Please enable JavaScript to use CodeHS

Outline


1. What is Cybersecurity?
1.1 Module Overview - Cybersecurity
Video 1.1.1 Welcome to Cybersecurity
Check for Understanding 1.1.2 Welcome to Cybersecurity
Example 1.1.3 Intruder Alert!
Free Response 1.1.4 Cybersecurity and You
Free Response 1.1.5 Course Goals
1.2 What is Cybersecurity?
Video 1.2.1 What is Cybersecurity?
Check for Understanding 1.2.2 What is Cybersecurity?
Connection 1.2.3 WannaCry Ransomware Attack
Free Response 1.2.4 WannaCry Reflection
Example 1.2.5 Ransomware Simulator
Connection 1.2.6 Internet of Things
Connection 1.2.7 Cybersecurity and Connected Cars
Free Response 1.2.8 Internet of Things Reflection
1.3 Impact of Cybersecurity
Video 1.3.1 Impact of Cybersecurity
Check for Understanding 1.3.2 Impact of Cybersecurity
Example 1.3.3 Phishing Simulator
Connection 1.3.4 Yahoo! Attack
Free Response 1.3.5 Yahoo! Reflection
Connection 1.3.6 Fighting Cyber Crime
Free Response 1.3.7 Cyber Crime Reflection
Connection 1.3.8 FBI Cyber Crime
Free Response 1.3.9 FBI Reflection
1.4 The CIA Triad
Video 1.4.1 CIA Triad
Check for Understanding 1.4.2 CIA Triad
Free Response 1.4.3 Which part of the CIA Triad?
Free Response 1.4.4 Which part of the CIA Triad?
Free Response 1.4.5 Breach of Confidentiality
Free Response 1.4.6 Breach of Availability
Free Response 1.4.7 CIA Connections
1.5 What is Cybersecurity? Quiz
Unit Quiz 1.5.1 What is Cybersecurity? Quiz
2. Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
Video 2.1.1 Digital Footprint and Reputation
Check for Understanding 2.1.2 Digital Footprint and Reputation
Example 2.1.3 Social Media Clean-up
Free Response 2.1.4 Building a Positive Digital Footprint
Connection 2.1.5 Right to be Forgotten?
Free Response 2.1.6 Right to be Forgotten
Free Response 2.1.7 What is your Digital Footprint?
2.2 Cyberbullying
Video 2.2.1 Cyberbullying
Check for Understanding 2.2.2 Cyberbullying
Free Response 2.2.3 Scenario: Student Ranking
Free Response 2.2.4 Scenario: Singled Out
Notes 2.2.5 United Against Cyberbullying: A Fictional Story
Free Response 2.2.6 Reflection: United Against Cyberbullying
Free Response 2.2.7 Stopping Cyberbullying
2.3 Internet Safety
Video 2.3.1 Internet Safety
Check for Understanding 2.3.2 Internet Safety
Free Response 2.3.3 Scenario: School Stranger
Free Response 2.3.4 Scenario: Vacation Pals
Free Response 2.3.5 Staying Safe
2.4 Privacy & Security
Video 2.4.1 What is Data Privacy & Security?
Check for Understanding 2.4.2 Privacy & Security Quiz
Connection 2.4.3 Google Privacy Policy Search
Free Response 2.4.4 Google Privacy Policy Search
Example 2.4.5 Guess: Password List
Example 2.4.6 Guess: Using an Algorithm
Example 2.4.7 Guess: Brute Force
Connection 2.4.8 How Strong is your Password?
Free Response 2.4.9 How Strong is your password?
2.5 Information Literacy
Video 2.5.1 Information Literacy
Check for Understanding 2.5.2 Information Literacy
Free Response 2.5.3 Effective Internet Searches
Connection 2.5.4 Evaluate the Source 1
Free Response 2.5.5 Respond: Evaluate the Source 1
Notes 2.5.6 Evaluate the Source 2
Free Response 2.5.7 Respond: Evaluate the Source 2
Connection 2.5.8 Hero Pig?
Free Response 2.5.9 Respond: Hero Pig?
2.6 Creative Credit & Copyright
Video 2.6.1 Creative Credit and Copyright
Check for Understanding 2.6.2 Creative Credit and Copyright
Free Response 2.6.3 Cite!
Connection 2.6.4 Exploring Creative Commons
Free Response 2.6.5 Respond: Creative Commons
Free Response 2.6.6 Task: Finding Images
Free Response 2.6.7 Reflection: Why is Copyright Important?
2.7 Hacking Ethics
Video 2.7.1 Hacking Ethics & Legality
Check for Understanding 2.7.2 Hacking Ethics & Legality
Free Response 2.7.3 Reflection: White Hat vs Black Hat Hacking
Connection 2.7.4 Penetration Testing
Free Response 2.7.5 Reflection: Penetration Testing
Connection 2.7.6 Hack the Pentagon?
Free Response 2.7.7 Reflection: Hack the Pentagon
Check for Understanding 2.7.8 Ethical Hacker Agreement
2.8 Digital Citizenship and Cybersecurity Quiz
Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
3. Project: Public Service Announcement
3.1 Project: Public Service Announcement
Free Response 3.1.1 Pick a Topic
Free Response 3.1.2 Research
Free Response 3.1.3 Choose Your Audience
Free Response 3.1.4 What kind of PSA?
Free Response 3.1.5 Draft your PSA
Free Response 3.1.6 Finalize your PSA!
4. The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
Example 4.1.3 Cryptogram Game!
Video 4.1.4 Why encrypt?
Check for Understanding 4.1.5 Why encrypt?
Example 4.1.6 Encrypt/Decrypt
4.2 History of Cryptography
Video 4.2.1 Cryptography: A Brief History
Check for Understanding 4.2.2 Cryptography History Quiz
Connection 4.2.3 How the Enigma Worked
Free Response 4.2.4 How the Enigma Worked
Connection 4.2.5 Unknown Languages and the Future of Cryptography
Free Response 4.2.6 The Future of Cybersecurity
4.3 Basic Crypto Systems: Caesar Cipher
Video 4.3.1 Caesar Cipher
Check for Understanding 4.3.2 Caesar Cipher
Example 4.3.3 Caesar Cipher Encryption
Example 4.3.4 Decrypt Caesar's Cipher!
4.4 Basic Crypto Systems: Cracking Caesar
Video 4.4.1 Cracking Caesar Cipher
Check for Understanding 4.4.2 Cracking Caesar Cipher
Example 4.4.3 Cracking Caesar with Brute Force
Example 4.4.4 Letter Frequency and Caesar
Free Response 4.4.5 Examining Caesar Cipher
4.5 Basic Crypto Systems: Vigenere Cipher
Video 4.5.1 Vigenere Cipher
Check for Understanding 4.5.2 Vigenere Cipher
Example 4.5.3 Vigenere Cipher Example
Example 4.5.4 Letter Frequency and Vigenere Cipher
Free Response 4.5.5 Examining Vigenere Cipher
Example 4.5.6 Improving Vigenere
4.6 Hash Functions
Video 4.6.1 Hash Functions
Check for Understanding 4.6.2 Hash Functions
Connection 4.6.3 Google Shattered Crypto Algorithm
Free Response 4.6.4 Hash Functions in the News
Video 4.6.5 What is a Checksum?
Connection 4.6.6 Using a Hash Generator
Free Response 4.6.7 Hash Generator
Connection 4.6.8 Password Salting
Free Response 4.6.9 Password Salting
4.7 Hash Function Development
Video 4.7.1 Hash Function Development
Check for Understanding 4.7.2 Hash Function Development
Example 4.7.3 Modulo Math Calculator
Example 4.7.4 Understanding Modulo Math
Example 4.7.5 Modulo Game!
Exercise 4.7.6 Develop a Simple Hash Function
4.8 Digital Certificates
Video 4.8.1 Symmetric vs Asymmetric Encryption
Notes 4.8.2 Public-Key Encryption Explorer
Video 4.8.3 Digital Certificates
Check for Understanding 4.8.4 Digital Certificates
Connection 4.8.5 SSL Explained
Free Response 4.8.6 SSL Explained
Free Response 4.8.7 SSL Connection
Connection 4.8.8 In The News
Free Response 4.8.9 In The News Response
Free Response 4.8.10 Become a Certificate Authority!
4.9 The ABCs of Cryptography Quiz
Unit Quiz 4.9.1 The ABCs of Cryptography Quiz
5. Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
Notes 5.1.1 Overview
Notes 5.1.2 Investigate a Classic Cipher
Free Response 5.1.3 Write the Script and Rehearse
Free Response 5.1.4 Newscast Presentation
6. System Administration
6.1 Operating Systems
Video 6.1.1 Operating Systems
Check for Understanding 6.1.2 Operating Systems Quiz
Example 6.1.3 Detect My OS
Example 6.1.4 Windows OS Installation Simulation
Free Response 6.1.5 Installing an OS
Connection 6.1.6 Upgrading a Mac OS
6.2 Comparing Operating Systems
Video 6.2.1 Comparing Operating Systems
Check for Understanding 6.2.2 Comparing Operating Systems Quiz
Example 6.2.3 Windows Simulation
Example 6.2.4 MacOS Simulation
Connection 6.2.5 Choose a Linux Distro!
Free Response 6.2.6 Which would you choose?
6.3 Compatibility
Video 6.3.1 Compatibility
Check for Understanding 6.3.2 Compatibility Quiz
Example 6.3.3 What Processor? Windows
Example 6.3.4 What Processor? Mac
Free Response 6.3.5 What Processor are you running?
6.4 Software and Applications
Video 6.4.1 Software and Applications
Check for Understanding 6.4.2 Software and Applications Quiz
Example 6.4.3 Spreadsheet Simulation
Example 6.4.4 Messaging Simulation
Example 6.4.5 Kanban Board Simulation
Free Response 6.4.6 Software Simulations
6.5 Software Licenses
Video 6.5.1 Software Licenses
Check for Understanding 6.5.2 Software Licenses Quiz
Free Response 6.5.3 Do I need a Software License?
Free Response 6.5.4 Is This Original?
6.6 Application Security
Video 6.6.1 Application Security
Check for Understanding 6.6.2 Application Security
Example 6.6.3 Windows Updates
Connection 6.6.4 Windows Defender Antivirus
Free Response 6.6.5 Windows Defender Antivirus
Free Response 6.6.6 CodeHS System Restore
6.7 Browser Configuration
Video 6.7.1 Browser Configuration
Check for Understanding 6.7.2 Browser Configuration
Connection 6.7.3 Cached CodeHS
Free Response 6.7.4 Cached CodeHS
Example 6.7.5 Is Your Popup Blocker On?
Free Response 6.7.6 Browser Extensions Lab
6.8 System Administration
Video 6.8.1 User Accounts
Check for Understanding 6.8.2 User Accounts Quiz
Free Response 6.8.3 User Accounts
Free Response 6.8.4 Shared Folders and Files
Video 6.8.5 Host Security
Check for Understanding 6.8.6 Host Security Quiz
Free Response 6.8.7 Security Baseline
6.9 Command Line Interface
Notes 6.9.1 Linux/MacOS vs. Windows
Video 6.9.2 Command Line Interface
Check for Understanding 6.9.3 Command Line Interface Quiz
Resource 6.9.4 Command Equivalents
Video 6.9.5 Windows Command Prompt
Free Response 6.9.6 Windows Command Prompt
Free Response 6.9.7 Directory Directions
Connection 6.9.8 Neural Interface?
Free Response 6.9.9 Neural Interface?
6.10 System Administration Quiz
Survey 6.10.1 Mindsets
Unit Quiz 6.10.2 System Administration Quiz
7. Software Security
7.1 Clients and Servers
Video 7.1.1 Clients and Servers
Check for Understanding 7.1.2 Clients and Servers
Connection 7.1.3 Inside a Google Data Center
Free Response 7.1.4 Inside a Google Data Center
Connection 7.1.5 Cloud Vulnerabilities
Free Response 7.1.6 Cloud Vulnerabilities Response
Video 7.1.7 Client-Server Model
Check for Understanding 7.1.8 Client-Server Model
Connection 7.1.9 The Future of User Privacy
Free Response 7.1.10 The Future of User Privacy
7.2 What is SQL?
Notes 7.2.1 What is SQL Overview
Video 7.2.2 Intro to SQL
Check for Understanding 7.2.3 Quiz: What is SQL?
Video 7.2.4 How to Structure Data in SQL
Check for Understanding 7.2.5 How to Structure Data in SQL
Example 7.2.6 SQL Tables
Free Response 7.2.7 SQL Tables Response
7.3 Basic Querying in SQL
Video 7.3.1 The SELECT Statement
Check for Understanding 7.3.2 Basic Querying in SQL
Example 7.3.3 Our First SELECT Statement
Exercise 7.3.4 Your First SELECT Statement
Video 7.3.5 More SELECT Statement
Check for Understanding 7.3.6 More SELECT Statement
Example 7.3.7 Selecting Specific Columns
Exercise 7.3.8 Harry Potter Names
7.4 Common Security Problems
Video 7.4.1 Common Security Problems
Check for Understanding 7.4.2 Common Security Problems
Connection 7.4.3 Meet Security Engineers at Google
Free Response 7.4.4 Security Engineering Reflection
Video 7.4.5 Living in a Digital World
Free Response 7.4.6 Living in a Digital World
7.5 SQL Injection Overview
Video 7.5.1 SQL Injection Overview
Check for Understanding 7.5.2 SQL Injection Overview
Connection 7.5.3 Equifax Security Breach
Connection 7.5.4 Equifax Exposed Millions
Free Response 7.5.5 Equifax SQL Injection Attack
Example 7.5.6 SQLi
7.6 Types of SQLi and Prevention
Video 7.6.1 Types of SQLi
Check for Understanding 7.6.2 Types of SQLi
Video 7.6.3 Preventing SQLi
Check for Understanding 7.6.4 Preventing SQLi
Connection 7.6.5 Mitigating SQL Injection
Free Response 7.6.6 Reflection: Mitigating SQL Injection
Connection 7.6.7 SQL Injection
7.7 Software Security Quiz
Unit Quiz 7.7.1 Software Security Quiz
8. Networking Fundamentals
8.1 Introduction to the Internet
Video 8.1.1 Welcome to the Internet
Check for Understanding 8.1.2 Intro to the Internet
Connection 8.1.3 Inside Facebook's Connectivity Lab
Free Response 8.1.4 Connectivity Lab Reflection
8.2 Notational Systems
Video 8.2.1 Number Systems
Check for Understanding 8.2.2 Number Systems Quiz
Notes 8.2.3 Number Base Tool
Video 8.2.4 Decimal to Binary
Check for Understanding 8.2.5 Decimal to Binary Quiz
Exercise 8.2.6 Binary Game
8.3 Data Representation
Video 8.3.1 Hexadecimal
Check for Understanding 8.3.2 Hexadecimal Quiz
Exercise 8.3.3 Binary to Hex Game
Video 8.3.4 Encoding Text with Binary
Check for Understanding 8.3.5 Encoding Text with Binary Quiz
Example 8.3.6 Custom Encoding
Example 8.3.7 Bits to ASCII
Exercise 8.3.8 Hello World in Bits
8.4 Internet Hardware and Sending Information
Video 8.4.1 Internet Hardware
Check for Understanding 8.4.2 Internet Hardware
Video 8.4.3 Sending Information
Check for Understanding 8.4.4 Sending Information
Connection 8.4.5 The Internet is in the Ocean
Free Response 8.4.6 Internet in the Ocean Reflection
8.5 Internet Addresses
Video 8.5.1 Internet Addresses
Check for Understanding 8.5.2 Internet Addresses
Free Response 8.5.3 The Need for Addresses
Connection 8.5.4 IPv4 vs. IPv6
Free Response 8.5.5 Reflection: IPv4 vs IPv6
8.6 Domain Name System (DNS)
Video 8.6.1 Domain Name System (DNS)
Check for Understanding 8.6.2 Domain Name System
Connection 8.6.3 How Does DNS Work?
Free Response 8.6.4 How Does DNS Work?
8.7 Routing
Video 8.7.1 Routing
Check for Understanding 8.7.2 Routing
Free Response 8.7.3 Redundancy
8.8 Packets & Protocols
Video 8.8.1 Packets
Check for Understanding 8.8.2 Packets
Video 8.8.3 Protocols
Check for Understanding 8.8.4 Protocols
Connection 8.8.5 How the Internet Works
Free Response 8.8.6 The Journey of an Image
8.9 Protocols and Standards
Video 8.9.1 Protocols
Check for Understanding 8.9.2 Protocols Quiz
Video 8.9.3 Standards
Check for Understanding 8.9.4 Standards Quiz
Connection 8.9.5 The New Wireless Standard
Connection 8.9.6 801.11ax
Free Response 8.9.7 801.11ax FR
8.10 Viewing a Webpage
Video 8.10.1 Viewing a Webpage
Check for Understanding 8.10.2 Viewing a Webpage
Free Response 8.10.3 Explaining a URL
Connection 8.10.4 Net Neutrality Explained
Connection 8.10.5 FCCs Net Neutrality Rules Officially Repealed
Free Response 8.10.6 Take a Side on Net Neutrality
Connection 8.10.7 Net Neutrality and Cybersecurity
Free Response 8.10.8 Net Neutrality and Cybersecurity Research
8.11 Access Control
Video 8.11.1 Access Control
Check for Understanding 8.11.2 Access Control
Example 8.11.3 Multifactor Authentication
Example 8.11.4 Two Factor Authentication
Free Response 8.11.5 Two Factor Authentication Reflection
Connection 8.11.6 RADIUS Overview with AAA Protocol
Connection 8.11.7 RADIUS Server Access Control
Free Response 8.11.8 RADIUS Reflection
8.12 Impact of the Internet
Video 8.12.1 Impact of the Internet
Check for Understanding 8.12.2 Impact of the Internet
Connection 8.12.3 What is the Digital Divide?
Free Response 8.12.4 What is the Digital Divide?
8.13 Networking Fundamentals Quiz
Survey 8.13.1 Mindsets
Unit Quiz 8.13.2 Networking Fundamentals Quiz
9. IT Infrastructure
9.1 Internal Components
Video 9.1.1 Internal Components
Check for Understanding 9.1.2 Internal Components
Connection 9.1.3 Build a Computer
Free Response 9.1.4 Build a Computer
Example 9.1.5 Test Your Brain's RAM!
Free Response 9.1.6 Test Your Brain's RAM! Reflection
9.2 Peripheral Devices
Video 9.2.1 Peripheral Devices
Check for Understanding 9.2.2 Peripheral Devices
Free Response 9.2.3 Personalized Peripherals
Free Response 9.2.4 IT Help
Free Response 9.2.5 Your Ideal Computer Setup
9.3 Network Devices
Video 9.3.1 Network Devices
Check for Understanding 9.3.2 Network Devices
Connection 9.3.3 Speed Test
Free Response 9.3.4 Speed Test
Connection 9.3.5 Fiber Optics Bend Light!
Free Response 9.3.6 Fiber Optics Bend Light!
Connection 9.3.7 Ethernet Standards
Free Response 9.3.8 Ethernet Standards
Free Response 9.3.9 Network Troubleshooting
9.4 Storage Options
Video 9.4.1 Storage Options
Check for Understanding 9.4.2 Storage Options Quiz
Connection 9.4.3 Security of Cloud Storage
Free Response 9.4.4 Security of Cloud Storage
Free Response 9.4.5 Storage Suggestions
9.5 Network Options
Video 9.5.1 Network Options
Check for Understanding 9.5.2 Network Options Quiz
Connection 9.5.3 What is an SSID?
Free Response 9.5.4 What is an SSID?
Connection 9.5.5 Wireless Threats
Free Response 9.5.6 Wireless Threats
Free Response 9.5.7 Wireless Network Setup
9.6 Network Communication
Video 9.6.1 Network Communication
Check for Understanding 9.6.2 Network Communication Quiz
Example 9.6.3 Setting up a Firewall
Free Response 9.6.4 iptables
Notes 9.6.5 iptables simulation
9.7 Network Management
Notes 9.7.1 Linux/MacOS vs. Windows
Video 9.7.2 Network Management
Check for Understanding 9.7.3 Network Management Quiz
Example 9.7.4 MacOS Terminal Simulation
Example 9.7.5 Windows Command Prompt Simulation
Video 9.7.6 Windows Command Prompt Spy
Free Response 9.7.7 Windows Command Prompt Spy
9.8 Private Networks
Video 9.8.1 IP and MAC Addresses
Check for Understanding 9.8.2 IP and MAC Addresses Quiz
Example 9.8.3 Intranet Permissions
Free Response 9.8.4 Coffee Shop: Design an Intranet
Video 9.8.5 DMZs and VPNs
Check for Understanding 9.8.6 DMZs and VPNs Quiz
Connection 9.8.7 Protecting Privacy with VPNs
Free Response 9.8.8 Protecting Privacy with VPNs
Free Response 9.8.9 Coffee Shop: Network Plan
Free Response 9.8.10 Coffee Shop: Network Diagram
Video 9.8.11 SOHO Network
Example 9.8.12 Network Topologies
9.9 IT Infrastructure Quiz
Unit Quiz 9.9.1 IT Infrastructure Quiz
10. Project: Troubleshooting
10.1 Methodology
Notes 10.1.1 Troubleshooting Methodology
Free Response 10.1.2 Identify the Problem
Free Response 10.1.3 Research Solutions
Free Response 10.1.4 Establish a Theory
Free Response 10.1.5 Test the Theory
Free Response 10.1.6 Fix the Problem!
10.2 Support Practice
Exercise 10.2.1 Signal Strength
Exercise 10.2.2 Interference
11. Project: IT Professional
11.1 Building a Resume
Connection 11.1.1 What is a Resume?
Free Response 11.1.2 What is a Resume?
Connection 11.1.3 Explore Resume Layouts
Free Response 11.1.4 Explore Resume Layouts
Free Response 11.1.5 Draft Your Resume
11.2 Communication is Key!
Notes 11.2.1 Do you have what it takes?
Free Response 11.2.2 Cybersecurity Careers
Free Response 11.2.3 Internships Exploration
Connection 11.2.4 Customer Service Skills
Free Response 11.2.5 Customer Service Skills
Free Response 11.2.6 Act it Out!
11.3 Building a Knowledge Base
Connection 11.3.1 What is a Knowledge Base?
Free Response 11.3.2 Draft a KB Article
Free Response 11.3.3 Share your KB Article
Free Response 11.3.4 Finalize your KB Article
11.4 Star in a Video!
Connection 11.4.1 Instructional Videos
Free Response 11.4.2 Instructional Video Plan
Free Response 11.4.3 Write the Script
Free Response 11.4.4 Create the Storyboard
Free Response 11.4.5 Record Your Video
12. Project: Digital Forensics
12.1 Digital Forensics
Video 12.1.1 Digital Forensics
Connection 12.1.2 Student Success Story
Free Response 12.1.3 Student Success Story Response
12.2 Forensic Case 1: Logs
Notes 12.2.1 Network Logs
Example 12.2.2 Network Log Evidence
Free Response 12.2.3 Network Logs Conclusion
12.3 Forensic Case 2: File Metadata
Notes 12.3.1 File Metadata
Example 12.3.2 File Metadata Evidence
Free Response 12.3.3 File Metadata Conclusion
12.4 Forensic Case 3: Exif Data
Notes 12.4.1 Photo Exif
Connection 12.4.2 Exif Using Inspector
Example 12.4.3 Exif Using the CLI
Free Response 12.4.4 Photo Exif Conclusion
13. Cyber Defense
13.1 Network Attacks
Video 13.1.1 Network Attacks Overview
Check for Understanding 13.1.2 Network Attacks Quiz
Notes 13.1.3 Check for Vulnerabilities
Connection 13.1.4 Bug Bounty Hunting
Free Response 13.1.5 Bug Bounty Hunting
Connection 13.1.6 Common Port Targets
Example 13.1.7 Port Scanner Simulation
Free Response 13.1.8 Open Port Reflection
13.2 Malware Types and Prevention
Video 13.2.1 Malware Types and Prevention
Check for Understanding 13.2.2 Malware Types and Prevention
Connection 13.2.3 How Anti-malware Works
Free Response 13.2.4 How Anti-malware Works
Free Response 13.2.5 OS Malware Security
Free Response 13.2.6 Reverse Engineering Malware
Connection 13.2.7 Cyberterrorism
Free Response 13.2.8 Cyberterrorism Response
13.3 Common Network Attacks
Video 13.3.1 Common Network Attacks
Check for Understanding 13.3.2 Network Attacks
Connection 13.3.3 Social Engineering Hack
Free Response 13.3.4 Social Engineering Reflection
Connection 13.3.5 DDoS Attacks
Example 13.3.6 DDoS Simulation
Free Response 13.3.7 DDoS Reflection
13.4 Additional Attacks
Video 13.4.1 Additional Attacks
Check for Understanding 13.4.2 Additional Attacks Quiz
Connection 13.4.3 Botnet Attacks - Mirai
Connection 13.4.4 Botnet Attacks - 3ve
Connection 13.4.5 Botnet Attacks - 3ve Video
Free Response 13.4.6 Botnet Attacks - Reflection
Connection 13.4.7 Zero-day Exploit: Stuxnet
Notes 13.4.8 Zero-day Exploit: Stuxnet
Free Response 13.4.9 Zero-day Exploit Reflection
Free Response 13.4.10 US-CERT Current Activity
13.5 Cross-site Scripting
Video 13.5.1 Cross-site Scripting
Check for Understanding 13.5.2 Cross-site Scripting
Connection 13.5.3 XSS Bug in Yahoo Mail
Free Response 13.5.4 XSS Bug in Yahoo Mail
Notes 13.5.5 XSS Demo Overview
Connection 13.5.6 Hacksplaining XSS Demo
Connection 13.5.7 Google's Tutorial for XSS
Free Response 13.5.8 XSS Reflection
13.6 Internal Threats
Video 13.6.1 Internal Threats
Check for Understanding 13.6.2 Internal Threats
Connection 13.6.3 BIOS/UEFI Attack Example
Notes 13.6.4 Accessing BIOS/UEFI
Connection 13.6.5 Causes of Data Breaches
Free Response 13.6.6 Causes of Data Breaches
Connection 13.6.7 Protecting Data at All Times
Free Response 13.6.8 Protecting Data at All Times
Connection 13.6.9 Air Gapped Computers
Free Response 13.6.10 Air Gapped Computers Response
13.7 Cyber Defense Quiz
Unit Quiz 13.7.1 Cyber Defense Quiz
14. Project: Put it in Writing!
14.1 Level 1: Entry Event
Free Response 14.1.1 Company Development
Free Response 14.1.2 Level 1: Attack!
Video 14.1.3 Level 1: Project Overview
Connection 14.1.4 Put It In Writing! Rubric
14.2 Level 2: User Training
Free Response 14.2.1 User Training Policy Development
Free Response 14.2.2 Challenge: Employee Negligence 1
Free Response 14.2.3 Challenge: Employee Negligence 2
Free Response 14.2.4 Level 2 Debrief
14.3 Level 3: Incident Response
Connection 14.3.1 Incident Response Plan Template
Free Response 14.3.2 Incident Response Plan Link
Free Response 14.3.3 Challenge: Cyber Attack!
Free Response 14.3.4 Level 3 Debrief
14.4 Level 4: Data and Licenses
Video 14.4.1 Data and Licenses
Connection 14.4.2 FTC Data Security Guide
Connection 14.4.3 Data Policy Template
Free Response 14.4.4 Data Policy Link
Free Response 14.4.5 Challenge: Data Breach 1
Free Response 14.4.6 Challenge: Data Breach 2
Free Response 14.4.7 Challenge: Data Breach 3
Free Response 14.4.8 Level 4 Debrief
14.5 Level 5: Change Management
Video 14.5.1 Change Management
Connection 14.5.2 Change Management Plan
Free Response 14.5.3 Change Management Plan Link
15. Risk Management
15.1 Identifying Risks
Video 15.1.1 Identifying Risks
Check for Understanding 15.1.2 Identifying Risks Quiz
Connection 15.1.3 What is a Honeypot?
Connection 15.1.4 Honeypot Attacks
Free Response 15.1.5 Honeypot Attacks
Connection 15.1.6 Whois
Free Response 15.1.7 Whois
Connection 15.1.8 Packet Sniffing
Free Response 15.1.9 Packet Sniffing Response
Free Response 15.1.10 Breach Trends
15.2 Assessing Risks
Notes 15.2.1 Assessing Risks
Free Response 15.2.2 Malware Risk Assessment
Free Response 15.2.3 Poor Password Assessment
Free Response 15.2.4 Social Engineering Assessment
Video 15.2.5 Assessing Risks
Check for Understanding 15.2.6 Assessing Risks Quiz
Connection 15.2.7 End-of-Life OS
Free Response 15.2.8 End-of-Life Proposal
Example 15.2.9 Input Handling
Free Response 15.2.10 Input Handling Responses
Example 15.2.11 Input Validation
Free Response 15.2.12 Input Validation Responses
15.3 Risk Response
Video 15.3.1 Risk Response
Check for Understanding 15.3.2 Risk Response
Free Response 15.3.3 Defense in Depth Risk Mitigation
Connection 15.3.4 Sample Risk Assessment Report
Free Response 15.3.5 Sample Risk Assessment Reflection
Connection 15.3.6 Delta Outage Video
Free Response 15.3.7 Delta Outage Reflection
Connection 15.3.8 What Happens When Your Servers Go Down
Free Response 15.3.9 What Happens When Your Servers Go Down Reflection
Free Response 15.3.10 Server Upgrade Memo
15.4 Penetration Testing
Video 15.4.1 Penetration Testing
Check for Understanding 15.4.2 Penetration Testing
Connection 15.4.3 Penetration Test Report
Free Response 15.4.4 Penetration Test Report
Notes 15.4.5 Chaos Engineering
Free Response 15.4.6 Chaos Engineering Reflection
Resource 15.4.7 Pen Test Simulation Handout
Exercise 15.4.8 Pen Test Simulation: Active Recon
Exercise 15.4.9 Pen Test Simulation: Exploit Vulnerabilities
15.5 Risk Management Quiz
Unit Quiz 15.5.1 Risk Management Quiz
16. Project: The Game of Risk
16.1 The Game of Risk
Notes 16.1.1 Group Project Intro
Free Response 16.1.2 Brainstorm: SLE
Free Response 16.1.3 Brainstorm: Materials
Free Response 16.1.4 Prototype Game and Instructions
Free Response 16.1.5 Test Your Game!
Resource 16.1.6 Testing Feedback Form
Free Response 16.1.7 Create Your Final Version!