Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
What is Cybersecurity?
1.1 Module Overview - Cybersecurity Lesson
1.1.1 Welcome to Cybersecurity 1 Video
1.1.2 Welcome to Cybersecurity 2 Check for Understanding
1.1.3 Intruder Alert! 1 Example
1.1.4 Cybersecurity and You 5 Free Response
1.1.5 Course Goals 5 Free Response
1.2 What is Cybersecurity? Lesson
1.2.1 What is Cybersecurity? 1 Video
1.2.2 What is Cybersecurity? 3 Check for Understanding
1.2.3 WannaCry Ransomware Attack 1 Connection
1.2.4 WannaCry Reflection 5 Free Response
1.2.5 Ransomware Simulator 1 Example
1.2.6 Internet of Things 1 Connection
1.2.7 Cybersecurity and Connected Cars 1 Connection
1.2.8 Internet of Things Reflection 5 Free Response
1.3 Impact of Cybersecurity Lesson
1.3.1 Impact of Cybersecurity 1 Video
1.3.2 Impact of Cybersecurity 2 Check for Understanding
1.3.3 Phishing Simulator 1 Example
1.3.4 Yahoo! Attack 1 Connection
1.3.5 Yahoo! Reflection 5 Free Response
1.3.6 Fighting Cyber Crime 1 Connection
1.3.7 Cyber Crime Reflection 5 Free Response
1.3.8 FBI Cyber Crime 1 Connection
1.3.9 FBI Reflection 5 Free Response
1.4 The CIA Triad Lesson
1.4.1 CIA Triad 1 Video
1.4.2 CIA Triad 2 Check for Understanding
1.4.3 Which part of the CIA Triad? 5 Free Response
1.4.4 Which part of the CIA Triad? 5 Free Response
1.4.5 Breach of Confidentiality 5 Free Response
1.4.6 Breach of Availability 5 Free Response
1.4.7 CIA Connections 5 Free Response
1.5 What is Cybersecurity? Quiz Lesson
1.5.1 What is Cybersecurity? Quiz 15 Unit Quiz
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation Lesson
2.1.1 Digital Footprint and Reputation 1 Video
2.1.2 Digital Footprint and Reputation 3 Check for Understanding
2.1.3 Social Media Clean-up 1 Example
2.1.4 Building a Positive Digital Footprint 5 Free Response
2.1.5 Right to be Forgotten? 1 Connection
2.1.6 Right to be Forgotten 5 Free Response
2.1.7 What is your Digital Footprint? 5 Free Response
2.2 Cyberbullying Lesson
2.2.1 Cyberbullying 1 Video
2.2.2 Cyberbullying 3 Check for Understanding
2.2.3 Scenario: Student Ranking 5 Free Response
2.2.4 Scenario: Singled Out 5 Free Response
2.2.5 United Against Cyberbullying: A Fictional Story 5 Notes
2.2.6 Reflection: United Against Cyberbullying 5 Free Response
2.2.7 Stopping Cyberbullying 5 Free Response
2.3 Internet Safety Lesson
2.3.1 Internet Safety 1 Video
2.3.2 Internet Safety 2 Check for Understanding
2.3.3 Scenario: School Stranger 5 Free Response
2.3.4 Scenario: Vacation Pals 5 Free Response
2.3.5 Staying Safe 5 Free Response
2.4 Privacy & Security Lesson
2.4.1 What is Data Privacy & Security? 1 Video
2.4.2 Privacy & Security Quiz 2 Check for Understanding
2.4.3 Google Privacy Policy Search 1 Connection
2.4.4 Google Privacy Policy Search 5 Free Response
2.4.5 Guess: Password List 1 Example
2.4.6 Guess: Using an Algorithm 1 Example
2.4.7 Guess: Brute Force 1 Example
2.4.8 How Strong is your Password? 1 Connection
2.4.9 How Strong is your password? 5 Free Response
2.5 Information Literacy Lesson
2.5.1 Information Literacy 1 Video
2.5.2 Information Literacy 2 Check for Understanding
2.5.3 Effective Internet Searches 5 Free Response
2.5.4 Evaluate the Source 1 1 Connection
2.5.5 Respond: Evaluate the Source 1 5 Free Response
2.5.6 Evaluate the Source 2 1 Notes
2.5.7 Respond: Evaluate the Source 2 5 Free Response
2.5.8 Hero Pig? 1 Connection
2.5.9 Respond: Hero Pig? 5 Free Response
2.6 Creative Credit & Copyright Lesson
2.6.1 Creative Credit and Copyright 1 Video
2.6.2 Creative Credit and Copyright 2 Check for Understanding
2.6.3 Cite! 5 Free Response
2.6.4 Exploring Creative Commons 1 Connection
2.6.5 Respond: Creative Commons 5 Free Response
2.6.6 Task: Finding Images 5 Free Response
2.6.7 Reflection: Why is Copyright Important? 5 Free Response
2.7 Hacking Ethics Lesson
2.7.1 Hacking Ethics & Legality 1 Video
2.7.2 Hacking Ethics & Legality 4 Check for Understanding
2.7.3 Reflection: White Hat vs Black Hat Hacking 5 Free Response
2.7.4 Penetration Testing 1 Connection
2.7.5 Reflection: Penetration Testing 5 Free Response
2.7.6 Hack the Pentagon? 1 Connection
2.7.7 Reflection: Hack the Pentagon 5 Free Response
2.7.8 Ethical Hacker Agreement 1 Check for Understanding
2.8 Digital Citizenship and Cybersecurity Quiz Lesson
2.8.1 Digital Citizenship and Cyber Hygiene Quiz 20 Unit Quiz
Project: Public Service Announcement
3.1 Project: Public Service Announcement Lesson
3.1.1 Pick a Topic 5 Free Response
3.1.2 Research 5 Free Response
3.1.3 Choose Your Audience 5 Free Response
3.1.4 What kind of PSA? 5 Free Response
3.1.5 Draft your PSA 5 Free Response
3.1.6 Finalize your PSA! 15 Free Response
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis Lesson
4.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
4.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
4.1.3 Cryptogram Game! 1 Example
4.1.4 Why encrypt? 1 Video
4.1.5 Why encrypt? 2 Check for Understanding
4.1.6 Encrypt/Decrypt 1 Example
4.2 History of Cryptography Lesson
4.2.1 Cryptography: A Brief History 1 Video
4.2.2 Cryptography History Quiz 2 Check for Understanding
4.2.3 How the Enigma Worked 1 Connection
4.2.4 How the Enigma Worked 5 Free Response
4.2.5 Unknown Languages and the Future of Cryptography 1 Connection
4.2.6 The Future of Cybersecurity 5 Free Response
4.3 Basic Crypto Systems: Caesar Cipher Lesson
4.3.1 Caesar Cipher 1 Video
4.3.2 Caesar Cipher 2 Check for Understanding
4.3.3 Caesar Cipher Encryption 1 Example
4.3.4 Decrypt Caesar's Cipher! 1 Example
4.4 Basic Crypto Systems: Cracking Caesar Lesson
4.4.1 Cracking Caesar Cipher 1 Video
4.4.2 Cracking Caesar Cipher 2 Check for Understanding
4.4.3 Cracking Caesar with Brute Force 1 Example
4.4.4 Letter Frequency and Caesar 1 Example
4.4.5 Examining Caesar Cipher 5 Free Response
4.5 Basic Crypto Systems: Vigenere Cipher Lesson
4.5.1 Vigenere Cipher 1 Video
4.5.2 Vigenere Cipher 1 Check for Understanding
4.5.3 Vigenere Cipher Example 1 Example
4.5.4 Letter Frequency and Vigenere Cipher 1 Example
4.5.5 Examining Vigenere Cipher 5 Free Response
4.5.6 Improving Vigenere 1 Example
4.6 Hash Functions Lesson
4.6.1 Hash Functions 1 Video
4.6.2 Hash Functions 3 Check for Understanding
4.6.3 Google Shattered Crypto Algorithm 1 Connection
4.6.4 Hash Functions in the News 5 Free Response
4.6.5 What is a Checksum? 5 Video
4.6.6 Using a Hash Generator 1 Connection
4.6.7 Hash Generator 5 Free Response
4.6.8 Password Salting 1 Connection
4.6.9 Password Salting 5 Free Response
4.7 Hash Function Development Lesson
4.7.1 Hash Function Development 1 Video
4.7.2 Hash Function Development 2 Check for Understanding
4.7.3 Modulo Math Calculator 1 Example
4.7.4 Understanding Modulo Math 1 Example
4.7.5 Modulo Game! 1 Example
4.7.6 Develop a Simple Hash Function 5 Exercise
4.8 Digital Certificates Lesson
4.8.1 Symmetric vs Asymmetric Encryption 1 Video
4.8.2 Public-Key Encryption Explorer 5 Notes
4.8.3 Digital Certificates 1 Video
4.8.4 Digital Certificates 4 Check for Understanding
4.8.5 SSL Explained 1 Connection
4.8.6 SSL Explained 5 Free Response
4.8.7 SSL Connection 5 Free Response
4.8.8 In The News 1 Connection
4.8.9 In The News Response 5 Free Response
4.8.10 Become a Certificate Authority! 10 Free Response
4.9 The ABCs of Cryptography Quiz Lesson
4.9.1 The ABCs of Cryptography Quiz 15 Unit Quiz
Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast Lesson
5.1.1 Overview 1 Notes
5.1.2 Investigate a Classic Cipher 1 Notes
5.1.3 Write the Script and Rehearse 5 Free Response
5.1.4 Newscast Presentation 15 Free Response
System Administration
6.1 Operating Systems Lesson
6.1.1 Operating Systems 1 Video
6.1.2 Operating Systems Quiz 5 Check for Understanding
6.1.3 Detect My OS 1 Example
6.1.4 Windows OS Installation Simulation 1 Example
6.1.5 Installing an OS 5 Free Response
6.1.6 Upgrading a Mac OS 1 Connection
6.2 Comparing Operating Systems Lesson
6.2.1 Comparing Operating Systems 1 Video
6.2.2 Comparing Operating Systems Quiz 5 Check for Understanding
6.2.3 Windows Simulation 1 Example
6.2.4 MacOS Simulation 1 Example
6.2.5 Choose a Linux Distro! 1 Connection
6.2.6 Which would you choose? 5 Free Response
6.3 Compatibility Lesson
6.3.1 Compatibility 1 Video
6.3.2 Compatibility Quiz 3 Check for Understanding
6.3.3 What Processor? Windows 1 Example
6.3.4 What Processor? Mac 1 Example
6.3.5 What Processor are you running? 5 Free Response
6.4 Software and Applications Lesson
6.4.1 Software and Applications 1 Video
6.4.2 Software and Applications Quiz 2 Check for Understanding
6.4.3 Spreadsheet Simulation 1 Example
6.4.4 Messaging Simulation 1 Example
6.4.5 Kanban Board Simulation 1 Example
6.4.6 Software Simulations 5 Free Response
6.5 Software Licenses Lesson
6.5.1 Software Licenses 1 Video
6.5.2 Software Licenses Quiz 3 Check for Understanding
6.5.3 Do I need a Software License? 5 Free Response
6.5.4 Is This Original? 5 Free Response
6.6 Application Security Lesson
6.6.1 Application Security 1 Video
6.6.2 Application Security 5 Check for Understanding
6.6.3 Windows Updates 1 Example
6.6.4 Windows Defender Antivirus 1 Connection
6.6.5 Windows Defender Antivirus 5 Free Response
6.6.6 CodeHS System Restore 5 Free Response
6.7 Browser Configuration Lesson
6.7.1 Browser Configuration 1 Video
6.7.2 Browser Configuration 5 Check for Understanding
6.7.3 Cached CodeHS 1 Connection
6.7.4 Cached CodeHS 5 Free Response
6.7.5 Is Your Popup Blocker On? 1 Example
6.7.6 Browser Extensions Lab 5 Free Response
6.8 System Administration Lesson
6.8.1 User Accounts 1 Video
6.8.2 User Accounts Quiz 2 Check for Understanding
6.8.3 User Accounts 5 Free Response
6.8.4 Shared Folders and Files 5 Free Response
6.8.5 Host Security 1 Video
6.8.6 Host Security Quiz 3 Check for Understanding
6.8.7 Security Baseline 5 Free Response
6.9 Command Line Interface Lesson
6.9.1 Linux/MacOS vs. Windows 1 Notes
6.9.2 Command Line Interface 1 Video
6.9.3 Command Line Interface Quiz 5 Check for Understanding
6.9.4 Command Equivalents 1 Resource
6.9.5 Windows Command Prompt 1 Video
6.9.6 Windows Command Prompt 5 Free Response
6.9.7 Directory Directions 5 Free Response
6.9.8 Neural Interface? 1 Connection
6.9.9 Neural Interface? 5 Free Response
6.10 System Administration Quiz Lesson
6.10.1 Mindsets 1 Survey
6.10.2 System Administration Quiz 20 Unit Quiz
Software Security
7.1 Clients and Servers Lesson
7.1.1 Clients and Servers 1 Video
7.1.2 Clients and Servers 2 Check for Understanding
7.1.3 Inside a Google Data Center 1 Connection
7.1.4 Inside a Google Data Center 5 Free Response
7.1.5 Cloud Vulnerabilities 1 Connection
7.1.6 Cloud Vulnerabilities Response 5 Free Response
7.1.7 Client-Server Model 1 Video
7.1.8 Client-Server Model 2 Check for Understanding
7.1.9 The Future of User Privacy 1 Connection
7.1.10 The Future of User Privacy 5 Free Response
7.2 What is SQL? Lesson
7.2.1 What is SQL Overview 1 Notes
7.2.2 Intro to SQL 1 Video
7.2.3 Quiz: What is SQL? 1 Check for Understanding
7.2.4 How to Structure Data in SQL 1 Video
7.2.5 How to Structure Data in SQL 3 Check for Understanding
7.2.6 SQL Tables 1 Example
7.2.7 SQL Tables Response 5 Free Response
7.3 Basic Querying in SQL Lesson
7.3.1 The SELECT Statement 1 Video
7.3.2 Basic Querying in SQL 1 Check for Understanding
7.3.3 Our First SELECT Statement 1 Example
7.3.4 Your First SELECT Statement 5 Exercise
7.3.5 More SELECT Statement 1 Video
7.3.6 More SELECT Statement 1 Check for Understanding
7.3.7 Selecting Specific Columns 1 Example
7.3.8 Harry Potter Names 5 Exercise
7.4 Common Security Problems Lesson
7.4.1 Common Security Problems 1 Video
7.4.2 Common Security Problems 1 Check for Understanding
7.4.3 Meet Security Engineers at Google 1 Connection
7.4.4 Security Engineering Reflection 5 Free Response
7.4.5 Living in a Digital World 1 Video
7.4.6 Living in a Digital World 5 Free Response
7.5 SQL Injection Overview Lesson
7.5.1 SQL Injection Overview 1 Video
7.5.2 SQL Injection Overview 2 Check for Understanding
7.5.3 Equifax Security Breach 1 Connection
7.5.4 Equifax Exposed Millions 1 Connection
7.5.5 Equifax SQL Injection Attack 5 Free Response
7.5.6 SQLi 1 Example
7.6 Types of SQLi and Prevention Lesson
7.6.1 Types of SQLi 1 Video
7.6.2 Types of SQLi 3 Check for Understanding
7.6.3 Preventing SQLi 1 Video
7.6.4 Preventing SQLi 2 Check for Understanding
7.6.5 Mitigating SQL Injection 1 Connection
7.6.6 Reflection: Mitigating SQL Injection 5 Free Response
7.6.7 SQL Injection 1 Connection
7.7 Software Security Quiz Lesson
7.7.1 Software Security Quiz 15 Unit Quiz
Networking Fundamentals
8.1 Introduction to the Internet Lesson
8.1.1 Welcome to the Internet 1 Video
8.1.2 Intro to the Internet 3 Check for Understanding
8.1.3 Inside Facebook's Connectivity Lab 1 Connection
8.1.4 Connectivity Lab Reflection 5 Free Response
8.2 Notational Systems Lesson
8.2.1 Number Systems 1 Video
8.2.2 Number Systems Quiz 2 Check for Understanding
8.2.3 Number Base Tool 1 Notes
8.2.4 Decimal to Binary 1 Video
8.2.5 Decimal to Binary Quiz 3 Check for Understanding
8.2.6 Binary Game 5 Exercise
8.3 Data Representation Lesson
8.3.1 Hexadecimal 1 Video
8.3.2 Hexadecimal Quiz 2 Check for Understanding
8.3.3 Binary to Hex Game 5 Exercise
8.3.4 Encoding Text with Binary 1 Video
8.3.5 Encoding Text with Binary Quiz 2 Check for Understanding
8.3.6 Custom Encoding 1 Example
8.3.7 Bits to ASCII 1 Example
8.3.8 Hello World in Bits 5 Exercise
8.4 Internet Hardware and Sending Information Lesson
8.4.1 Internet Hardware 1 Video
8.4.2 Internet Hardware 2 Check for Understanding
8.4.3 Sending Information 1 Video
8.4.4 Sending Information 3 Check for Understanding
8.4.5 The Internet is in the Ocean 1 Connection
8.4.6 Internet in the Ocean Reflection 5 Free Response
8.5 Internet Addresses Lesson
8.5.1 Internet Addresses 1 Video
8.5.2 Internet Addresses 2 Check for Understanding
8.5.3 The Need for Addresses 5 Free Response
8.5.4 IPv4 vs. IPv6 1 Connection
8.5.5 Reflection: IPv4 vs IPv6 5 Free Response
8.6 Domain Name System (DNS) Lesson
8.6.1 Domain Name System (DNS) 1 Video
8.6.2 Domain Name System 2 Check for Understanding
8.6.3 How Does DNS Work? 1 Connection
8.6.4 How Does DNS Work? 5 Free Response
8.7 Routing Lesson
8.7.1 Routing 1 Video
8.7.2 Routing 3 Check for Understanding
8.7.3 Redundancy 5 Free Response
8.8 Packets & Protocols Lesson
8.8.1 Packets 1 Video
8.8.2 Packets 2 Check for Understanding
8.8.3 Protocols 1 Video
8.8.4 Protocols 3 Check for Understanding
8.8.5 How the Internet Works 1 Connection
8.8.6 The Journey of an Image 5 Free Response
8.9 Protocols and Standards Lesson
8.9.1 Protocols 1 Video
8.9.2 Protocols Quiz 3 Check for Understanding
8.9.3 Standards 1 Video
8.9.4 Standards Quiz 2 Check for Understanding
8.9.5 The New Wireless Standard 1 Connection
8.9.6 801.11ax 1 Connection
8.9.7 801.11ax FR 5 Free Response
8.10 Viewing a Webpage Lesson
8.10.1 Viewing a Webpage 1 Video
8.10.2 Viewing a Webpage 2 Check for Understanding
8.10.3 Explaining a URL 5 Free Response
8.10.4 Net Neutrality Explained 1 Connection
8.10.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
8.10.6 Take a Side on Net Neutrality 5 Free Response
8.10.7 Net Neutrality and Cybersecurity 1 Connection
8.10.8 Net Neutrality and Cybersecurity Research 5 Free Response
8.11 Access Control Lesson
8.11.1 Access Control 1 Video
8.11.2 Access Control 4 Check for Understanding
8.11.3 Multifactor Authentication 1 Example
8.11.4 Two Factor Authentication 1 Example
8.11.5 Two Factor Authentication Reflection 5 Free Response
8.11.6 RADIUS Overview with AAA Protocol 1 Connection
8.11.7 RADIUS Server Access Control 1 Connection
8.11.8 RADIUS Reflection 5 Free Response
8.12 Impact of the Internet Lesson
8.12.1 Impact of the Internet 1 Video
8.12.2 Impact of the Internet 3 Check for Understanding
8.12.3 What is the Digital Divide? 1 Connection
8.12.4 What is the Digital Divide? 5 Free Response
8.13 Networking Fundamentals Quiz Lesson
8.13.1 Mindsets 1 Survey
8.13.2 Networking Fundamentals Quiz 15 Unit Quiz
IT Infrastructure
9.1 Internal Components Lesson
9.1.1 Internal Components 1 Video
9.1.2 Internal Components 5 Check for Understanding
9.1.3 Build a Computer 1 Connection
9.1.4 Build a Computer 5 Free Response
9.1.5 Test Your Brain's RAM! 1 Example
9.1.6 Test Your Brain's RAM! Reflection 5 Free Response
9.2 Peripheral Devices Lesson
9.2.1 Peripheral Devices 1 Video
9.2.2 Peripheral Devices 5 Check for Understanding
9.2.3 Personalized Peripherals 5 Free Response
9.2.4 IT Help 5 Free Response
9.2.5 Your Ideal Computer Setup 5 Free Response
9.3 Network Devices Lesson
9.3.1 Network Devices 1 Video
9.3.2 Network Devices 5 Check for Understanding
9.3.3 Speed Test 1 Connection
9.3.4 Speed Test 5 Free Response
9.3.5 Fiber Optics Bend Light! 1 Connection
9.3.6 Fiber Optics Bend Light! 5 Free Response
9.3.7 Ethernet Standards 1 Connection
9.3.8 Ethernet Standards 5 Free Response
9.3.9 Network Troubleshooting 5 Free Response
9.4 Storage Options Lesson
9.4.1 Storage Options 1 Video
9.4.2 Storage Options Quiz 5 Check for Understanding
9.4.3 Security of Cloud Storage 1 Connection
9.4.4 Security of Cloud Storage 5 Free Response
9.4.5 Storage Suggestions 5 Free Response
9.5 Network Options Lesson
9.5.1 Network Options 1 Video
9.5.2 Network Options Quiz 5 Check for Understanding
9.5.3 What is an SSID? 1 Connection
9.5.4 What is an SSID? 5 Free Response
9.5.5 Wireless Threats 1 Connection
9.5.6 Wireless Threats 5 Free Response
9.5.7 Wireless Network Setup 5 Free Response
9.6 Network Communication Lesson
9.6.1 Network Communication 1 Video
9.6.2 Network Communication Quiz 2 Check for Understanding
9.6.3 Setting up a Firewall 1 Example
9.6.4 iptables 5 Free Response
9.6.5 iptables simulation 1 Notes
9.7 Network Management Lesson
9.7.1 Linux/MacOS vs. Windows 1 Notes
9.7.2 Network Management 1 Video
9.7.3 Network Management Quiz 3 Check for Understanding
9.7.4 MacOS Terminal Simulation 1 Example
9.7.5 Windows Command Prompt Simulation 1 Example
9.7.6 Windows Command Prompt Spy 5 Video
9.7.7 Windows Command Prompt Spy 5 Free Response
9.8 Private Networks Lesson
9.8.1 IP and MAC Addresses 1 Video
9.8.2 IP and MAC Addresses Quiz 2 Check for Understanding
9.8.3 Intranet Permissions 1 Example
9.8.4 Coffee Shop: Design an Intranet 5 Free Response
9.8.5 DMZs and VPNs 1 Video
9.8.6 DMZs and VPNs Quiz 3 Check for Understanding
9.8.7 Protecting Privacy with VPNs 1 Connection
9.8.8 Protecting Privacy with VPNs 5 Free Response
9.8.9 Coffee Shop: Network Plan 5 Free Response
9.8.10 Coffee Shop: Network Diagram 5 Free Response
9.8.11 SOHO Network 1 Video
9.8.12 Network Topologies 1 Example
9.9 IT Infrastructure Quiz Lesson
9.9.1 IT Infrastructure Quiz 20 Unit Quiz
Project: Troubleshooting
10.1 Methodology Lesson
10.1.1 Troubleshooting Methodology 1 Notes
10.1.2 Identify the Problem 5 Free Response
10.1.3 Research Solutions 5 Free Response
10.1.4 Establish a Theory 5 Free Response
10.1.5 Test the Theory 5 Free Response
10.1.6 Fix the Problem! 5 Free Response
10.2 Support Practice Lesson
10.2.1 Signal Strength 10 Exercise
10.2.2 Interference 10 Exercise
Project: IT Professional
11.1 Building a Resume Lesson
11.1.1 What is a Resume? 5 Connection
11.1.2 What is a Resume? 5 Free Response
11.1.3 Explore Resume Layouts 5 Connection
11.1.4 Explore Resume Layouts 5 Free Response
11.1.5 Draft Your Resume 5 Free Response
11.2 Communication is Key! Lesson
11.2.1 Do you have what it takes? 5 Notes
11.2.2 Cybersecurity Careers 5 Free Response
11.2.3 Internships Exploration 5 Free Response
11.2.4 Customer Service Skills 1 Connection
11.2.5 Customer Service Skills 5 Free Response
11.2.6 Act it Out! 15 Free Response
11.3 Building a Knowledge Base Lesson
11.3.1 What is a Knowledge Base? 1 Connection
11.3.2 Draft a KB Article 5 Free Response
11.3.3 Share your KB Article 5 Free Response
11.3.4 Finalize your KB Article 15 Free Response
11.4 Star in a Video! Lesson
11.4.1 Instructional Videos 1 Connection
11.4.2 Instructional Video Plan 5 Free Response
11.4.3 Write the Script 5 Free Response
11.4.4 Create the Storyboard 5 Free Response
11.4.5 Record Your Video 5 Free Response
Project: Digital Forensics
12.1 Digital Forensics Lesson
12.1.1 Digital Forensics 1 Video
12.1.2 Student Success Story 1 Connection
12.1.3 Student Success Story Response 5 Free Response
12.2 Forensic Case 1: Logs Lesson
12.2.1 Network Logs 1 Notes
12.2.2 Network Log Evidence 1 Example
12.2.3 Network Logs Conclusion 5 Free Response
12.3 Forensic Case 2: File Metadata Lesson
12.3.1 File Metadata 1 Notes
12.3.2 File Metadata Evidence 1 Example
12.3.3 File Metadata Conclusion 5 Free Response
12.4 Forensic Case 3: Exif Data Lesson
12.4.1 Photo Exif 1 Notes
12.4.2 Exif Using Inspector 1 Connection
12.4.3 Exif Using the CLI 1 Example
12.4.4 Photo Exif Conclusion 5 Free Response
Cyber Defense
13.1 Network Attacks Lesson
13.1.1 Network Attacks Overview 1 Video
13.1.2 Network Attacks Quiz 4 Check for Understanding
13.1.3 Check for Vulnerabilities 1 Notes
13.1.4 Bug Bounty Hunting 1 Connection
13.1.5 Bug Bounty Hunting 5 Free Response
13.1.6 Common Port Targets 1 Connection
13.1.7 Port Scanner Simulation 1 Example
13.1.8 Open Port Reflection 5 Free Response
13.2 Malware Types and Prevention Lesson
13.2.1 Malware Types and Prevention 1 Video
13.2.2 Malware Types and Prevention 5 Check for Understanding
13.2.3 How Anti-malware Works 1 Connection
13.2.4 How Anti-malware Works 5 Free Response
13.2.5 OS Malware Security 5 Free Response
13.2.6 Reverse Engineering Malware 5 Free Response
13.2.7 Cyberterrorism 1 Connection
13.2.8 Cyberterrorism Response 5 Free Response
13.3 Common Network Attacks Lesson
13.3.1 Common Network Attacks 1 Video
13.3.2 Network Attacks 3 Check for Understanding
13.3.3 Social Engineering Hack 1 Connection
13.3.4 Social Engineering Reflection 5 Free Response
13.3.5 DDoS Attacks 1 Connection
13.3.6 DDoS Simulation 1 Example
13.3.7 DDoS Reflection 5 Free Response
13.4 Additional Attacks Lesson
13.4.1 Additional Attacks 1 Video
13.4.2 Additional Attacks Quiz 5 Check for Understanding
13.4.3 Botnet Attacks - Mirai 1 Connection
13.4.4 Botnet Attacks - 3ve 1 Connection
13.4.5 Botnet Attacks - 3ve Video 1 Connection
13.4.6 Botnet Attacks - Reflection 5 Free Response
13.4.7 Zero-day Exploit: Stuxnet 5 Connection
13.4.8 Zero-day Exploit: Stuxnet 5 Notes
13.4.9 Zero-day Exploit Reflection 5 Free Response
13.4.10 US-CERT Current Activity 5 Free Response
13.5 Cross-site Scripting Lesson
13.5.1 Cross-site Scripting 1 Video
13.5.2 Cross-site Scripting 2 Check for Understanding
13.5.3 XSS Bug in Yahoo Mail 1 Connection
13.5.4 XSS Bug in Yahoo Mail 5 Free Response
13.5.5 XSS Demo Overview 1 Notes
13.5.6 Hacksplaining XSS Demo 1 Connection
13.5.7 Google's Tutorial for XSS 1 Connection
13.5.8 XSS Reflection 5 Free Response
13.6 Internal Threats Lesson
13.6.1 Internal Threats 1 Video
13.6.2 Internal Threats 5 Check for Understanding
13.6.3 BIOS/UEFI Attack Example 1 Connection
13.6.4 Accessing BIOS/UEFI 1 Notes
13.6.5 Causes of Data Breaches 5 Connection
13.6.6 Causes of Data Breaches 5 Free Response
13.6.7 Protecting Data at All Times 1 Connection
13.6.8 Protecting Data at All Times 5 Free Response
13.6.9 Air Gapped Computers 1 Connection
13.6.10 Air Gapped Computers Response 5 Free Response
13.7 Cyber Defense Quiz Lesson
13.7.1 Cyber Defense Quiz 20 Unit Quiz
Project: Put it in Writing!
14.1 Level 1: Entry Event Lesson
14.1.1 Company Development 5 Free Response
14.1.2 Level 1: Attack! 5 Free Response
14.1.3 Level 1: Project Overview 1 Video
14.1.4 Put It In Writing! Rubric 5 Connection
14.2 Level 2: User Training Lesson
14.2.1 User Training Policy Development 5 Free Response
14.2.2 Challenge: Employee Negligence 1 5 Free Response
14.2.3 Challenge: Employee Negligence 2 5 Free Response
14.2.4 Level 2 Debrief 5 Free Response
14.3 Level 3: Incident Response Lesson
14.3.1 Incident Response Plan Template 5 Connection
14.3.2 Incident Response Plan Link 5 Free Response
14.3.3 Challenge: Cyber Attack! 5 Free Response
14.3.4 Level 3 Debrief 5 Free Response
14.4 Level 4: Data and Licenses Lesson
14.4.1 Data and Licenses 5 Video
14.4.2 FTC Data Security Guide 5 Connection
14.4.3 Data Policy Template 5 Connection
14.4.4 Data Policy Link 5 Free Response
14.4.5 Challenge: Data Breach 1 5 Free Response
14.4.6 Challenge: Data Breach 2 5 Free Response
14.4.7 Challenge: Data Breach 3 5 Free Response
14.4.8 Level 4 Debrief 5 Free Response
14.5 Level 5: Change Management Lesson
14.5.1 Change Management 5 Video
14.5.2 Change Management Plan 5 Connection
14.5.3 Change Management Plan Link 5 Free Response
Risk Management
15.1 Identifying Risks Lesson
15.1.1 Identifying Risks 1 Video
15.1.2 Identifying Risks Quiz 5 Check for Understanding
15.1.3 What is a Honeypot? 1 Connection
15.1.4 Honeypot Attacks 1 Connection
15.1.5 Honeypot Attacks 5 Free Response
15.1.6 Whois 1 Connection
15.1.7 Whois 5 Free Response
15.1.8 Packet Sniffing 1 Connection
15.1.9 Packet Sniffing Response 5 Free Response
15.1.10 Breach Trends 5 Free Response
15.2 Assessing Risks Lesson
15.2.1 Assessing Risks 1 Notes
15.2.2 Malware Risk Assessment 5 Free Response
15.2.3 Poor Password Assessment 5 Free Response
15.2.4 Social Engineering Assessment 5 Free Response
15.2.5 Assessing Risks 1 Video
15.2.6 Assessing Risks Quiz 5 Check for Understanding
15.2.7 End-of-Life OS 1 Connection
15.2.8 End-of-Life Proposal 5 Free Response
15.2.9 Input Handling 1 Example
15.2.10 Input Handling Responses 5 Free Response
15.2.11 Input Validation 1 Example
15.2.12 Input Validation Responses 5 Free Response
15.3 Risk Response Lesson
15.3.1 Risk Response 1 Video
15.3.2 Risk Response 5 Check for Understanding
15.3.3 Defense in Depth Risk Mitigation 5 Free Response
15.3.4 Sample Risk Assessment Report 5 Connection
15.3.5 Sample Risk Assessment Reflection 5 Free Response
15.3.6 Delta Outage Video 5 Connection
15.3.7 Delta Outage Reflection 5 Free Response
15.3.8 What Happens When Your Servers Go Down 5 Connection
15.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
15.3.10 Server Upgrade Memo 5 Free Response
15.4 Penetration Testing Lesson
15.4.1 Penetration Testing 1 Video
15.4.2 Penetration Testing 5 Check for Understanding
15.4.3 Penetration Test Report 5 Connection
15.4.4 Penetration Test Report 5 Free Response
15.4.5 Chaos Engineering 5 Notes
15.4.6 Chaos Engineering Reflection 5 Free Response
15.4.7 Pen Test Simulation Handout 5 Resource
15.4.8 Pen Test Simulation: Active Recon 5 Exercise
15.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
15.5 Risk Management Quiz Lesson
15.5.1 Risk Management Quiz 20 Unit Quiz
Project: The Game of Risk
16.1 The Game of Risk Lesson
16.1.1 Group Project Intro 1 Notes
16.1.2 Brainstorm: SLE 5 Free Response
16.1.3 Brainstorm: Materials 5 Free Response
16.1.4 Prototype Game and Instructions 5 Free Response
16.1.5 Test Your Game! 5 Free Response
16.1.6 Testing Feedback Form 1 Resource
16.1.7 Create Your Final Version! 20 Free Response
Final Exam
17.1 Final Exam Lesson
17.1.1 Final Exam 25 Final
Introduction to Cybersecurity Pretest
18.1 Introduction to Cybersecurity Pretest Lesson
18.1.1 About the Pretest 1 Notes
18.1.2 Mindsets 1 Survey
18.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Introduction to Cybersecurity Posttest
19.1 Introduction to Cybersecurity Posttest Lesson
19.1.1 About the Posttest 1 Notes
19.1.2 Mindsets 1 Survey
19.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Programming Fundamentals
20.1 Programming Concepts Lesson
20.1.1 Programming Concepts 1 Video
20.1.2 Programming Concepts Quiz 5 Check for Understanding
20.1.3 Compilers vs. Interpreters 1 Connection
20.1.4 Compilers vs. Interpreters 5 Free Response
20.1.5 Variables in Action 1 Example
20.1.6 Data Types using Typeof 1 Example
20.1.7 Basic Variables 1 Example
20.1.8 Daily Activities 5 Exercise
20.2 Programming with Karel Lesson
20.2.1 Learning to Program 1 Notes
20.2.2 Programming With Karel 1 Video
20.2.3 Quiz: Karel Commands 1 Check for Understanding
20.2.4 Our First Karel Program 1 Example
20.2.5 Your First Karel Program 5 Exercise
20.2.6 Functions in Karel 1 Video
20.2.7 Functions in Karel Quiz 1 Check for Understanding
20.2.8 Turn Around 1 Example
20.2.9 Digging Karel 1 Example
20.2.10 Backflip 5 Exercise
20.3 Looping Lesson
20.3.1 For Loops 1 Video
20.3.2 For Loops Quiz 1 Check for Understanding
20.3.3 Take 'em All 1 Example
20.3.4 For Loop Square 1 Example
20.3.5 Lots of Hurdles 5 Exercise
20.3.6 While Loops in Karel 1 Video
20.3.7 While Loops in Karel Quiz 2 Check for Understanding
20.3.8 Move to Wall 1 Example
20.3.9 Big Tower 1 Example
20.3.10 Follow The Yellow Ball Road 5 Exercise
20.4 Branching Lesson
20.4.1 If/Else Statements 1 Video
20.4.2 If/Else Statements Quiz 2 Check for Understanding
20.4.3 If/Else Statements 1 Example
20.4.4 One Ball in Each Spot 1 Example
20.4.5 Right Side Up 5 Exercise
20.4.6 Programming with Karel Badge 5 Badge
20.5 Arrays and Objects Lesson
20.5.1 More JS Topics 1 Notes
20.5.2 Arrays and Objects 1 Video
20.5.3 Arrays and Objects 5 Check for Understanding
20.5.4 Making an Array 1 Example
20.5.5 List of Places to Travel 5 Exercise
20.5.6 List of Prime Numbers 5 Exercise
20.5.7 Phonebook 1 Example
20.5.8 Sidekicks 5 Exercise
20.6 Organizational Techniques Lesson
20.6.1 Organizational Techniques 1 Video
20.6.2 Organizational Techniques Quiz 4 Check for Understanding
20.6.3 Hurdle Karel 1 Example
20.6.4 One Ball in Each Spot 5 Exercise
20.6.5 The Two Towers 5 Exercise
20.6.6 Interactive Sequence Diagram 1 Example
20.7 Programming Fundamentals Quiz Lesson
20.7.1 Mindsets 1 Survey
20.7.2 Programming Fundamentals Quiz 15 Unit Quiz
Cryptocurrency
21.1 What is Currency? Lesson
21.1.1 What is Currency? 1 Video
21.1.2 What is Currency? 2 Check for Understanding
21.1.3 What Gives Paper Money Its Actual Value 1 Connection
21.1.4 What Gives Money Its Value 5 Free Response
21.1.5 Money: What is it Good For? 1 Resource
21.2 What is Cryptocurrency? Lesson
21.2.1 Cryptocurrency Basics 1 Video
21.2.2 Cryptocurrency Basics 5 Check for Understanding
21.2.3 Cryptocurrency Module Overview 1 Video
21.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
21.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
21.2.6 Show Me the Money 1 Resource
21.2.7 American Currency Exhibit 5 Free Response
21.3 Intro to Blockchain Lesson
21.3.1 Intro to Blockchain 1 Video
21.3.2 Intro to Blockchain 3 Check for Understanding
21.3.3 CryptoKitties 1 Connection
21.3.4 CryptoKitties 5 Free Response
21.4 Hashing Lesson
21.4.1 Hashing 1 Video
21.4.2 Hashing 3 Check for Understanding
21.4.3 SHA256 Hash Generator 1 Connection
21.4.4 Using the SHA256 Hash Generator 5 Free Response
21.5 Proof of Work Lesson
21.5.1 Proof of Work 1 Video
21.5.2 Proof of Work 3 Check for Understanding
21.5.3 Mining the Block 1 Video
21.5.4 Mining the Block 3 Check for Understanding
21.5.5 PoW vs. Proof of Stake 1 Connection
21.5.6 PoW vs. PoS 5 Free Response
21.5.7 Checking Proof of Work 1 Resource
21.6 Advanced Blockchain Lesson
21.6.1 Advanced Blockchain (part 1) 1 Video
21.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
21.6.3 Blockchain Buzz 1 Connection
21.6.4 Blockchain Buzz 5 Free Response
21.6.5 Advanced Blockchain (part 2) 1 Video
21.6.6 Advanced Blockchain (part 2) 5 Free Response
21.6.7 Make a Blockchain 1 Resource
21.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
21.7 Cryptocurrencies Lesson
21.7.1 Cryptocurrencies 1 Video
21.7.2 Cryptocurrencies 3 Check for Understanding
21.7.3 Shiny Toy Phenomenon 5 Free Response
21.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
21.7.5 Walmart Use of Blockchain 5 Free Response
21.8 Bitcoin Lesson
21.8.1 Bitcoin 1 Video
21.8.2 Bitcoin 3 Check for Understanding
21.8.3 51% Attack Explained 1 Connection
21.8.4 51% Attack 5 Free Response
21.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
21.8.6 Bitcoin Bust 5 Free Response
21.8.7 Explore the Bitcoin Blockchain 1 Resource
21.9 Pros, Cons, and Future of Cryptocurrencies Lesson
21.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
21.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
21.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
21.9.4 Cryptocurrency Pros and Cons 1 Connection
21.9.5 Crypto Pros and Cons 5 Free Response
21.9.6 What is HODL? 1 Connection
21.9.7 What is HODL? 5 Free Response
21.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
21.10 Project: Cryptocurrency Expert Panel Talk Lesson
21.10.1 Overview 5 Free Response
21.10.2 Preview Sample Expert Panels 5 Free Response
21.10.3 Investigate a Cryptocurrency Topic 5 Free Response
21.10.4 Write an Outline and Rehearse 5 Free Response
21.10.5 Expert Panel Talk (Presentation) 5 Free Response
21.11 Cryptocurrency Quiz Lesson
21.11.1 Cryptocurrency Quiz 10 Unit Quiz
21.11.2 Cryptocurrency Badge 0 Badge
Final Course Project
22.1 Final Course Project Lesson
22.1.1 Choose Your Own Adventure 1 Notes
22.1.2 Choose Your Adventure 5 Free Response
22.1.3 Research 5 Free Response
22.1.4 Choose Your Target Audience 5 Free Response
22.1.5 Draft Your Presentation 5 Free Response
22.1.6 Draft Your Flyer 5 Free Response
22.1.7 Make Your Presentation with Handout! 5 Free Response
SQL Part II: The SQL
23.1 More Filtering Practice Lesson
23.1.1 Initials 5 Exercise
23.1.2 Compound Queries with BETWEEN 5 Exercise
23.1.3 Gryffindors With G Names 5 Exercise
23.1.4 R First Names 5 Exercise
23.1.5 FF Houses 5 Exercise
23.2 Ordering Results Lesson
23.2.1 The ORDER BY Keyword 1 Video
23.2.2 ORDER BY 1 Notes
23.2.3 ORDER BY First Name 1 Example
23.2.4 Reverse Order 1 Example
23.2.5 Order By Multiple Fields 1 Example
23.2.6 House Ordering 5 Exercise
23.2.7 Sort the P Names 5 Exercise
23.3 Renaming Fields Lesson
23.3.1 Renaming Fields with AS 1 Notes
23.3.2 Renaming in the House Table 1 Example
23.3.3 Changing Column Names 5 Exercise
23.4 Joining Tables Lesson
23.4.1 The JOIN command 1 Video
23.4.2 Basic Joining 1 Notes
23.4.3 Letters and Numbers 1 Example
23.4.4 Person and House 1 Example
23.4.5 Person and House (Correct) 1 Example
23.4.6 Person and House (with namespacing) 1 Example
23.4.7 List All Gryffindors 5 Exercise
23.4.8 JOIN With Yourself 1 Video
23.4.9 Renaming Tables 1 Notes
23.4.10 Quidditch Matchups 1 Example
23.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
23.5 More Joining Tables Lesson
23.5.1 The Course Table 1 Example
23.5.2 Courses and Professors 5 Exercise
23.5.3 Courses, Professors, and Houses 5 Exercise
23.5.4 Courses Taught By Gryffindors 5 Exercise
23.5.5 The Enrollment Table 1 Example
23.5.6 Students Taking Potions 5 Exercise
23.5.7 Non-Slytherins Taking Potions 5 Exercise
23.5.8 Defense Students by House 5 Exercise
23.5.9 Neville's Courses 5 Exercise
Web Development
24.1 Introduction to HTML Lesson
24.1.1 Introduction to HTML 1 Video
24.1.2 Introduction to HTML Quiz 1 Check for Understanding
24.1.3 Our First HTML Page 1 Example
24.1.4 Say Hello! 5 Exercise
24.2 Structure of an HTML Page Lesson
24.2.1 Structure of an HTML Page 1 Video
24.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
24.2.3 HTML Template 1 Example
24.2.4 Hello World Page 1 Example
24.2.5 The <title> Tag 5 Exercise
24.2.6 Your First HTML Page 5 Exercise
24.2.7 Structure Badge 1 Badge
24.3 Formatting Text Lesson
24.3.1 Formatting Text 1 Video
24.3.2 Formatting Text Quiz 1 Check for Understanding
24.3.3 Dictionary 1 Example
24.3.4 That's Bold 5 Exercise
24.3.5 Artificial Intelligence 5 Exercise
24.3.6 State Capitals 5 Exercise
24.4 Links Lesson
24.4.1 Links 1 Video
24.4.2 Links Quiz 1 Check for Understanding
24.4.3 The <a> Tag 1 Example
24.4.4 Simple Link 5 Exercise
24.4.5 My Favorite Websites 5 Exercise
24.5 Images Lesson
24.5.1 Images 1 Video
24.5.2 Images Quiz 1 Check for Understanding
24.5.3 The <img> Tag 1 Example
24.5.4 Building the CodeHS Homepage 1 Example
24.5.5 Collage on a Theme 5 Exercise
24.5.6 Linking an Image 5 Exercise
24.5.7 Personal Library 5 Exercise
24.5.8 Images Badge 1 Badge
24.6 HTML Lists Lesson
24.6.1 HTML Lists 1 Video
24.6.2 HTML Lists Quiz 1 Check for Understanding
24.6.3 Grocery Shopping 1 Example
24.6.4 Favorite Things 5 Exercise
24.6.5 To-Do List 5 Exercise
24.6.6 List Article 5 Exercise
24.7 HTML Tables Lesson
24.7.1 HTML Tables 1 Video
24.7.2 HTML Tables Quiz 3 Check for Understanding
24.7.3 Address Book 1 Example
24.7.4 Favorite Songs 5 Exercise
24.7.5 Calendar 5 Exercise
24.8 HTML Styling Lesson
24.8.1 HTML Styling 1 Video
24.8.2 HTML Styling Quiz 1 Check for Understanding
24.8.3 Stylish Address Book 1 Example
24.8.4 Background Colors 5 Exercise
24.8.5 Style Your To-Do List 5 Exercise
24.9 Introduction to CSS Lesson
24.9.1 Introduction to CSS 1 Video
24.9.2 Introduction to CSS Quiz 2 Check for Understanding
24.9.3 Styling Your H1s 1 Example
24.9.4 First Style with CSS 5 Exercise
24.9.5 List Styling 5 Exercise
24.10 CSS Select by Tag Lesson
24.10.1 CSS Select by Tag 1 Video
24.10.2 CSS Select by Tag Quiz 1 Check for Understanding
24.10.3 Rainbow 1 Example
24.10.4 Dog Styling 1 Example
24.10.5 Restaurant Menu 5 Exercise
24.10.6 Put Karel Together 5 Exercise
24.11 CSS Select by Class Lesson
24.11.1 CSS Select by Class 1 Video
24.11.2 CSS Select by Class Quiz 1 Check for Understanding
24.11.3 Simple Checkerboard 1 Example
24.11.4 Tic Tac Toe 5 Exercise
24.11.5 Music Library 5 Exercise
24.12 CSS Select by ID Lesson
24.12.1 CSS Select by ID 1 Video
24.12.2 CSS Select by ID Quiz 1 Check for Understanding
24.12.3 Logo 1 Example
24.12.4 Favorite Dog 5 Exercise
24.12.5 Bingo 5 Exercise
24.12.6 CSS Badge 1 Badge
24.13 Viewing Websites Lesson
24.13.1 Viewing Websites 1 Video
24.13.2 Viewing Websites Quiz 5 Check for Understanding
24.13.3 Explaining a URL 5 Free Response
24.14 Web Development Quiz Lesson
24.14.1 Web Development Quiz 15 Unit Quiz
24.15 Your First Website Lesson
24.15.1 Set Up Your codehs.me Website 10 Challenge
24.15.2 Practice PT: Your First Website 10 Challenge
24.15.3 Website Badge 1 Badge
Midterm
25.1 Midterm Lesson
25.1.1 Midterm 15 Midterm
Extra
26.1 Lesson 1 Lesson
26.1.1 Compound Queries 5 Example
Embedded Correlations
27.1 Embedded Correlations Lesson
27.1.1 Embedded Correlations 5 Article
Cybersecurity Level 1 Certification Practice
28.1 Cybersecurity Essentials Lesson
28.1.1 Quiz: Cybersecurity Essentials 8 Quiz
28.1.2 Cybersecurity Essentials Reflection 5 Notes
28.2 Cryptography Lesson
28.2.1 Quiz: Cryptography 8 Quiz
28.2.2 Cryptography Reflection 5 Notes
28.3 System Administration Lesson
28.3.1 Quiz: System Administration 8 Quiz
28.3.2 System Administration Reflection 5 Notes
28.4 IT Concepts Lesson
28.4.1 Quiz: IT Infrastructure 8 Quiz
28.4.2 IT Concepts Reflection 5 Notes
28.5 IT Infrastructure Lesson
28.5.1 Quiz: Cybersecurity Essentials 3 Quiz
28.5.2 IT Infrastructure Reflection 5 Notes
28.6 Digital Safety and Data Security Lesson
28.6.1 Quiz: Digital Safety and Data Security 8 Quiz
28.6.2 Digital Safety and Data Security Reflection 5 Notes
28.7 Mixed Practice Test Lesson
28.7.1 Important Note 5 Notes
28.7.2 Mixed Practice 20 Quiz
28.7.3 Mixed Practice Reflection 5 Notes