Please enable JavaScript to use CodeHS

Points

Activity Points
Advanced Cryptography
1.1 Welcome to Advanced Cybersecurity!
1.1.1 Course Introduction 1
1.1.2 Cybersecurity 101 1
1.1.3 Cyber Heat Map 5
1.1.4 Career Pathways 5
1.1.5 Starting with Cryptography 1
1.1.6 Course Goals 5
1.2 Encryption Algorithms
1.2.1 Ciphers 1
1.2.2 Ciphers Quiz 2
1.2.3 Enhanced Caesar Cipher 5
1.2.4 Mixed Alphabet Cipher 5
1.2.5 Pigpen Encoder 1
1.2.6 Pigpen Cipher 5
1.2.7 Rail Fence Cipher 5
1.2.8 Encryption Standards 1
1.2.9 Encryption Standards Quiz 5
1.3 Advanced Cryptography
1.3.1 Advanced Cryptography 1
1.3.2 Advanced Cryptography 5
1.3.3 Public Key Cryptography for Non-Geeks 1
1.3.4 Examining Public Key Cryptography 5
1.3.5 Public Key Cryptography 1
1.3.6 Public Key Cryptography 5
1.4 Hash Functions
1.4.1 Hash Functions 1
1.4.2 Hash Functions 5
1.4.3 Google Shattered Crypto Algorithm 1
1.4.4 Hash Functions in the News 5
1.4.5 Using a Hash Generator 1
1.4.6 Hash Generator 5
1.4.7 Password Salting 1
1.4.8 Password Salting 5
1.5 Hash Function Development
1.5.1 Hash Function Development 1
1.5.2 Hash Function Development 5
1.5.3 Modulo Math Calculator 1
1.5.4 Understanding Modulo Math 1
1.5.5 Modulo Game! 1
1.5.6 Develop a Simple Hash Function 5
1.6 Asymmetric Encryption
1.6.1 Asymmetric Encryption 1
1.6.2 Asymmetric Encryption Quiz 5
1.6.3 Diffie-Hellman Key Exchange 1
1.6.4 Affine Cipher 5
1.6.5 Trapdoor Functions 5
1.6.6 RSA 1
1.6.7 RSA Reflection 5
1.7 Digital Certificates
1.7.1 Digital Certificates 1
1.7.2 Digital Certificates 5
1.7.3 SSL Explained 1
1.7.4 SSL Explained 5
1.7.5 SSL Connection 5
1.7.6 In The News 1
1.7.7 In The News Response 5
1.7.8 Become a Certificate Authority! 10
1.8 Advanced Cryptography Quiz
1.8.1 Advanced Cryptography Quiz 20
Project: Steganography
2.1 Project: Steganography
2.1.1 Project Opener 1
2.1.2 Government Surveillance and Reality Winner 1
2.1.3 Government Surveillance and Reality Winner 5
2.1.4 Data Hiding and Extraction 1
2.1.5 Reflect: Data Hiding and Extraction 5
2.1.6 Hide Text 1
2.1.7 Hidden Message 1
2.1.8 Your turn: Encryption Algorithm 5
2.1.9 Your turn: Image Creation 10
2.1.10 Final Algorithm and Partner Decode 5
2.1.11 Final Reflection 5
Advanced Networking
3.1 Advanced Devices
3.1.1 Advanced Devices 1
3.1.2 Advanced Devices Quiz 5
3.1.3 Network Administrator Career 1
3.1.4 Network Administrator Career 5
3.1.5 Choosing the Best Devices 5
3.1.6 Network Diagram 5
3.2 Environmental Controls
3.2.1 Environmental Controls 1
3.2.2 Environmental Controls Quiz 5
3.2.3 Infographic 1
3.2.4 Infographic FR 5
3.2.5 Your Security Systems 5
3.2.6 Security Design 10
3.3 Protocols and Standards
3.3.1 Protocols 1
3.3.2 Protocols Quiz 3
3.3.3 Standards 1
3.3.4 Standards Quiz 2
3.3.5 The New Wireless Standard 1
3.3.6 801.11ax 1
3.3.7 801.11ax FR 5
3.4 Private Networks
3.4.1 IP and MAC Addresses 1
3.4.2 IP and MAC Addresses Quiz 2
3.4.3 Intranet Permissions 1
3.4.4 Coffee Shop: Design an Intranet 5
3.4.5 DMZs and VPNs 1
3.4.6 DMZs and VPNs Quiz 3
3.4.7 Protecting Privacy with VPNs 1
3.4.8 Protecting Privacy with VPNs 5
3.4.9 Coffee Shop: Network Plan 5
3.4.10 Coffee Shop: Network Diagram 5
3.4.11 SOHO Network 1
3.4.12 Network Topologies 1
3.5 Mobile Devices
3.5.1 Mobile Devices 1
3.5.2 Mobile Devices Quiz 5
3.5.3 How Apple FaceID Works 1
3.5.4 How Apple FaceID Works Response 5
3.5.5 Biometric Data Debate 5
3.5.6 BYOD and MDM Concept Map 1
3.5.7 BYOD and MDM Conclusions 5
3.6 Access Control
3.6.1 Access Control 1
3.6.2 Access Control 5
3.6.3 Multifactor Authentication 1
3.6.4 Two Factor Authentication 1
3.6.5 Two Factor Authentication Reflection 5
3.6.6 RADIUS Overview with AAA Protocol 1
3.6.7 RADIUS Server Access Control 1
3.6.8 RADIUS Reflection 5
3.7 Advanced Networking Quiz
3.7.1 Advanced Networking Quiz 20
Project: IT Professional
4.1 Communication is Key!
4.1.1 Do you have what it takes? 5
4.1.2 Cybersecurity Careers 5
4.1.3 Customer Service Skills 1
4.1.4 Customer Service Skills 5
4.1.5 Act it Out! 15
4.2 Building a Knowledge Base
4.2.1 What is a Knowledge Base? 1
4.2.2 Draft a KB Article 5
4.2.3 Share your KB Article 5
4.2.4 Finalize your KB Article 15
4.3 Star in a Video!
4.3.1 Instructional Videos 1
4.3.2 Instructional Video Plan 5
4.3.3 Write the Script 5
4.3.4 Create the Storyboard 5
4.3.5 Record Your Video 5
Cyber Defense
5.1 Network Attacks
5.1.1 Network Attacks Overview 1
5.1.2 Network Attacks Quiz 5
5.1.3 Check for Vulnerabilities 1
5.1.4 Bug Bounty Hunting 1
5.1.5 Bug Bounty Hunting 5
5.1.6 Common Port Targets 1
5.1.7 Port Scanner Simulation 1
5.1.8 Open Port Reflection 5
5.2 Malware Types and Prevention
5.2.1 Malware Types and Prevention 1
5.2.2 Malware Types and Prevention 5
5.2.3 How Anti-malware Works 1
5.2.4 How Anti-malware Works 5
5.2.5 OS Malware Security 5
5.2.6 Reverse Engineering Malware 5
5.3 Common Network Attacks
5.3.1 Common Network Attacks 1
5.3.2 Network Attacks 5
5.3.3 Social Engineering Hack 1
5.3.4 Social Engineering Reflection 5
5.3.5 DDoS Attacks 1
5.3.6 DDoS Simulation 1
5.3.7 DDoS Reflection 5
5.4 Additional Attacks
5.4.1 Additional Attacks 1
5.4.2 Additional Attacks Quiz 5
5.4.3 Botnet Attacks - Mirai 1
5.4.4 Botnet Attacks - 3ve 1
5.4.5 Botnet Attacks - 3ve Video 1
5.4.6 Botnet Attacks - Reflection 5
5.4.7 Zero-day Exploit: Stuxnet 5
5.4.8 Zero-day Exploit: Stuxnet 5
5.4.9 Zero-day Exploit Reflection 5
5.4.10 US-CERT Current Activity 5
5.5 Cross-site Scripting
5.5.1 Cross-site Scripting 1
5.5.2 Cross-site Scripting 5
5.5.3 XSS Bug in Yahoo Mail 1
5.5.4 XSS Bug in Yahoo Mail 5
5.5.5 XSS Demo Overview 1
5.5.6 Google Application Security: XSS 1
5.5.7 Google's Tutorial for XSS 1
5.5.8 XSS Reflection 5
5.6 Internal Threats
5.6.1 Internal Threats 1
5.6.2 Internal Threats 5
5.6.3 BIOS/UEFI Attack Example 1
5.6.4 Accessing BIOS/UEFI 1
5.6.5 Causes of Data Breaches 5
5.6.6 Causes of Data Breaches 5
5.6.7 Protecting Data at All Times 1
5.6.8 Protecting Data at All Times 5
5.7 Cyber Defense Quiz
5.7.1 Cyber Defense Quiz 20
Project: Security Assessment Report
6.1 Project Security Assessment Report
6.1.1 Project Requirements 1
6.1.2 Supercar Showdown Website 1
6.1.3 Cross-site Scripting Testing 5
6.1.4 Cross-site Scripting Handout 1
6.1.5 Security Assessment Report 15
6.1.6 Project Reflection 5
Project: Put it in Writing!
7.1 Level 1: Entry Event
7.1.1 Company Development 5
7.1.2 Level 1: Attack! 5
7.1.3 Level 1: Project Overview 1
7.1.4 Put It In Writing! Rubric 5
7.2 Level 2: User Training
7.2.1 User Training Policy Development 5
7.2.2 Challenge: Employee Negligence 1 5
7.2.3 Challenge: Employee Negligence 2 5
7.2.4 Level 2 Debrief 5
7.3 Level 3: Incident Response
7.3.1 Incident Response Plan Template 5
7.3.2 Incident Response Plan Link 5
7.3.3 Challenge: Cyber Attack! 5
7.3.4 Level 3 Debrief 5
7.4 Level 4: Data and Licenses
7.4.1 Data and Licenses 5
7.4.2 FTC Data Security Guide 5
7.4.3 Data Policy Template 5
7.4.4 Data Policy Link 5
7.4.5 Challenge: Data Breach 1 5
7.4.6 Challenge: Data Breach 2 5
7.4.7 Challenge: Data Breach 3 5
7.4.8 Level 4 Debrief 5
7.5 Level 5: Change Management
7.5.1 Change Management 5
7.5.2 Change Management Plan 5
7.5.3 Change Management Plan Link 5
Risk Management
8.1 Identifying Risks
8.1.1 Identifying Risks 1
8.1.2 Identifying Risks Quiz 5
8.1.3 What is a Honeypot? 1
8.1.4 Honeypot Attacks 1
8.1.5 Honeypot Attacks 5
8.1.6 Whois 1
8.1.7 Whois Response 5
8.1.8 Packet Sniffing 1
8.1.9 Packet Sniffing Response 5
8.1.10 Breach Trends 5
8.2 Assessing Risks
8.2.1 Assessing Risks 1
8.2.2 Malware Risk Assessment 5
8.2.3 Poor Password Assessment 5
8.2.4 Social Engineering Assessment 5
8.2.5 Assessing Risks 1
8.2.6 Assessing Risks Quiz 5
8.2.7 End-of-Life OS 1
8.2.8 End-of-Life Proposal 5
8.2.9 Input Handling 1
8.2.10 Input Handling Responses 5
8.2.11 Input Validation 1
8.2.12 Input Validation Responses 5
8.3 Risk Response
8.3.1 Risk Response 1
8.3.2 Risk Response 5
8.3.3 Defense in Depth Risk Mitigation 5
8.3.4 Sample Risk Assessment Report 5
8.3.5 Sample Risk Assessment Reflection 5
8.3.6 Delta Outage Video 5
8.3.7 Delta Outage Reflection 5
8.3.8 What Happens When Your Servers Go Down 5
8.3.9 What Happens When Your Servers Go Down Reflection 5
8.3.10 Server Upgrade Memo 5
8.4 Penetration Testing
8.4.1 Penetration Testing 1
8.4.2 Penetration Testing 5
8.4.3 Penetration Test Report 5
8.4.4 Penetration Test Report 5
8.4.5 Chaos Engineering 5
8.4.6 Chaos Engineering Reflection 5
8.4.7 Pen Test Simulation Handout 5
8.4.8 Pen Test Simulation: Active Recon 5
8.4.9 Pen Test Simulation: Exploit Vulnerabilities 5
8.5 Risk Management Quiz
8.5.1 Risk Management Quiz 20
Project: The Game of Risk
9.1 The Game of Risk
9.1.1 Group Project Intro 1
9.1.2 Brainstorm: Type of Game 5
9.1.3 Brainstorm: SLE 5
9.1.4 Brainstorm: Materials 5
9.1.5 Prototype Game and Instructions 5
9.1.6 Test Your Game! 5
9.1.7 Testing Feedback Form 1
9.1.8 Create Your Final Version! 20
Midterm
10.1 Midterm
10.1.1 Midterm 25
Final Exam
11.1 Final Exam
11.1.1 Final Exam 50
What's Next?
12.1 After Advanced Cybersecurity
12.1.1 Cybersecurity Pathways 1
12.1.2 CodeHS Programming Courses 1
12.1.3 College Pathway 1
12.1.4 Certification Pathway 1
12.1.5 Career Spotlight 1
12.1.6 My Pathway 5
Programming Fundamentals
13.1 Programming Concepts
13.1.1 Programming Concepts 1
13.1.2 Programming Concepts Quiz 5
13.1.3 Compilers vs. Interpreters 1
13.1.4 Compilers vs. Interpreters 5
13.1.5 Variables in Action 1
13.1.6 Data Types using Typeof 1
13.1.7 Basic Variables 1
13.1.8 Daily Activities 5
13.2 Arrays and Objects
13.2.1 Arrays and Objects 1
13.2.2 Arrays and Objects 5
13.2.3 Making an Array 1
13.2.4 List of Places to Travel 5
13.2.5 List of Prime Numbers 5
13.2.6 Phonebook 1
13.2.7 Sidekicks 5
13.3 Programming with Karel
13.3.1 Programming With Karel 1
13.3.2 Quiz: Karel Commands 5
13.3.3 Our First Karel Program 1
13.3.4 Your First Karel Program 5
13.3.5 Functions in Karel 1
13.3.6 Functions in Karel Quiz 5
13.3.7 Turn Around 1
13.3.8 Digging Karel 1
13.3.9 Backflip 5
13.4 Looping
13.4.1 For Loops 1
13.4.2 For Loops Quiz 5
13.4.3 Take 'em All 1
13.4.4 For Loop Square 1
13.4.5 Lots of Hurdles 5
13.4.6 While Loops in Karel 1
13.4.7 While Loops in Karel Quiz 5
13.4.8 Move to Wall 1
13.4.9 Big Tower 1
13.4.10 Follow The Yellow Ball Road 5
13.5 Branching
13.5.1 If/Else Statements 1
13.5.2 If/Else Statements Quiz 5
13.5.3 If/Else Statements 1
13.5.4 One Ball in Each Spot 1
13.5.5 Right Side Up 5
13.6 Organizational Techniques
13.6.1 Organizational Techniques 1
13.6.2 Organizational Techniques Quiz 5
13.6.3 Hurdle Karel 1
13.6.4 One Ball in Each Spot 5
13.6.5 The Two Towers 5
13.6.6 Interactive Sequence Diagram 1
13.7 Programming Fundamentals Quiz
13.7.1 Mindsets 1
13.7.2 Programming Fundamentals Quiz 15
System Administration
14.1 Operating Systems
14.1.1 Operating Systems 1
14.1.2 Operating Systems Quiz 5
14.1.3 Understanding Operating Systems 1
14.1.4 Understanding Operating Systems 5
14.1.5 Detect My OS 1
14.1.6 Upgrading a Mac OS 1
14.1.7 Windows OS Installation Simulation 1
14.1.8 Installing an OS 5
14.2 Comparing Operating Systems
14.2.1 Comparing Operating Systems 1
14.2.2 Comparing Operating Systems Quiz 5
14.2.3 Windows Simulation 1
14.2.4 MacOS Simulation 1
14.2.5 Choose a Linux Distro! 1
14.2.6 Which would you choose? 5
14.3 Compatibility
14.3.1 Compatibility 1
14.3.2 Compatibility Quiz 5
14.3.3 What Processor? Windows 1
14.3.4 What Processor? Mac 1
14.3.5 What Processor are you running? 5
14.4 Software and Applications
14.4.1 Software and Applications 1
14.4.2 Software and Applications Quiz 5
14.4.3 Spreadsheet Simulation 1
14.4.4 Messaging Simulation 1
14.4.5 Kanban Board Simulation 1
14.4.6 Software Simulations 5
14.5 Software Licenses
14.5.1 Software Licenses 1
14.5.2 Software Licenses Quiz 5
14.5.3 Do I need a Software License? 5
14.5.4 Is This Original? 5
14.6 Application Security
14.6.1 Application Security 1
14.6.2 Application Security 5
14.6.3 Windows Updates 1
14.6.4 Windows Defender Antivirus 1
14.6.5 Windows Defender Antivirus 5
14.6.6 CodeHS System Restore 5
14.7 Browser Configuration
14.7.1 Browser Configuration 1
14.7.2 Browser Configuration 5
14.7.3 Cached CodeHS 1
14.7.4 Cached CodeHS 5
14.7.5 Is Your Popup Blocker On? 1
14.7.6 Browser Extensions Lab 5
14.8 System Administration
14.8.1 User Accounts 1
14.8.2 User Accounts Quiz 2
14.8.3 User Accounts 5
14.8.4 Shared Folders and Files 5
14.8.5 Host Security 1
14.8.6 Host Security Quiz 3
14.8.7 Security Baseline 5
14.9 Command Line Interface
14.9.1 Command Line Interface 1
14.9.2 Command Line Interface Quiz 5
14.9.3 Directory Directions 5
14.9.4 Neural Interface? 1
14.9.5 Neural Interface? 5
14.10 System Administration Quiz
14.10.1 Mindsets 1
14.10.2 System Administration Quiz 20
IT Infrastructure
15.1 Internal Components
15.1.1 Internal Components 1
15.1.2 Internal Components 5
15.1.3 Build a Computer 1
15.1.4 Build a Computer 5
15.1.5 Test Your Brain's RAM! 1
15.1.6 Test Your Brain's RAM! 5
15.2 Peripheral Devices
15.2.1 Peripheral Devices 1
15.2.2 Peripheral Devices 5
15.2.3 Personalized Peripherals 5
15.2.4 IT Help 5
15.2.5 Your Ideal Computer Setup 5
15.3 Network Devices
15.3.1 Network Devices 1
15.3.2 Network Devices 5
15.3.3 Speed Test 1
15.3.4 Speed Test 5
15.3.5 Fiber Optics Bend Light! 1
15.3.6 Fiber Optics Bend Light! 5
15.3.7 Ethernet Standards 1
15.3.8 Ethernet Standards 5
15.3.9 Network Troubleshooting 5
15.4 Storage Options
15.4.1 Storage Options 1
15.4.2 Storage Options Quiz 5
15.4.3 Security of Cloud Storage 1
15.4.4 Security of Cloud Storage 5
15.4.5 Storage Suggestions 5
15.5 Network Options
15.5.1 Network Options 1
15.5.2 Network Options Quiz 5
15.5.3 What is an SSID? 1
15.5.4 What is an SSID? 5
15.5.5 Wireless Network Setup 5
15.6 Network Communication
15.6.1 Network Communication 1
15.6.2 Network Communication Quiz 5
15.6.3 Setting up a Firewall 1
15.6.4 Establish Firewall Rules 5
15.7 Network Management
15.7.1 Network Management 1
15.7.2 Network Management Quiz 5
15.7.3 MacOS Terminal Simulation 1
15.7.4 SSH Logs 1
15.7.5 SSH Logs 1
15.7.6 Reading Logs 5
15.8 IT Infrastructure Quiz
15.8.1 IT Infrastructure Quiz 20
Cryptocurrency
16.1 What is Currency?
16.1.1 What is Currency? 1
16.1.2 What is Currency? 5
16.1.3 What Gives Paper Money Its Actual Value 1
16.1.4 What Gives Money Its Value 5
16.1.5 Money: What is it Good For? 1
16.2 What is Cryptocurrency?
16.2.1 Cryptocurrency Basics 1
16.2.2 Cryptocurrency Basics 5
16.2.3 Cryptocurrency Module Overview 1
16.2.4 Cryptocurrencies Might Help Developing Countries 1
16.2.5 Cryptocurrencies are Helping Developing Countries 5
16.2.6 Show Me the Money 1
16.2.7 American Currency Exhibit 5
16.3 Intro to Blockchain
16.3.1 Intro to Blockchain 1
16.3.2 Intro to Blockchain 5
16.3.3 CryptoKitties 1
16.3.4 CryptoKitties 5
16.4 Hashing
16.4.1 Hashing 1
16.4.2 Hashing 5
16.4.3 SHA256 Hash Generator 1
16.4.4 Using the SHA256 Hash Generator 5
16.5 Proof of Work
16.5.1 Proof of Work 1
16.5.2 Proof of Work 5
16.5.3 Mining the Block 1
16.5.4 Mining the Block 5
16.5.5 PoW vs. Proof of Stake 1
16.5.6 PoW vs. PoS 5
16.5.7 Checking Proof of Work 1
16.6 Advanced Blockchain
16.6.1 Advanced Blockchain (part 1) 1
16.6.2 Advanced Blockchain (part 1) 5
16.6.3 Blockchain Buzz 1
16.6.4 Blockchain Buzz 5
16.6.5 Advanced Blockchain (part 2) 1
16.6.6 Advanced Blockchain (part 2) 5
16.6.7 Make a Blockchain 1
16.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1
16.7 Cryptocurrencies
16.7.1 Cryptocurrencies 1
16.7.2 Cryptocurrencies 5
16.7.3 Shiny Toy Phenomenon 5
16.7.4 Walmart Using Blockchain to Stop Spread of Disease 1
16.7.5 Walmart Use of Blockchain 5
16.8 Bitcoin
16.8.1 Bitcoin 1
16.8.2 Bitcoin 5
16.8.3 51% Attack Explained 1
16.8.4 51% Attack 5
16.8.5 Why the Bitcoin Bubble will Burst in 2018 1
16.8.6 Bitcoin Bust 5
16.8.7 Explore the Bitcoin Blockchain 1
16.9 Pros, Cons, and Future of Cryptocurrencies
16.9.1 Pros, Cons, and Future of Cryptocurrencies 1
16.9.2 Pros, Cons and Future of Cryptocurrencies 5
16.9.3 Pros, Cons and future of Cryptocurrencies 5
16.9.4 Cryptocurrency Pros and Cons 1
16.9.5 Crypto Pros and Cons 5
16.9.6 What is HODL? 1
16.9.7 What is HODL? 5
16.9.8 Pros, Cons, and Future of Cryptocurrencies 5
16.10 Project: Cryptocurrency Expert Panel Talk
16.10.1 Overview 5
16.10.2 Preview Sample Expert Panels 5
16.10.3 Investigate a Cryptocurrency Topic 5
16.10.4 Write an Outline and Rehearse 5
16.10.5 Expert Panel Talk (Presentation) 5
16.11 Cryptocurrency Quiz
16.11.1 Cryptocurrency Quiz 25
16.11.2 Cryptocurrency Badge 0
Web Development
17.1 Introduction to HTML
17.1.1 Introduction to HTML 1
17.1.2 Introduction to HTML Quiz 5
17.1.3 Our First HTML Page 1
17.1.4 Say Hello! 5
17.2 Structure of an HTML Page
17.2.1 Structure of an HTML Page 1
17.2.2 Structure of an HTML Page Quiz 5
17.2.3 HTML Template 1
17.2.4 Hello World Page 1
17.2.5 The <title> Tag 5
17.2.6 Your First HTML Page 5
17.2.7 Structure Badge 1
17.3 Formatting Text
17.3.1 Formatting Text 1
17.3.2 Formatting Text Quiz 5
17.3.3 Dictionary 1
17.3.4 That's Bold 5
17.3.5 Artificial Intelligence 5
17.3.6 State Capitals 5
17.4 Links
17.4.1 Links 1
17.4.2 Links Quiz 5
17.4.3 The <a> Tag 1
17.4.4 Simple Link 5
17.4.5 My Favorite Websites 5
17.5 Images
17.5.1 Images 1
17.5.2 Images Quiz 5
17.5.3 The <img> Tag 1
17.5.4 Building the CodeHS Homepage 1
17.5.5 Collage on a Theme 5
17.5.6 Linking an Image 5
17.5.7 Personal Library 5
17.5.8 Images Badge 1
17.6 HTML Lists
17.6.1 HTML Lists 1
17.6.2 HTML Lists Quiz 5
17.6.3 Grocery Shopping 1
17.6.4 Favorite Things 5
17.6.5 To-Do List 5
17.6.6 List Article 5
17.7 HTML Tables
17.7.1 HTML Tables 1
17.7.2 HTML Tables Quiz 5
17.7.3 Address Book 1
17.7.4 Favorite Songs 5
17.7.5 Calendar 5
17.8 HTML Styling
17.8.1 HTML Styling 1
17.8.2 HTML Styling Quiz 5
17.8.3 Stylish Address Book 1
17.8.4 Background Colors 5
17.8.5 Style Your To-Do List 5
17.9 Introduction to CSS
17.9.1 Introduction to CSS 1
17.9.2 Introduction to CSS Quiz 5
17.9.3 Styling Your H1s 1
17.9.4 First Style with CSS 5
17.9.5 List Styling 5
17.10 CSS Select by Tag
17.10.1 CSS Select by Tag 1
17.10.2 CSS Select by Tag Quiz 5
17.10.3 Rainbow 1
17.10.4 Dog Styling 1
17.10.5 Restaurant Menu 5
17.10.6 Put Karel Together 5
17.11 CSS Select by Class
17.11.1 CSS Select by Class 1
17.11.2 CSS Select by Class Quiz 5
17.11.3 Simple Checkerboard 1
17.11.4 Tic Tac Toe 5
17.11.5 Music Library 5
17.12 CSS Select by ID
17.12.1 CSS Select by ID 1
17.12.2 CSS Select by ID Quiz 5
17.12.3 Logo 1
17.12.4 Favorite Dog 5
17.12.5 Bingo 5
17.12.6 CSS Badge 1
17.13 Viewing Websites
17.13.1 Viewing Websites 1
17.13.2 Viewing Websites Quiz 5
17.13.3 Explaining a URL 5
17.14 Web Development Quiz
17.14.1 Web Development Quiz 25
17.15 Your First Website
17.15.1 Set Up Your codehs.me Website 10
17.15.2 Practice PT: Your First Website 10
17.15.3 Website Badge 1
SQL Part II: The SQL
18.1 More Filtering Practice
18.1.1 Initials 5
18.1.2 Compound Queries with BETWEEN 5
18.1.3 Gryffindors With G Names 5
18.1.4 R First Names 5
18.1.5 FF Houses 5
18.2 Ordering Results
18.2.1 The ORDER BY Keyword 1
18.2.2 ORDER BY 1
18.2.3 ORDER BY First Name 1
18.2.4 Reverse Order 1
18.2.5 Order By Multiple Fields 1
18.2.6 House Ordering 5
18.2.7 Sort the P Names 5
18.3 Renaming Fields
18.3.1 Renaming Fields with AS 1
18.3.2 Renaming in the House Table 1
18.3.3 Changing Column Names 5
18.4 Joining Tables
18.4.1 The JOIN command 1
18.4.2 Basic Joining 1
18.4.3 Letters and Numbers 1
18.4.4 Person and House 1
18.4.5 Person and House (Correct) 1
18.4.6 Person and House (with namespacing) 1
18.4.7 List All Gryffindors 5
18.4.8 JOIN With Yourself 1
18.4.9 Renaming Tables 1
18.4.10 Quidditch Matchups 1
18.4.11 Quidditch Matchups: Ravenclaw Away Games 5
18.5 More Joining Tables
18.5.1 The Course Table 1
18.5.2 Courses and Professors 5
18.5.3 Courses, Professors, and Houses 5
18.5.4 Courses Taught By Gryffindors 5
18.5.5 The Enrollment Table 1
18.5.6 Students Taking Potions 5
18.5.7 Non-Slytherins Taking Potions 5
18.5.8 Defense Students by House 5
18.5.9 Neville's Courses 5
New Material (2020-2021)
19.1 New Material
19.1.1 Air Gapped Computers 1
19.1.2 Air Gapped Computers Response 5
19.1.3 Cyberterrorism 1
19.1.4 Cyberterrorism Response 5
19.1.5 What is Virtualization? 1
19.1.6 Virtualization Response 5
19.1.7 The OSI Model and Network Attacks 1
19.1.8 The OSI Model and Network Attacks Response 5
19.1.9 The Machine Instruction Cycle 5