreters
    6. Example 13.1.5 Variables in Action
    7. Example 13.1.6 Data Types using Typeof
    8. Example 13.1.7 Basic Variables
    9. Exercise 13.1.8 Daily Activities
    10. 13.2 Arrays and Objects

    11. Video 13.2.1 Arrays and Objects
    12. Check for Understanding 13.2.2 Arrays and Objects
    13. Example 13.2.3 Making an Array
    14. Exercise 13.2.4 List of Places to Travel
    15. Exercise 13.2.5 List of Prime Numbers
    16. Example 13.2.6 Phonebook
    17. Exercise 13.2.7 Sidekicks
    18. 13.3 Programming with Karel

    19. Video 13.3.1 Programming With Karel
    20. Check for Understanding 13.3.2 Quiz: Karel Commands
    21. Example 13.3.3 Our First Karel Program
    22. Exercise 13.3.4 Your First Karel Program
    23. Video 13.3.5 Functions in Karel
    24. Check for Understanding 13.3.6 Functions in Karel Quiz
    25. Example 13.3.7 Turn Around
    26. Example 13.3.8 Digging Karel
    27. Exercise 13.3.9 Backflip
    28. 13.4 Looping

    29. Video 13.4.1 For Loops
    30. Check for Understanding 13.4.2 For Loops Quiz
    31. Example 13.4.3 Take 'em All
    32. Example 13.4.4 For Loop Square
    33. Exercise 13.4.5 Lots of Hurdles
    34. Video 13.4.6 While Loops in Karel
    35. Check for Understanding 13.4.7 While Loops in Karel Quiz
    36. Example 13.4.8 Move to Wall
    37. Example 13.4.9 Big Tower
    38. Exercise 13.4.10 Follow The Yellow Ball Road
    39. 13.5 Branching

    40. Video 13.5.1 If/Else Statements
    41. Check for Understanding 13.5.2 If/Else Statements Quiz
    42. Example 13.5.3 If/Else Statements
    43. Example 13.5.4 One Ball in Each Spot
    44. Exercise 13.5.5 Right Side Up
    45. 13.6 Organizational Techniques

    46. Video 13.6.1 Organizational Techniques
    47. Check for Understanding 13.6.2 Organizational Techniques Quiz
    48. Example 13.6.3 Hurdle Karel
    49. Exercise 13.6.4 One Ball in Each Spot
    50. Exercise 13.6.5 The Two Towers
    51. Example 13.6.6 Interactive Sequence Diagram
    52. 13.7 Programming Fundamentals Quiz

    53. Survey 13.7.1 Mindsets
    54. Unit Quiz 13.7.2 Programming Fundamentals Quiz
  14. System Administration

    1. 14.1 Operating Systems

    2. Video 14.1.1 Operating Systems
    3. Check for Understanding 14.1.2 Operating Systems Quiz
    4. Connection 14.1.3 Understanding Operating Systems
    5. Free Response 14.1.4 Understanding Operating Systems
    6. Example 14.1.5 Detect My OS
    7. Connection 14.1.6 Upgrading a Mac OS
    8. Example 14.1.7 Windows OS Installation Simulation
    9. Free Response 14.1.8 Installing an OS
    10. 14.2 Comparing Operating Systems

    11. Video 14.2.1 Comparing Operating Systems
    12. Check for Understanding 14.2.2 Comparing Operating Systems Quiz
    13. Example 14.2.3 Windows Simulation
    14. Example 14.2.4 MacOS Simulation
    15. Connection 14.2.5 Choose a Linux Distro!
    16. Free Response 14.2.6 Which would you choose?
    17. 14.3 Compatibility

    18. Video 14.3.1 Compatibility
    19. Check for Understanding 14.3.2 Compatibility Quiz
    20. Example 14.3.3 What Processor? Windows
    21. Example 14.3.4 What Processor? Mac
    22. Free Response 14.3.5 What Processor are you running?
    23. 14.4 Software and Applications

    24. Video 14.4.1 Software and Applications
    25. Check for Understanding 14.4.2 Software and Applications Quiz
    26. Example 14.4.3 Spreadsheet Simulation
    27. Example 14.4.4 Messaging Simulation
    28. Example 14.4.5 Kanban Board Simulation
    29. Free Response 14.4.6 Software Simulations
    30. 14.5 Software Licenses

    31. Video 14.5.1 Software Licenses
    32. Check for Understanding 14.5.2 Software Licenses Quiz
    33. Free Response 14.5.3 Do I need a Software License?
    34. Free Response 14.5.4 Is This Original?
    35. 14.6 Application Security

    36. Video 14.6.1 Application Security
    37. Check for Understanding 14.6.2 Application Security
    38. Example 14.6.3 Windows Updates
    39. Connection 14.6.4 Windows Defender Antivirus
    40. Free Response 14.6.5 Windows Defender Antivirus
    41. Free Response 14.6.6 CodeHS System Restore
    42. 14.7 Browser Configuration

    43. Video 14.7.1 Browser Configuration
    44. Check for Understanding 14.7.2 Browser Configuration
    45. Connection 14.7.3 Cached CodeHS
    46. Free Response 14.7.4 Cached CodeHS
    47. Example 14.7.5 Is Your Popup Blocker On?
    48. Free Response 14.7.6 Browser Extensions Lab
    49. 14.8 System Administration

    50. Video 14.8.1 User Accounts
    51. Check for Understanding 14.8.2 User Accounts Quiz
    52. Free Response 14.8.3 User Accounts
    53. Free Response 14.8.4 Shared Folders and Files
    54. Video 14.8.5 Host Security
    55. Check for Understanding 14.8.6 Host Security Quiz
    56. Free Response 14.8.7 Security Baseline
    57. 14.9 Command Line Interface

    58. Video 14.9.1 Command Line Interface
    59. Check for Understanding 14.9.2 Command Line Interface Quiz
    60. Free Response 14.9.3 Directory Directions
    61. Connection 14.9.4 Neural Interface?
    62. Free Response 14.9.5 Neural Interface?
    63. 14.10 System Administration Quiz

    64. Survey 14.10.1 Mindsets
    65. Unit Quiz 14.10.2 System Administration Quiz
  15. IT Infrastructure

    1. 15.1 Internal Components

    2. Video 15.1.1 Internal Components
    3. Check for Understanding 15.1.2 Internal Components
    4. Connection 15.1.3 Build a Computer
    5. Free Response 15.1.4 Build a Computer
    6. Example 15.1.5 Test Your Brain's RAM!
    7. Free Response 15.1.6 Test Your Brain's RAM!
    8. 15.2 Peripheral Devices

    9. Video 15.2.1 Peripheral Devices
    10. Check for Understanding 15.2.2 Peripheral Devices
    11. Free Response 15.2.3 Personalized Peripherals
    12. Free Response 15.2.4 IT Help
    13. Free Response 15.2.5 Your Ideal Computer Setup
    14. 15.3 Network Devices

    15. Video 15.3.1 Network Devices
    16. Check for Understanding 15.3.2 Network Devices
    17. Connection 15.3.3 Speed Test
    18. Free Response 15.3.4 Speed Test
    19. Connection 15.3.5 Fiber Optics Bend Light!
    20. Free Response 15.3.6 Fiber Optics Bend Light!
    21. Connection 15.3.7 Ethernet Standards
    22. Free Response 15.3.8 Ethernet Standards
    23. Free Response 15.3.9 Network Troubleshooting
    24. 15.4 Storage Options

    25. Video 15.4.1 Storage Options
    26. Check for Understanding 15.4.2 Storage Options Quiz
    27. Connection 15.4.3 Security of Cloud Storage
    28. Free Response 15.4.4 Security of Cloud Storage
    29. Free Response 15.4.5 Storage Suggestions
    30. 15.5 Network Options

    31. Video 15.5.1 Network Options
    32. Check for Understanding 15.5.2 Network Options Quiz
    33. Connection 15.5.3 What is an SSID?
    34. Free Response 15.5.4 What is an SSID?
    35. Free Response 15.5.5 Wireless Network Setup
    36. 15.6 Network Communication

    37. Video 15.6.1 Network Communication
    38. Check for Understanding 15.6.2 Network Communication Quiz
    39. Example 15.6.3 Setting up a Firewall
    40. Free Response 15.6.4 Establish Firewall Rules
    41. 15.7 Network Management

    42. Video 15.7.1 Network Management
    43. Check for Understanding 15.7.2 Network Management Quiz
    44. Example 15.7.3 MacOS Terminal Simulation
    45. Notes 15.7.4 SSH Logs
    46. Example 15.7.5 SSH Logs
    47. Free Response 15.7.6 Reading Logs
    48. 15.8 IT Infrastructure Quiz

    49. Unit Quiz 15.8.1 IT Infrastructure Quiz
  16. Cryptocurrency

    1. 16.1 What is Currency?

    2. Video 16.1.1 What is Currency?
    3. Check for Understanding 16.1.2 What is Currency?
    4. Connection 16.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 16.1.4 What Gives Money Its Value
    6. Resource 16.1.5 Money: What is it Good For?
    7. 16.2 What is Cryptocurrency?

    8. Video 16.2.1 Cryptocurrency Basics
    9. Check for Understanding 16.2.2 Cryptocurrency Basics
    10. Video 16.2.3 Cryptocurrency Module Overview
    11. Connection 16.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 16.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 16.2.6 Show Me the Money
    14. Free Response 16.2.7 American Currency Exhibit
    15. 16.3 Intro to Blockchain

    16. Video 16.3.1 Intro to Blockchain
    17. Check for Understanding 16.3.2 Intro to Blockchain
    18. Connection 16.3.3 CryptoKitties
    19. Free Response 16.3.4 CryptoKitties
    20. 16.4 Hashing

    21. Video 16.4.1 Hashing
    22. Check for Understanding 16.4.2 Hashing
    23. Connection 16.4.3 SHA256 Hash Generator
    24. Free Response 16.4.4 Using the SHA256 Hash Generator
    25. 16.5 Proof of Work

    26. Video 16.5.1 Proof of Work
    27. Check for Understanding 16.5.2 Proof of Work
    28. Video 16.5.3 Mining the Block
    29. Check for Understanding 16.5.4 Mining the Block
    30. Connection 16.5.5 PoW vs. Proof of Stake
    31. Free Response 16.5.6 PoW vs. PoS
    32. Resource 16.5.7 Checking Proof of Work
    33. 16.6 Advanced Blockchain

    34. Video 16.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 16.6.2 Advanced Blockchain (part 1)
    36. Connection 16.6.3 Blockchain Buzz
    37. Free Response 16.6.4 Blockchain Buzz
    38. Video 16.6.5 Advanced Blockchain (part 2)
    39. Free Response 16.6.6 Advanced Blockchain (part 2)
    40. Resource 16.6.7 Make a Blockchain
    41. Connection 16.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 16.7 Cryptocurrencies

    43. Video 16.7.1 Cryptocurrencies
    44. Check for Understanding 16.7.2 Cryptocurrencies
    45. Free Response 16.7.3 Shiny Toy Phenomenon
    46. Connection 16.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 16.7.5 Walmart Use of Blockchain
    48. 16.8 Bitcoin

    49. Video 16.8.1 Bitcoin
    50. Check for Understanding 16.8.2 Bitcoin
    51. Connection 16.8.3 51% Attack Explained
    52. Free Response 16.8.4 51% Attack
    53. Connection 16.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 16.8.6 Bitcoin Bust
    55. Resource 16.8.7 Explore the Bitcoin Blockchain
    56. 16.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 16.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 16.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 16.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 16.9.4 Cryptocurrency Pros and Cons
    61. Free Response 16.9.5 Crypto Pros and Cons
    62. Connection 16.9.6 What is HODL?
    63. Free Response 16.9.7 What is HODL?
    64. Free Response 16.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 16.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 16.10.1 Overview
    67. Free Response 16.10.2 Preview Sample Expert Panels
    68. Free Response 16.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 16.10.4 Write an Outline and Rehearse
    70. Free Response 16.10.5 Expert Panel Talk (Presentation)
    71. 16.11 Cryptocurrency Quiz

    72. Unit Quiz 16.11.1 Cryptocurrency Quiz
    73. Badge 16.11.2 Cryptocurrency Badge
  17. Web Development

    1. 17.1 Introduction to HTML

    2. Video 17.1.1 Introduction to HTML
    3. Check for Understanding 17.1.2 Introduction to HTML Quiz
    4. Example 17.1.3 Our First HTML Page
    5. Exercise 17.1.4 Say Hello!
    6. 17.2 Structure of an HTML Page

    7. Video 17.2.1 Structure of an HTML Page
    8. Check for Understanding 17.2.2 Structure of an HTML Page Quiz
    9. Example 17.2.3 HTML Template
    10. Example 17.2.4 Hello World Page
    11. Exercise 17.2.5 The <title> Tag
    12. Exercise 17.2.6 Your First HTML Page
    13. Badge 17.2.7 Structure Badge
    14. 17.3 Formatting Text

    15. Video 17.3.1 Formatting Text
    16. Check for Understanding 17.3.2 Formatting Text Quiz
    17. Example 17.3.3 Dictionary
    18. Exercise 17.3.4 That's Bold
    19. Exercise 17.3.5 Artificial Intelligence
    20. Exercise 17.3.6 State Capitals
    21. 17.4 Links

    22. Video 17.4.1 Links
    23. Check for Understanding 17.4.2 Links Quiz
    24. Example 17.4.3 The <a> Tag
    25. Exercise 17.4.4 Simple Link
    26. Exercise 17.4.5 My Favorite Websites
    27. 17.5 Images

    28. Video 17.5.1 Images
    29. Check for Understanding 17.5.2 Images Quiz
    30. Example 17.5.3 The <img> Tag
    31. Example 17.5.4 Building the CodeHS Homepage
    32. Exercise 17.5.5 Collage on a Theme
    33. Exercise 17.5.6 Linking an Image
    34. Exercise 17.5.7 Personal Library
    35. Badge 17.5.8 Images Badge
    36. 17.6 HTML Lists

    37. Video 17.6.1 HTML Lists
    38. Check for Understanding 17.6.2 HTML Lists Quiz
    39. Example 17.6.3 Grocery Shopping
    40. Exercise 17.6.4 Favorite Things
    41. Exercise 17.6.5 To-Do List
    42. Exercise 17.6.6 List Article
    43. 17.7 HTML Tables

    44. Video 17.7.1 HTML Tables
    45. Check for Understanding 17.7.2 HTML Tables Quiz
    46. Example 17.7.3 Address Book
    47. Exercise 17.7.4 Favorite Songs
    48. Exercise 17.7.5 Calendar
    49. 17.8 HTML Styling

    50. Video 17.8.1 HTML Styling
    51. Check for Understanding 17.8.2 HTML Styling Quiz
    52. Example 17.8.3 Stylish Address Book
    53. Exercise 17.8.4 Background Colors
    54. Exercise 17.8.5 Style Your To-Do List
    55. 17.9 Introduction to CSS

    56. Video 17.9.1 Introduction to CSS
    57. Check for Understanding 17.9.2 Introduction to CSS Quiz
    58. Example 17.9.3 Styling Your H1s
    59. Exercise 17.9.4 First Style with CSS
    60. Exercise 17.9.5 List Styling
    61. 17.10 CSS Select by Tag

    62. Video 17.10.1 CSS Select by Tag
    63. Check for Understanding 17.10.2 CSS Select by Tag Quiz
    64. Example 17.10.3 Rainbow
    65. Example 17.10.4 Dog Styling
    66. Exercise 17.10.5 Restaurant Menu
    67. Exercise 17.10.6 Put Karel Together
    68. 17.11 CSS Select by Class

    69. Video 17.11.1 CSS Select by Class
    70. Check for Understanding 17.11.2 CSS Select by Class Quiz
    71. Example 17.11.3 Simple Checkerboard
    72. Exercise 17.11.4 Tic Tac Toe
    73. Exercise 17.11.5 Music Library
    74. 17.12 CSS Select by ID

    75. Video 17.12.1 CSS Select by ID
    76. Check for Understanding 17.12.2 CSS Select by ID Quiz
    77. Example 17.12.3 Logo
    78. Exercise 17.12.4 Favorite Dog
    79. Exercise 17.12.5 Bingo
    80. Badge 17.12.6 CSS Badge
    81. 17.13 Viewing Websites

    82. Video 17.13.1 Viewing Websites
    83. Check for Understanding 17.13.2 Viewing Websites Quiz
    84. Free Response 17.13.3 Explaining a URL
    85. 17.14 Web Development Quiz

    86. Unit Quiz 17.14.1 Web Development Quiz
    87. 17.15 Your First Website

    88. Challenge 17.15.1 Set Up Your codehs.me Website
    89. Challenge 17.15.2 Practice PT: Your First Website
    90. Badge 17.15.3 Website Badge
  18. SQL Part II: The SQL

    1. 18.1 More Filtering Practice

    2. Exercise 18.1.1 Initials
    3. Exercise 18.1.2 Compound Queries with BETWEEN
    4. Exercise 18.1.3 Gryffindors With G Names
    5. Exercise 18.1.4 R First Names
    6. Exercise 18.1.5 FF Houses
    7. 18.2 Ordering Results

    8. Video 18.2.1 The ORDER BY Keyword
    9. Notes 18.2.2 ORDER BY
    10. Example 18.2.3 ORDER BY First Name
    11. Example 18.2.4 Reverse Order
    12. Example 18.2.5 Order By Multiple Fields
    13. Exercise 18.2.6 House Ordering
    14. Exercise 18.2.7 Sort the P Names
    15. 18.3 Renaming Fields

    16. Notes 18.3.1 Renaming Fields with AS
    17. Example 18.3.2 Renaming in the House Table
    18. Exercise 18.3.3 Changing Column Names
    19. 18.4 Joining Tables

    20. Video 18.4.1 The JOIN command
    21. Notes 18.4.2 Basic Joining
    22. Example 18.4.3 Letters and Numbers
    23. Example 18.4.4 Person and House
    24. Example 18.4.5 Person and House (Correct)
    25. Example 18.4.6 Person and House (with namespacing)
    26. Exercise 18.4.7 List All Gryffindors
    27. Video 18.4.8 JOIN With Yourself
    28. Notes 18.4.9 Renaming Tables
    29. Example 18.4.10 Quidditch Matchups
    30. Exercise 18.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 18.5 More Joining Tables

    32. Example 18.5.1 The Course Table
    33. Exercise 18.5.2 Courses and Professors
    34. Exercise 18.5.3 Courses, Professors, and Houses
    35. Exercise 18.5.4 Courses Taught By Gryffindors
    36. Example 18.5.5 The Enrollment Table
    37. Exercise 18.5.6 Students Taking Potions
    38. Exercise 18.5.7 Non-Slytherins Taking Potions
    39. Exercise 18.5.8 Defense Students by House
    40. Exercise 18.5.9 Neville's Courses
  19. New Material (2020-2021)

    1. 19.1 New Material

    2. Connection 19.1.1 Air Gapped Computers
    3. Free Response 19.1.2 Air Gapped Computers Response
    4. Connection 19.1.3 Cyberterrorism
    5. Free Response 19.1.4 Cyberterrorism Response
    6. Connection 19.1.5 What is Virtualization?
    7. Free Response 19.1.6 Virtualization Response
    8. Connection 19.1.7 The OSI Model and Network Attacks
    9. Free Response 19.1.8 The OSI Model and Network Attacks Response
    10. Connection 19.1.9 The Machine Instruction Cycle