Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
What is Cybersecurity?
1.1 Module Overview - Cybersecurity Lesson
1.1.1 Welcome to Cybersecurity 1 Video
1.1.2 Welcome to Cybersecurity 2 Check for Understanding
1.1.3 Intruder Alert! 1 Example
1.1.4 Cybersecurity and You 5 Free Response
1.1.5 Course Goals 5 Free Response
1.2 What is Cybersecurity? Lesson
1.2.1 What is Cybersecurity? 1 Video
1.2.2 What is Cybersecurity? 3 Check for Understanding
1.2.3 WannaCry Ransomware Attack 1 Connection
1.2.4 WannaCry Reflection 5 Free Response
1.2.5 Ransomware Simulator 1 Example
1.2.6 Internet of Things 1 Connection
1.2.7 Cybersecurity and Connected Cars 1 Connection
1.2.8 Internet of Things Reflection 5 Free Response
1.3 Impact of Cybersecurity Lesson
1.3.1 Impact of Cybersecurity 1 Video
1.3.2 Impact of Cybersecurity 2 Check for Understanding
1.3.3 Phishing Simulator 1 Example
1.3.4 Yahoo! Attack 1 Connection
1.3.5 Yahoo! Reflection 5 Free Response
1.3.6 Fighting Cyber Crime 1 Connection
1.3.7 Cyber Crime Reflection 5 Free Response
1.3.8 FBI Cyber Crime 1 Connection
1.3.9 FBI Reflection 5 Free Response
1.4 The CIA Triad Lesson
1.4.1 CIA Triad 1 Video
1.4.2 CIA Triad 2 Check for Understanding
1.4.3 Which part of the CIA Triad? 5 Free Response
1.4.4 Which part of the CIA Triad? 5 Free Response
1.4.5 Breach of Confidentiality 5 Free Response
1.4.6 Breach of Availability 5 Free Response
1.4.7 CIA Connections 5 Free Response
1.5 What is Cybersecurity? Quiz Lesson
1.5.1 What is Cybersecurity? Quiz 15 Unit Quiz
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation Lesson
2.1.1 Digital Footprint and Reputation 1 Video
2.1.2 Digital Footprint and Reputation 3 Check for Understanding
2.1.3 Social Media Clean-up 1 Example
2.1.4 Building a Positive Digital Footprint 5 Free Response
2.1.5 Right to be Forgotten? 1 Connection
2.1.6 Right to be Forgotten 5 Free Response
2.1.7 What is your Digital Footprint? 5 Free Response
2.2 Cyberbullying Lesson
2.2.1 Cyberbullying 1 Video
2.2.2 Cyberbullying 3 Check for Understanding
2.2.3 Scenario: Student Ranking 5 Free Response
2.2.4 Scenario: Singled Out 5 Free Response
2.2.5 United Against Cyberbullying: A Fictional Story 5 Notes
2.2.6 Reflection: United Against Cyberbullying 5 Free Response
2.2.7 Stopping Cyberbullying 5 Free Response
2.3 Internet Safety Lesson
2.3.1 Internet Safety 1 Video
2.3.2 Internet Safety 2 Check for Understanding
2.3.3 Scenario: School Stranger 5 Free Response
2.3.4 Scenario: Vacation Pals 5 Free Response
2.3.5 Staying Safe 5 Free Response
2.4 Privacy & Security Lesson
2.4.1 What is Data Privacy & Security? 1 Video
2.4.2 Privacy & Security Quiz 2 Check for Understanding
2.4.3 Google Privacy Policy Search 1 Connection
2.4.4 Google Privacy Policy Search 5 Free Response
2.4.5 Guess: Password List 1 Example
2.4.6 Guess: Using an Algorithm 1 Example
2.4.7 Guess: Brute Force 1 Example
2.4.8 How Strong is your Password? 1 Connection
2.4.9 How Strong is your password? 5 Free Response
2.5 Information Literacy Lesson
2.5.1 Information Literacy 1 Video
2.5.2 Information Literacy 2 Check for Understanding
2.5.3 Effective Internet Searches 5 Free Response
2.5.4 Evaluate the Source 1 1 Connection
2.5.5 Respond: Evaluate the Source 1 5 Free Response
2.5.6 Evaluate the Source 2 1 Notes
2.5.7 Respond: Evaluate the Source 2 5 Free Response
2.5.8 Hero Pig? 1 Connection
2.5.9 Respond: Hero Pig? 5 Free Response
2.6 Creative Credit & Copyright Lesson
2.6.1 Creative Credit and Copyright 1 Video
2.6.2 Creative Credit and Copyright 2 Check for Understanding
2.6.3 Cite! 5 Free Response
2.6.4 Exploring Creative Commons 1 Connection
2.6.5 Respond: Creative Commons 5 Free Response
2.6.6 Task: Finding Images 5 Free Response
2.6.7 Reflection: Why is Copyright Important? 5 Free Response
2.7 Hacking Ethics Lesson
2.7.1 Hacking Ethics & Legality 1 Video
2.7.2 Hacking Ethics & Legality 4 Check for Understanding
2.7.3 Reflection: White Hat vs Black Hat Hacking 5 Free Response
2.7.4 Penetration Testing 1 Connection
2.7.5 Reflection: Penetration Testing 5 Free Response
2.7.6 Hack the Pentagon? 1 Connection
2.7.7 Reflection: Hack the Pentagon 5 Free Response
2.7.8 Ethical Hacker Agreement 1 Check for Understanding
2.8 Digital Citizenship and Cybersecurity Quiz Lesson
2.8.1 Digital Citizenship and Cyber Hygiene Quiz 20 Unit Quiz
Project: Public Service Announcement
3.1 Project: Public Service Announcement Lesson
3.1.1 Pick a Topic 5 Free Response
3.1.2 Research 5 Free Response
3.1.3 Choose Your Audience 5 Free Response
3.1.4 What kind of PSA? 5 Free Response
3.1.5 Draft your PSA 5 Free Response
3.1.6 Finalize your PSA! 15 Free Response
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis Lesson
4.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
4.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
4.1.3 Cryptogram Game! 1 Example
4.1.4 Why encrypt? 1 Video
4.1.5 Why encrypt? 2 Check for Understanding
4.1.6 Encrypt/Decrypt 1 Example
4.2 History of Cryptography Lesson
4.2.1 Cryptography: A Brief History 1 Video
4.2.2 Cryptography History Quiz 2 Check for Understanding
4.2.3 How the Enigma Worked 1 Connection
4.2.4 How the Enigma Worked 5 Free Response
4.2.5 Unknown Languages and the Future of Cryptography 1 Connection
4.2.6 The Future of Cybersecurity 5 Free Response
4.3 Basic Crypto Systems: Caesar Cipher Lesson
4.3.1 Caesar Cipher 1 Video
4.3.2 Caesar Cipher 2 Check for Understanding
4.3.3 Caesar Cipher Encryption 1 Example
4.3.4 Decrypt Caesar's Cipher! 1 Example
4.4 Basic Crypto Systems: Cracking Caesar Lesson
4.4.1 Cracking Caesar Cipher 1 Video
4.4.2 Cracking Caesar Cipher 2 Check for Understanding
4.4.3 Cracking Caesar with Brute Force 1 Example
4.4.4 Letter Frequency and Caesar 1 Example
4.4.5 Examining Caesar Cipher 5 Free Response
4.5 Basic Crypto Systems: Vigenere Cipher Lesson
4.5.1 Vigenere Cipher 1 Video
4.5.2 Vigenere Cipher 1 Check for Understanding
4.5.3 Vigenere Cipher Example 1 Example
4.5.4 Letter Frequency and Vigenere Cipher 1 Example
4.5.5 Examining Vigenere Cipher 5 Free Response
4.5.6 Improving Vigenere 1 Example
4.6 Hash Functions Lesson
4.6.1 Hash Functions 1 Video
4.6.2 Hash Functions 3 Check for Understanding
4.6.3 Google Shattered Crypto Algorithm 1 Connection
4.6.4 Hash Functions in the News 5 Free Response
4.6.5 What is a Checksum? 5 Video
4.6.6 Using a Hash Generator 1 Connection
4.6.7 Hash Generator 5 Free Response
4.6.8 Password Salting 1 Connection
4.6.9 Password Salting 5 Free Response
4.7 Hash Function Development Lesson
4.7.1 Hash Function Development 1 Video
4.7.2 Hash Function Development 2 Check for Understanding
4.7.3 Modulo Math Calculator 1 Example
4.7.4 Understanding Modulo Math 1 Example
4.7.5 Modulo Game! 1 Example
4.7.6 Develop a Simple Hash Function 5 Exercise
4.8 Digital Certificates Lesson
4.8.1 Symmetric vs Asymmetric Encryption 1 Video
4.8.2 Public-Key Encryption Explorer 5 Notes
4.8.3 Digital Certificates 1 Video
4.8.4 Digital Certificates 4 Check for Understanding
4.8.5 SSL Explained 1 Connection
4.8.6 SSL Explained 5 Free Response
4.8.7 SSL Connection 5 Free Response
4.8.8 In The News 1 Connection
4.8.9 In The News Response 5 Free Response
4.8.10 Become a Certificate Authority! 10 Free Response
4.9 The ABCs of Cryptography Quiz Lesson
4.9.1 The ABCs of Cryptography Quiz 15 Unit Quiz
Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast Lesson
5.1.1 Overview 1 Notes
5.1.2 Investigate a Classic Cipher 1 Notes
5.1.3 Write the Script and Rehearse 5 Free Response
5.1.4 Newscast Presentation 15 Free Response
System Administration
6.1 Operating Systems Lesson
6.1.1 Operating Systems 1 Video
6.1.2 Operating Systems Quiz 5 Check for Understanding
6.1.3 Detect My OS 1 Example
6.1.4 Windows OS Installation Simulation 1 Example
6.1.5 Installing an OS 5 Free Response
6.1.6 Upgrading a Mac OS 1 Connection
6.2 Comparing Operating Systems Lesson
6.2.1 Comparing Operating Systems 1 Video
6.2.2 Comparing Operating Systems Quiz 5 Check for Understanding
6.2.3 Windows Simulation 1 Example
6.2.4 MacOS Simulation 1 Example
6.2.5 Choose a Linux Distro! 1 Connection
6.2.6 Which would you choose? 5 Free Response
6.3 Compatibility Lesson
6.3.1 Compatibility 1 Video
6.3.2 Compatibility Quiz 3 Check for Understanding
6.3.3 What Processor? Windows 1 Example
6.3.4 What Processor? Mac 1 Example
6.3.5 What Processor are you running? 5 Free Response
6.4 Software and Applications Lesson
6.4.1 Software and Applications 1 Video
6.4.2 Software and Applications Quiz 2 Check for Understanding
6.4.3 Spreadsheet Simulation 1 Example
6.4.4 Messaging Simulation 1 Example
6.4.5 Kanban Board Simulation 1 Example
6.4.6 Software Simulations 5 Free Response
6.5 Software Licenses Lesson
6.5.1 Software Licenses 1 Video
6.5.2 Software Licenses Quiz 3 Check for Understanding
6.5.3 Do I need a Software License? 5 Free Response
6.5.4 Is This Original? 5 Free Response
6.6 Application Security Lesson
6.6.1 Application Security 1 Video
6.6.2 Application Security 5 Check for Understanding
6.6.3 Windows Updates 1 Example
6.6.4 Windows Defender Antivirus 1 Connection
6.6.5 Windows Defender Antivirus 5 Free Response
6.6.6 CodeHS System Restore 5 Free Response
6.7 Browser Configuration Lesson
6.7.1 Browser Configuration 1 Video
6.7.2 Browser Configuration 5 Check for Understanding
6.7.3 Cached CodeHS 1 Connection
6.7.4 Cached CodeHS 5 Free Response
6.7.5 Is Your Popup Blocker On? 1 Example
6.7.6 Browser Extensions Lab 5 Free Response
6.8 System Administration Lesson
6.8.1 User Accounts 1 Video
6.8.2 User Accounts Quiz 2 Check for Understanding
6.8.3 User Accounts 5 Free Response
6.8.4 Shared Folders and Files 5 Free Response
6.8.5 Host Security 1 Video
6.8.6 Host Security Quiz 3 Check for Understanding
6.8.7 Security Baseline 5 Free Response
6.9 Command Line Interface Lesson
6.9.1 Linux/MacOS vs. Windows 1 Notes
6.9.2 Command Line Interface 1 Video
6.9.3 Command Line Interface Quiz 5 Check for Understanding
6.9.4 Command Equivalents 1 Resource
6.9.5 Windows Command Prompt 1 Video
6.9.6 Windows Command Prompt 5 Free Response
6.9.7 Directory Directions 5 Free Response
6.9.8 Neural Interface? 1 Connection
6.9.9 Neural Interface? 5 Free Response
6.10 System Administration Quiz Lesson
6.10.1 Mindsets 1 Survey
6.10.2 System Administration Quiz 20 Unit Quiz
Software Security
7.1 Clients and Servers Lesson
7.1.1 Clients and Servers 1 Video
7.1.2 Clients and Servers 2 Check for Understanding
7.1.3 Inside a Google Data Center 1 Connection
7.1.4 Inside a Google Data Center 5 Free Response
7.1.5 Cloud Vulnerabilities 1 Connection
7.1.6 Cloud Vulnerabilities Response 5 Free Response
7.1.7 Client-Server Model 1 Video
7.1.8 Client-Server Model 2 Check for Understanding
7.1.9 The Future of User Privacy 1 Connection
7.1.10 The Future of User Privacy 5 Free Response
7.2 What is SQL? Lesson
7.2.1 What is SQL Overview 1 Notes
7.2.2 Intro to SQL 1 Video
7.2.3 Quiz: What is SQL? 1 Check for Understanding
7.2.4 How to Structure Data in SQL 1 Video
7.2.5 How to Structure Data in SQL 3 Check for Understanding
7.2.6 SQL Tables 1 Example
7.2.7 SQL Tables Response 5 Free Response
7.3 Basic Querying in SQL Lesson
7.3.1 The SELECT Statement 1 Video
7.3.2 Basic Querying in SQL 1 Check for Understanding
7.3.3 Our First SELECT Statement 1 Example
7.3.4 Your First SELECT Statement 5 Exercise
7.3.5 More SELECT Statement 1 Video
7.3.6 More SELECT Statement 1 Check for Understanding
7.3.7 Selecting Specific Columns 1 Example
7.3.8 Harry Potter Names 5 Exercise
7.4 Common Security Problems Lesson
7.4.1 Common Security Problems 1 Video
7.4.2 Common Security Problems 1 Check for Understanding
7.4.3 Meet Security Engineers at Google 1 Connection
7.4.4 Security Engineering Reflection 5 Free Response
7.4.5 Living in a Digital World 1 Video
7.4.6 Living in a Digital World 5 Free Response
7.5 SQL Injection Overview Lesson
7.5.1 SQL Injection Overview 1 Video
7.5.2 SQL Injection Overview 2 Check for Understanding
7.5.3 Equifax Security Breach 1 Connection
7.5.4 Equifax Exposed Millions 1 Connection
7.5.5 Equifax SQL Injection Attack 5 Free Response
7.5.6 SQLi 1 Example
7.6 Types of SQLi and Prevention Lesson
7.6.1 Types of SQLi 1 Video
7.6.2 Types of SQLi 3 Check for Understanding
7.6.3 Preventing SQLi 1 Video
7.6.4 Preventing SQLi 2 Check for Understanding
7.6.5 Mitigating SQL Injection 1 Connection
7.6.6 Reflection: Mitigating SQL Injection 5 Free Response
7.6.7 SQL Injection 1 Connection
7.7 Software Security Quiz Lesson
7.7.1 Software Security Quiz 15 Unit Quiz
Networking Fundamentals
8.1 Introduction to the Internet Lesson
8.1.1 Welcome to the Internet 1 Video
8.1.2 Intro to the Internet 3 Check for Understanding
8.1.3 Inside Facebook's Connectivity Lab 1 Connection
8.1.4 Connectivity Lab Reflection 5 Free Response
8.2 Notational Systems Lesson
8.2.1 Number Systems 1 Video
8.2.2 Number Systems Quiz 2 Check for Understanding
8.2.3 Number Base Tool 1 Notes
8.2.4 Decimal to Binary 1 Video
8.2.5 Decimal to Binary Quiz 3 Check for Understanding
8.2.6 Binary Game 5 Exercise
8.3 Data Representation Lesson
8.3.1 Hexadecimal 1 Video
8.3.2 Hexadecimal Quiz 2 Check for Understanding
8.3.3 Binary to Hex Game 5 Exercise
8.3.4 Encoding Text with Binary 1 Video
8.3.5 Encoding Text with Binary Quiz 2 Check for Understanding
8.3.6 Custom Encoding 1 Example
8.3.7 Bits to ASCII 1 Example
8.3.8 Hello World in Bits 5 Exercise
8.4 Internet Hardware and Sending Information Lesson
8.4.1 Internet Hardware 1 Video
8.4.2 Internet Hardware 2 Check for Understanding
8.4.3 Sending Information 1 Video
8.4.4 Sending Information 3 Check for Understanding
8.4.5 The Internet is in the Ocean 1 Connection
8.4.6 Internet in the Ocean Reflection 5 Free Response
8.5 Internet Addresses Lesson
8.5.1 Internet Addresses 1 Video
8.5.2 Internet Addresses 2 Check for Understanding
8.5.3 The Need for Addresses 5 Free Response
8.5.4 IPv4 vs. IPv6 1 Connection
8.5.5 Reflection: IPv4 vs IPv6 5 Free Response
8.6 Domain Name System (DNS) Lesson
8.6.1 Domain Name System (DNS) 1 Video
8.6.2 Domain Name System 2 Check for Understanding
8.6.3 How Does DNS Work? 1 Connection
8.6.4 How Does DNS Work? 5 Free Response
8.7 Routing Lesson
8.7.1 Routing 1 Video
8.7.2 Routing 3 Check for Understanding
8.7.3 Redundancy 5 Free Response
8.8 Packets & Protocols Lesson
8.8.1 Packets 1 Video
8.8.2 Packets 2 Check for Understanding
8.8.3 Protocols 1 Video
8.8.4 Protocols 3 Check for Understanding
8.8.5 How the Internet Works 1 Connection
8.8.6 The Journey of an Image 5 Free Response
8.9 Protocols and Standards Lesson
8.9.1 Protocols 1 Video
8.9.2 Protocols Quiz 3 Check for Understanding
8.9.3 Standards 1 Video
8.9.4 Standards Quiz 2 Check for Understanding
8.9.5 The New Wireless Standard 1 Connection
8.9.6 801.11ax 1 Connection
8.9.7 801.11ax FR 5 Free Response
8.10 Viewing a Webpage Lesson
8.10.1 Viewing a Webpage 1 Video
8.10.2 Viewing a Webpage 2 Check for Understanding
8.10.3 Explaining a URL 5 Free Response
8.10.4 Net Neutrality Explained 1 Connection
8.10.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
8.10.6 Take a Side on Net Neutrality 5 Free Response
8.10.7 Net Neutrality and Cybersecurity 1 Connection
8.10.8 Net Neutrality and Cybersecurity Research 5 Free Response
8.11 Access Control Lesson
8.11.1 Access Control 1 Video
8.11.2 Access Control 4 Check for Understanding
8.11.3 Multifactor Authentication 1 Example
8.11.4 Two Factor Authentication 1 Example
8.11.5 Two Factor Authentication Reflection 5 Free Response
8.11.6 RADIUS Overview with AAA Protocol 1 Connection
8.11.7 RADIUS Server Access Control 1 Connection
8.11.8 RADIUS Reflection 5 Free Response
8.12 Impact of the Internet Lesson
8.12.1 Impact of the Internet 1 Video
8.12.2 Impact of the Internet 3 Check for Understanding
8.12.3 What is the Digital Divide? 1 Connection
8.12.4 What is the Digital Divide? 5 Free Response
8.13 Networking Fundamentals Quiz Lesson
8.13.1 Mindsets 1 Survey
8.13.2 Networking Fundamentals Quiz 15 Unit Quiz
IT Infrastructure
9.1 Internal Components Lesson
9.1.1 Internal Components 1 Video
9.1.2 Internal Components 5 Check for Understanding
9.1.3 Build a Computer 1 Connection
9.1.4 Build a Computer 5 Free Response
9.1.5 Test Your Brain's RAM! 1 Example
9.1.6 Test Your Brain's RAM! Reflection 5 Free Response
9.2 Peripheral Devices Lesson
9.2.1 Peripheral Devices 1 Video
9.2.2 Peripheral Devices 5 Check for Understanding
9.2.3 Personalized Peripherals 5 Free Response
9.2.4 IT Help 5 Free Response
9.2.5 Your Ideal Computer Setup 5 Free Response
9.3 Network Devices Lesson
9.3.1 Network Devices 1 Video
9.3.2 Network Devices 5 Check for Understanding
9.3.3 Speed Test 1 Connection
9.3.4 Speed Test 5 Free Response
9.3.5 Fiber Optics Bend Light! 1 Connection
9.3.6 Fiber Optics Bend Light! 5 Free Response
9.3.7 Ethernet Standards 1 Connection
9.3.8 Ethernet Standards 5 Free Response
9.3.9 Network Troubleshooting 5 Free Response
9.4 Storage Options Lesson
9.4.1 Storage Options 1 Video
9.4.2 Storage Options Quiz 5 Check for Understanding
9.4.3 Security of Cloud Storage 1 Connection
9.4.4 Security of Cloud Storage 5 Free Response
9.4.5 Storage Suggestions 5 Free Response
9.5 Network Options Lesson
9.5.1 Network Options 1 Video
9.5.2 Network Options Quiz 5 Check for Understanding
9.5.3 What is an SSID? 1 Connection
9.5.4 What is an SSID? 5 Free Response
9.5.5 Wireless Threats 1 Connection
9.5.6 Wireless Threats 5 Free Response
9.5.7 Wireless Network Setup 5 Free Response
9.6 Network Communication Lesson
9.6.1 Network Communication 1 Video
9.6.2 Network Communication Quiz 2 Check for Understanding
9.6.3 Setting up a Firewall 1 Example
9.6.4 iptables 5 Free Response
9.6.5 iptables simulation 1 Notes
9.7 Network Management Lesson
9.7.1 Linux/MacOS vs. Windows 1 Notes
9.7.2 Network Management 1 Video
9.7.3 Network Management Quiz 3 Check for Understanding
9.7.4 MacOS Terminal Simulation 1 Example
9.7.5 Windows Command Prompt Simulation 1 Example
9.7.6 Windows Command Prompt Spy 5 Video
9.7.7 Windows Command Prompt Spy 5 Free Response
9.8 Private Networks Lesson
9.8.1 IP and MAC Addresses 1 Video
9.8.2 IP and MAC Addresses Quiz 2 Check for Understanding
9.8.3 Intranet Permissions 1 Example
9.8.4 Coffee Shop: Design an Intranet 5 Free Response
9.8.5 DMZs and VPNs 1 Video
9.8.6 DMZs and VPNs Quiz 3 Check for Understanding
9.8.7 Protecting Privacy with VPNs 1 Connection
9.8.8 Protecting Privacy with VPNs 5 Free Response
9.8.9 Coffee Shop: Network Plan 5 Free Response
9.8.10 Coffee Shop: Network Diagram 5 Free Response
9.8.11 SOHO Network 1 Video
9.8.12 Network Topologies 1 Example
9.9 IT Infrastructure Quiz Lesson
9.9.1 IT Infrastructure Quiz 20 Unit Quiz
Project: Troubleshooting
10.1 Methodology Lesson
10.1.1 Troubleshooting Methodology 1 Notes
10.1.2 Identify the Problem 5 Free Response
10.1.3 Research Solutions 5 Free Response
10.1.4 Establish a Theory 5 Free Response
10.1.5 Test the Theory 5 Free Response
10.1.6 Fix the Problem! 5 Free Response
10.2 Support Practice Lesson
10.2.1 Signal Strength 10 Exercise
10.2.2 Interference 10 Exercise
Project: IT Professional
11.1 Building a Resume Lesson
11.1.1 What is a Resume? 5 Connection
11.1.2 What is a Resume? 5 Free Response
11.1.3 Explore Resume Layouts 5 Connection
11.1.4 Explore Resume Layouts 5 Free Response
11.1.5 Draft Your Resume 5 Free Response
11.2 Communication is Key! Lesson
11.2.1 Do you have what it takes? 5 Notes
11.2.2 Cybersecurity Careers 5 Free Response
11.2.3 Internships Exploration 5 Free Response
11.2.4 Customer Service Skills 1 Connection
11.2.5 Customer Service Skills 5 Free Response
11.2.6 Act it Out! 15 Free Response
11.3 Building a Knowledge Base Lesson
11.3.1 What is a Knowledge Base? 1 Connection
11.3.2 Draft a KB Article 5 Free Response
11.3.3 Share your KB Article 5 Free Response
11.3.4 Finalize your KB Article 15 Free Response
11.4 Star in a Video! Lesson
11.4.1 Instructional Videos 1 Connection
11.4.2 Instructional Video Plan 5 Free Response
11.4.3 Write the Script 5 Free Response
11.4.4 Create the Storyboard 5 Free Response
11.4.5 Record Your Video 5 Free Response
Project: Digital Forensics
12.1 Digital Forensics Lesson
12.1.1 Digital Forensics 1 Video
12.1.2 Student Success Story 1 Connection
12.1.3 Student Success Story Response 5 Free Response
12.2 Forensic Case 1: Logs Lesson
12.2.1 Network Logs 1 Notes
12.2.2 Network Log Evidence 1 Example
12.2.3 Network Logs Conclusion 5 Free Response
12.3 Forensic Case 2: File Metadata Lesson
12.3.1 File Metadata 1 Notes
12.3.2 File Metadata Evidence 1 Example
12.3.3 File Metadata Conclusion 5 Free Response
12.4 Forensic Case 3: Exit Data Lesson
12.4.1 Photo Exif 1 Notes
12.4.2 Exif Using Inspector 1 Connection
12.4.3 Exif Using the CLI 1 Example
12.4.4 Photo Exif Conclusion 5 Free Response
Cyber Defense
13.1 Network Attacks Lesson
13.1.1 Network Attacks Overview 1 Video
13.1.2 Network Attacks Quiz 4 Check for Understanding
13.1.3 Check for Vulnerabilities 1 Notes
13.1.4 Bug Bounty Hunting 1 Connection
13.1.5 Bug Bounty Hunting 5 Free Response
13.1.6 Common Port Targets 1 Connection
13.1.7 Port Scanner Simulation 1 Example
13.1.8 Open Port Reflection 5 Free Response
13.2 Malware Types and Prevention Lesson
13.2.1 Malware Types and Prevention 1 Video
13.2.2 Malware Types and Prevention 5 Check for Understanding
13.2.3 How Anti-malware Works 1 Connection
13.2.4 How Anti-malware Works 5 Free Response
13.2.5 OS Malware Security 5 Free Response
13.2.6 Reverse Engineering Malware 5 Free Response
13.2.7 Cyberterrorism 1 Connection
13.2.8 Cyberterrorism Response 5 Free Response
13.3 Common Network Attacks Lesson
13.3.1 Common Network Attacks 1 Video
13.3.2 Network Attacks 3 Check for Understanding
13.3.3 Social Engineering Hack 1 Connection
13.3.4 Social Engineering Reflection 5 Free Response
13.3.5 DDoS Attacks 1 Connection
13.3.6 DDoS Simulation 1 Example
13.3.7 DDoS Reflection 5 Free Response
13.4 Additional Attacks Lesson
13.4.1 Additional Attacks 1 Video
13.4.2 Additional Attacks Quiz 5 Check for Understanding
13.4.3 Botnet Attacks - Mirai 1 Connection
13.4.4 Botnet Attacks - 3ve 1 Connection
13.4.5 Botnet Attacks - 3ve Video 1 Connection
13.4.6 Botnet Attacks - Reflection 5 Free Response
13.4.7 Zero-day Exploit: Stuxnet 5 Connection
13.4.8 Zero-day Exploit: Stuxnet 5 Notes
13.4.9 Zero-day Exploit Reflection 5 Free Response
13.4.10 US-CERT Current Activity 5 Free Response
13.5 Cross-site Scripting Lesson
13.5.1 Cross-site Scripting 1 Video
13.5.2 Cross-site Scripting 2 Check for Understanding
13.5.3 XSS Bug in Yahoo Mail 1 Connection
13.5.4 XSS Bug in Yahoo Mail 5 Free Response
13.5.5 XSS Demo Overview 1 Notes
13.5.6 Hacksplaining XSS Demo 1 Connection
13.5.7 Google's Tutorial for XSS 1 Connection
13.5.8 XSS Reflection 5 Free Response
13.6 Internal Threats Lesson
13.6.1 Internal Threats 1 Video
13.6.2 Internal Threats 5 Check for Understanding
13.6.3 BIOS/UEFI Attack Example 1 Connection
13.6.4 Accessing BIOS/UEFI 1 Notes
13.6.5 Causes of Data Breaches 5 Connection
13.6.6 Causes of Data Breaches 5 Free Response
13.6.7 Protecting Data at All Times 1 Connection
13.6.8 Protecting Data at All Times 5 Free Response
13.6.9 Air Gapped Computers 1 Connection
13.6.10 Air Gapped Computers Response 5 Free Response
13.7 Cyber Defense Quiz Lesson
13.7.1 Cyber Defense Quiz 20 Unit Quiz
Project: Put it in Writing!
14.1 Level 1: Entry Event Lesson
14.1.1 Company Development 5 Free Response
14.1.2 Level 1: Attack! 5 Free Response
14.1.3 Level 1: Project Overview 1 Video
14.1.4 Put It In Writing! Rubric 5 Connection
14.2 Level 2: User Training Lesson
14.2.1 User Training Policy Development 5 Free Response
14.2.2 Challenge: Employee Negligence 1 5 Free Response
14.2.3 Challenge: Employee Negligence 2 5 Free Response
14.2.4 Level 2 Debrief 5 Free Response
14.3 Level 3: Incident Response Lesson
14.3.1 Incident Response Plan Template 5 Connection
14.3.2 Incident Response Plan Link 5 Free Response
14.3.3 Challenge: Cyber Attack! 5 Free Response
14.3.4 Level 3 Debrief 5 Free Response
14.4 Level 4: Data and Licenses Lesson
14.4.1 Data and Licenses 5 Video
14.4.2 FTC Data Security Guide 5 Connection
14.4.3 Data Policy Template 5 Connection
14.4.4 Data Policy Link 5 Free Response
14.4.5 Challenge: Data Breach 1 5 Free Response
14.4.6 Challenge: Data Breach 2 5 Free Response
14.4.7 Challenge: Data Breach 3 5 Free Response
14.4.8 Level 4 Debrief 5 Free Response
14.5 Level 5: Change Management Lesson
14.5.1 Change Management 5 Video
14.5.2 Change Management Plan 5 Connection
14.5.3 Change Management Plan Link 5 Free Response
Risk Management
15.1 Identifying Risks Lesson
15.1.1 Identifying Risks 1 Video
15.1.2 Identifying Risks Quiz 5 Check for Understanding
15.1.3 What is a Honeypot? 1 Connection
15.1.4 Honeypot Attacks 1 Connection
15.1.5 Honeypot Attacks 5 Free Response
15.1.6 Whois 1 Connection
15.1.7 Whois 5 Free Response
15.1.8 Packet Sniffing 1 Connection
15.1.9 Packet Sniffing Response 5 Free Response
15.1.10 Breach Trends 5 Free Response
15.2 Assessing Risks Lesson
15.2.1 Assessing Risks 1 Notes
15.2.2 Malware Risk Assessment 5 Free Response
15.2.3 Poor Password Assessment 5 Free Response
15.2.4 Social Engineering Assessment 5 Free Response
15.2.5 Assessing Risks 1 Video
15.2.6 Assessing Risks Quiz 5 Check for Understanding
15.2.7 End-of-Life OS 1 Connection
15.2.8 End-of-Life Proposal 5 Free Response
15.2.9 Input Handling 1 Example
15.2.10 Input Handling Responses 5 Free Response
15.2.11 Input Validation 1 Example
15.2.12 Input Validation Responses 5 Free Response
15.3 Risk Response Lesson
15.3.1 Risk Response 1 Video
15.3.2 Risk Response 5 Check for Understanding
15.3.3 Defense in Depth Risk Mitigation 5 Free Response
15.3.4 Sample Risk Assessment Report 5 Connection
15.3.5 Sample Risk Assessment Reflection 5 Free Response
15.3.6 Delta Outage Video 5 Connection
15.3.7 Delta Outage Reflection 5 Free Response
15.3.8 What Happens When Your Servers Go Down 5 Connection
15.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
15.3.10 Server Upgrade Memo 5 Free Response
15.4 Penetration Testing Lesson
15.4.1 Penetration Testing 1 Video
15.4.2 Penetration Testing 5 Check for Understanding
15.4.3 Penetration Test Report 5 Connection
15.4.4 Penetration Test Report 5 Free Response
15.4.5 Chaos Engineering 5 Notes
15.4.6 Chaos Engineering Reflection 5 Free Response
15.4.7 Pen Test Simulation Handout 5 Resource
15.4.8 Pen Test Simulation: Active Recon 5 Exercise
15.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
15.5 Risk Management Quiz Lesson
15.5.1 Risk Management Quiz 20 Unit Quiz
Project: The Game of Risk
16.1 The Game of Risk Lesson
16.1.1 Group Project Intro 1 Notes
16.1.2 Brainstorm: SLE 5 Free Response
16.1.3 Brainstorm: Materials 5 Free Response
16.1.4 Prototype Game and Instructions 5 Free Response
16.1.5 Test Your Game! 5 Free Response
16.1.6 Testing Feedback Form 1 Resource
16.1.7 Create Your Final Version! 20 Free Response
Careers and the Workplace
17.1 Careers at ShieldPort Lesson
17.1.1 ShieldPort Introduction 5 Article
17.1.2 Careers at ShieldPort 5 Article
17.1.3 Training and Certification 5 Free Response
17.1.4 Career Pathways 5 Free Response
17.1.5 The Interview 5 Article
17.1.6 Question #1 - Professionalism 5 Free Response
17.1.7 Question #2 - Work Ethic & Equal Opportunity 5 Free Response
17.1.8 Question #3 - Respectful Conduct 5 Free Response
17.1.9 Question #4 - Health & Safety 5 Free Response
17.1.10 Question #5 - Managers & Leaders 5 Free Response
17.1.11 Question #6 - Individual & Group Work 5 Free Response
17.1.12 Question #7 - Legal & Ethical Responsibilities 5 Free Response
Final Exam
18.1 Final Exam Lesson
18.1.1 Final Exam 25 Final
Introduction to Cybersecurity Pretest
19.1 Introduction to Cybersecurity Pretest Lesson
19.1.1 About the Pretest 1 Notes
19.1.2 Mindsets 1 Survey
19.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Introduction to Cybersecurity Posttest
20.1 Introduction to Cybersecurity Posttest Lesson
20.1.1 About the Posttest 1 Notes
20.1.2 Mindsets 1 Survey
20.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Final Course Project
21.1 Final Course Project Lesson
21.1.1 Choose Your Own Adventure 1 Notes
21.1.2 Choose Your Adventure 5 Free Response
21.1.3 Research 5 Free Response
21.1.4 Choose Your Target Audience 5 Free Response
21.1.5 Draft Your Presentation 5 Free Response
21.1.6 Draft Your Flyer 5 Free Response
21.1.7 Make Your Presentation with Handout! 5 Free Response
Midterm
22.1 Midterm Lesson
22.1.1 Midterm 15 Midterm
CompTIA Tech+ Prep
23.1 Module Overview Lesson
23.1.1 Module Overview 5 HTML Notes
23.2 Personal Data Security Lesson
23.2.1 A Tale of Authentication 5 Article
23.2.2 A Tale of Authentication Submission 5 Free Response
23.2.3 Personal Data Security Check For Understanding 5 Check for Understanding
23.2.4 Browser Security Settings Exploration 5 Video
23.2.5 Privacy Settings Simulator 5 Article
23.2.6 Security vs. Usability 5 Free Response
23.2.7 Internet of Things and Cybersecurity 5 Article
23.2.8 The Rise of Artificial Intelligence 5 Article
23.2.9 The Rise of AI Reflection 5 Free Response
23.2.10 Cyber Story 5 Video
23.2.11 Cyber Term Matching 5 Article
23.3 Introduction to Artificial Intelligence Lesson
23.3.1 What is AI? 5 Video
23.3.2 What is Artificial Intelligence? 3 Quiz
23.3.3 Predictive AI: Find a Book 5 Free Response
23.3.4 Generative AI: Write a Poem 5 Free Response
23.3.5 Generative or Predictive: Drawing with AI 5 Free Response
23.4 Artificial Intelligence and Machine Learning Lesson
23.4.1 AI and Machine Learning 5 Video
23.4.2 AI and Machine Learning 4 Quiz
23.4.3 Types of Machine Learning 5 Video
23.4.4 Machine Learning Examples 5 Notes
23.4.5 Types of Machine Learning 6 Check for Understanding
23.4.6 Supervised Teachable Machine 5 Notes
23.4.7 Supervised Teachable Machine Reflection 5 Free Response
23.4.8 Reinforcement Game 5 Notes
23.4.9 Reinforcement Game Reflection 5 Free Response
23.5 Cybersecurity and You Items Lesson
23.5.1 The Password Game 5 HTML Notes
23.5.2 Password Review 5 None
23.5.3 Create a Password Policy 5 Free Response
23.6 More Operating Systems Lesson
23.6.1 Types of Operating Systems 5 Article
23.6.2 File Systems 5 Notes
23.6.3 Form Factor 5 Free Response
23.6.4 Laptop vs. Tablet 1 Connection
23.6.5 Laptop vs. Tablet 5 Free Response
23.6.6 Which is best? 1 Notes
23.6.7 Product Chart 5 Video
23.6.8 Device Comparison 5 Free Response
23.6.9 Mobile Devices 5 Notes
23.7 System Administration Items Lesson
23.7.1 Disk Management 5 None
23.7.2 What is VR, AR, and MR? 5 Video
23.7.3 Exploring Computing Devices: Vehicles, Medical, and Fitness 5 Free Response
23.7.4 Accessibility Features 5 HTML Notes
23.7.5 Accessibility Responses 5 Free Response
23.7.6 Encrypting Data 5 HTML Notes
23.7.7 Encrypting Data Responses 5 Free Response
23.8 IT Concepts Items Lesson
23.8.1 Wired and Wireless Networks 5 Notes
23.8.2 Hexadecimal and Octal Number Systems 5 HTML Notes
23.8.3 Hexadecimal and Octal Choice Board 5 Free Response
23.9 Cloud Computing Lesson
23.9.1 What is Cloud Computing? 5 Connection
23.9.2 Reflection: What is Cloud Computing? 5 Free Response
23.9.3 SaaS, IaaS, and PaaS 5 Connection
23.9.4 Research Project: Cloud Computing Types 5 Free Response
23.9.5 Case Study: Spotify 5 Connection
23.9.6 Reflection: Spotify Case Study 5 Free Response
23.10 IT Infrastructure Items Lesson
23.10.1 Display Technology Lab 5 Article
23.10.2 Display Technology Lab Submission 5 Free Response
23.10.3 Networking Tools & Cables 5 HTML Notes
23.10.4 Networking Tools & Cables Choice Board 5 Free Response
23.10.5 Pioneers in Wi-Fi and Fiber Optics 5 HTML Notes
23.10.6 USB Cables and Ports 5 HTML Notes
23.10.7 Types of Wireless Internet 5 None
23.10.8 Wi-Fi 6 (801.11ax) and 6 GHz 5 HTML Notes
23.10.9 Wireless Security 5 Video
23.10.10 Wireless Security Responses 5 Free Response
23.10.11 Wireless Network Configuration Simulator 5 None
23.11 Data as a Resource Lesson
23.11.1 How Your Data Is Used 5 Connection
23.11.2 Benefits of Data Response 5 Free Response
23.11.3 Data, Information, and Knowledge 5 Article
23.11.4 Field Trip: Data Center 5 Connection
23.11.5 Field Trip Response 5 Free Response
23.11.6 States of Data 5 Connection
23.11.7 States of Data Creation 5 Free Response
23.11.8 Data as a Resource Quiz 10 Quiz
23.11.9 Database Management Systems 5 Notes
23.11.10 Data-Driven Decision Making 5 Article
23.11.11 Data-Driven Decision Making Submission 5 Free Response
23.12 Data Security Items Lesson
23.12.1 Database Design 5 Article
23.12.2 Disney Movies Database 5 Example
23.12.3 Database Design Submission 5 Free Response
23.12.4 Structuring Data 5 Article
23.12.5 Structuring Data Submission 5 Free Response
Programming Fundamentals
24.1 The Language of Computers Lesson
24.1.1 How Do You Talk to a Computer? 5 Notes
24.1.2 Types of Programming Languages 5 Video
24.1.3 Programming Language Hierarchy 5 Notes
24.1.4 More About Programming Languages 1 Video
24.1.5 Variables 5 Video
24.1.6 Creating Variables 5 Free Response
24.1.7 Mad Libs Using Variables 5 Article
24.1.8 Data Types 5 Video
24.1.9 Data Type Matching 5 Article
24.2 Printing in Python Lesson
24.2.1 Printing in Python 1 Video
24.2.2 Printing in Python 2 Check for Understanding
24.2.3 Hello, world! 1 Example
24.2.4 Printing Multiple Lines 1 Example
24.2.5 Introduce Yourself 5 Exercise
24.3 Variables and Types Lesson
24.3.1 Variables and Types 1 Video
24.3.2 Variables and Types 2 Check for Understanding
24.3.3 Variables in Action 1 Example
24.3.4 Variable Types 1 Example
24.3.5 Variable Naming 1 Example
24.3.6 Make Some Variables! 5 Exercise
24.3.7 Variables vs. Constants in Python 5 HTML Notes
24.3.8 Ticket Sales Calculator 5 Exercise
24.4 User Input Lesson
24.4.1 User Input 1 Video
24.4.2 User Input 2 Check for Understanding
24.4.3 Basic User Input 1 Example
24.4.4 Type Conversion 1 Example
24.4.5 Type Conversion, Part 2 1 Example
24.4.6 Hello <name> 5 Exercise
24.5 Comments Lesson
24.5.1 Comments 1 Video
24.5.2 Comments 2 Check for Understanding
24.5.3 Commented Program 1 Example
24.5.4 Trapezoid 1 Example
24.5.5 Add Comments! 5 Exercise
24.6 Branching: If Statements Lesson
24.6.1 If Statements 1 Video
24.6.2 If Statements 2 Check for Understanding
24.6.3 Your First If Statement 1 Example
24.6.4 If/Else Statement 1 Example
24.6.5 Is It Raining? 5 Exercise
24.7 Looping: While Loops Lesson
24.7.1 While Loops 1 Video
24.7.2 While Loops 2 Check for Understanding
24.7.3 Guess My Number 1 Example
24.7.4 Program Tracing 1 Example
24.7.5 Program Tracing, Part 2 1 Example
24.7.6 2 Through 20 Even 5 Exercise
24.8 Looping: For Loops Lesson
24.8.1 For Loops 1 Video
24.8.2 For Loops 2 Check for Understanding
24.8.3 Print 10 Numbers 1 Example
24.8.4 1 Through 10, Part 2 1 Example
24.8.5 Counting 10 to 100 by Tens 5 Exercise
24.8.6 Running Total 1 Example
24.8.7 Average Test Score 5 Exercise
24.9 Flowcharts and Pseudocode Lesson
24.9.1 Flowcharts in Programming 5 HTML Notes
24.9.2 Flowchart Responses 5 Free Response
24.9.3 Real-World Flowchart 5 Free Response
24.9.4 Introduction to Pseudocode 5 HTML Notes
24.9.5 Flow Chart → Pseudocode 5 Free Response
24.9.6 Pseudocode → Program 5 Exercise
24.10 Functions Lesson
24.10.1 Functions 1 Video
24.10.2 Functions 2 Check for Understanding
24.10.3 Greeting 1 Example
24.10.4 Extended Greeting 1 Example
24.10.5 Weather 5 Exercise
24.11 String Methods Lesson
24.11.1 String Methods 1 Video
24.11.2 String Methods 2 Check for Understanding
24.11.3 upper and lower 1 Example
24.11.4 ENTHUSIASM! 5 Exercise
24.11.5 strip 1 Example
24.11.6 find 1 Example
24.11.7 Using Documentation 5 Exercise
24.12 Lists (Arrays) and Objects Lesson
24.12.1 Lists (Arrays) 5 HTML Notes
24.12.2 Lists Quiz 4 Check for Understanding
24.12.3 Favorite Foods 5 Example
24.12.4 My Favorite Movies 5 Exercise
24.12.5 Objects in Python 5 HTML Notes
24.12.6 Object and Methods 5 Example
24.12.7 Objects in Python Quiz 5 Check for Understanding
Cryptocurrency
25.1 What is Currency? Lesson
25.1.1 What is Currency? 1 Video
25.1.2 What is Currency? 2 Check for Understanding
25.1.3 What Gives Paper Money Its Actual Value 1 Connection
25.1.4 What Gives Money Its Value 5 Free Response
25.1.5 Money: What is it Good For? 1 Resource
25.2 What is Cryptocurrency? Lesson
25.2.1 Cryptocurrency Basics 1 Video
25.2.2 Cryptocurrency Basics 5 Check for Understanding
25.2.3 Cryptocurrency Module Overview 1 Video
25.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
25.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
25.2.6 Show Me the Money 1 Resource
25.2.7 American Currency Exhibit 5 Free Response
25.3 Intro to Blockchain Lesson
25.3.1 Intro to Blockchain 1 Video
25.3.2 Intro to Blockchain 3 Check for Understanding
25.3.3 CryptoKitties 1 Connection
25.3.4 CryptoKitties 5 Free Response
25.4 Hashing Lesson
25.4.1 Hashing 1 Video
25.4.2 Hashing 3 Check for Understanding
25.4.3 SHA256 Hash Generator 1 Connection
25.4.4 Using the SHA256 Hash Generator 5 Free Response
25.5 Proof of Work Lesson
25.5.1 Proof of Work 1 Video
25.5.2 Proof of Work 3 Check for Understanding
25.5.3 Mining the Block 1 Video
25.5.4 Mining the Block 3 Check for Understanding
25.5.5 PoW vs. Proof of Stake 1 Connection
25.5.6 PoW vs. PoS 5 Free Response
25.5.7 Checking Proof of Work 1 Resource
25.6 Advanced Blockchain Lesson
25.6.1 Advanced Blockchain (part 1) 1 Video
25.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
25.6.3 Blockchain Buzz 1 Connection
25.6.4 Blockchain Buzz 5 Free Response
25.6.5 Advanced Blockchain (part 2) 1 Video
25.6.6 Advanced Blockchain (part 2) 5 Free Response
25.6.7 Make a Blockchain 1 Resource
25.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
25.7 Cryptocurrencies Lesson
25.7.1 Cryptocurrencies 1 Video
25.7.2 Cryptocurrencies 3 Check for Understanding
25.7.3 Shiny Toy Phenomenon 5 Free Response
25.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
25.7.5 Walmart Use of Blockchain 5 Free Response
25.8 Bitcoin Lesson
25.8.1 Bitcoin 1 Video
25.8.2 Bitcoin 3 Check for Understanding
25.8.3 51% Attack Explained 1 Connection
25.8.4 51% Attack 5 Free Response
25.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
25.8.6 Bitcoin Bust 5 Free Response
25.8.7 Explore the Bitcoin Blockchain 1 Resource
25.9 Pros, Cons, and Future of Cryptocurrencies Lesson
25.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
25.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
25.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
25.9.4 Cryptocurrency Pros and Cons 1 Connection
25.9.5 Crypto Pros and Cons 5 Free Response
25.9.6 What is HODL? 1 Connection
25.9.7 What is HODL? 5 Free Response
25.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
25.10 Project: Cryptocurrency Expert Panel Talk Lesson
25.10.1 Overview 5 Free Response
25.10.2 Preview Sample Expert Panels 5 Free Response
25.10.3 Investigate a Cryptocurrency Topic 5 Free Response
25.10.4 Write an Outline and Rehearse 5 Free Response
25.10.5 Expert Panel Talk (Presentation) 5 Free Response
25.11 Cryptocurrency Quiz Lesson
25.11.1 Cryptocurrency Quiz 10 Unit Quiz
25.11.2 Cryptocurrency Badge 0 Badge
Web Development
26.1 Introduction to HTML Lesson
26.1.1 Introduction to HTML 1 Video
26.1.2 Introduction to HTML Quiz 1 Check for Understanding
26.1.3 Our First HTML Page 1 Example
26.1.4 Say Hello! 5 Exercise
26.2 Structure of an HTML Page Lesson
26.2.1 Structure of an HTML Page 1 Video
26.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
26.2.3 HTML Template 1 Example
26.2.4 Hello World Page 1 Example
26.2.5 The <title> Tag 5 Exercise
26.2.6 Your First HTML Page 5 Exercise
26.2.7 Structure Badge 1 Badge
26.3 Formatting Text Lesson
26.3.1 Formatting Text 1 Video
26.3.2 Formatting Text Quiz 1 Check for Understanding
26.3.3 Dictionary 1 Example
26.3.4 That's Bold 5 Exercise
26.3.5 Artificial Intelligence 5 Exercise
26.3.6 State Capitals 5 Exercise
26.4 Links Lesson
26.4.1 Links 1 Video
26.4.2 Links Quiz 1 Check for Understanding
26.4.3 The <a> Tag 1 Example
26.4.4 Simple Link 5 Exercise
26.4.5 My Favorite Websites 5 Exercise
26.5 Images Lesson
26.5.1 Images 1 Video
26.5.2 Images Quiz 1 Check for Understanding
26.5.3 The <img> Tag 1 Example
26.5.4 Building the CodeHS Homepage 1 Example
26.5.5 Collage on a Theme 5 Exercise
26.5.6 Linking an Image 5 Exercise
26.5.7 Personal Library 5 Exercise
26.5.8 Images Badge 1 Badge
26.6 HTML Lists Lesson
26.6.1 HTML Lists 1 Video
26.6.2 HTML Lists Quiz 1 Check for Understanding
26.6.3 Grocery Shopping 1 Example
26.6.4 Favorite Things 5 Exercise
26.6.5 To-Do List 5 Exercise
26.6.6 List Article 5 Exercise
26.7 HTML Tables Lesson
26.7.1 HTML Tables 1 Video
26.7.2 HTML Tables Quiz 3 Check for Understanding
26.7.3 Address Book 1 Example
26.7.4 Favorite Songs 5 Exercise
26.7.5 Calendar 5 Exercise
26.8 HTML Styling Lesson
26.8.1 HTML Styling 1 Video
26.8.2 HTML Styling Quiz 1 Check for Understanding
26.8.3 Stylish Address Book 1 Example
26.8.4 Background Colors 5 Exercise
26.8.5 Style Your To-Do List 5 Exercise
26.9 Introduction to CSS Lesson
26.9.1 Introduction to CSS 1 Video
26.9.2 Introduction to CSS Quiz 2 Check for Understanding
26.9.3 Styling Your H1s 1 Example
26.9.4 First Style with CSS 5 Exercise
26.9.5 List Styling 5 Exercise
26.10 CSS Select by Tag Lesson
26.10.1 CSS Select by Tag 1 Video
26.10.2 CSS Select by Tag Quiz 1 Check for Understanding
26.10.3 Rainbow 1 Example
26.10.4 Dog Styling 1 Example
26.10.5 Restaurant Menu 5 Exercise
26.10.6 Put Karel Together 5 Exercise
26.11 CSS Select by Class Lesson
26.11.1 CSS Select by Class 1 Video
26.11.2 CSS Select by Class Quiz 1 Check for Understanding
26.11.3 Simple Checkerboard 1 Example
26.11.4 Tic Tac Toe 5 Exercise
26.11.5 Music Library 5 Exercise
26.12 CSS Select by ID Lesson
26.12.1 CSS Select by ID 1 Video
26.12.2 CSS Select by ID Quiz 1 Check for Understanding
26.12.3 Logo 1 Example
26.12.4 Favorite Dog 5 Exercise
26.12.5 Bingo 5 Exercise
26.12.6 CSS Badge 1 Badge
26.13 Viewing Websites Lesson
26.13.1 Viewing Websites 1 Video
26.13.2 Viewing Websites Quiz 5 Check for Understanding
26.13.3 Explaining a URL 5 Free Response
26.14 Web Development Quiz Lesson
26.14.1 Web Development Quiz 15 Unit Quiz
26.15 Your First Website Lesson
26.15.1 Set Up Your codehs.me Website 10 Challenge
26.15.2 Practice PT: Your First Website 10 Challenge
26.15.3 Website Badge 1 Badge
SQL Part II: The SQL
27.1 More Filtering Practice Lesson
27.1.1 Initials 5 Exercise
27.1.2 Compound Queries with BETWEEN 5 Exercise
27.1.3 Gryffindors With G Names 5 Exercise
27.1.4 R First Names 5 Exercise
27.1.5 FF Houses 5 Exercise
27.2 Ordering Results Lesson
27.2.1 The ORDER BY Keyword 1 Video
27.2.2 ORDER BY 1 Notes
27.2.3 ORDER BY First Name 1 Example
27.2.4 Reverse Order 1 Example
27.2.5 Order By Multiple Fields 1 Example
27.2.6 House Ordering 5 Exercise
27.2.7 Sort the P Names 5 Exercise
27.3 Renaming Fields Lesson
27.3.1 Renaming Fields with AS 1 Notes
27.3.2 Renaming in the House Table 1 Example
27.3.3 Changing Column Names 5 Exercise
27.4 Joining Tables Lesson
27.4.1 The JOIN command 1 Video
27.4.2 Basic Joining 1 Notes
27.4.3 Letters and Numbers 1 Example
27.4.4 Person and House 1 Example
27.4.5 Person and House (Correct) 1 Example
27.4.6 Person and House (with namespacing) 1 Example
27.4.7 List All Gryffindors 5 Exercise
27.4.8 JOIN With Yourself 1 Video
27.4.9 Renaming Tables 1 Notes
27.4.10 Quidditch Matchups 1 Example
27.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
27.5 More Joining Tables Lesson
27.5.1 The Course Table 1 Example
27.5.2 Courses and Professors 5 Exercise
27.5.3 Courses, Professors, and Houses 5 Exercise
27.5.4 Courses Taught By Gryffindors 5 Exercise
27.5.5 The Enrollment Table 1 Example
27.5.6 Students Taking Potions 5 Exercise
27.5.7 Non-Slytherins Taking Potions 5 Exercise
27.5.8 Defense Students by House 5 Exercise
27.5.9 Neville's Courses 5 Exercise
Embedded Correlations
28.1 Embedded Correlations Lesson
28.1.1 Embedded Correlations 5 Article
Cybersecurity Level 1 Certification Practice
29.1 Cybersecurity Essentials Lesson
29.1.1 Quiz: Cybersecurity Essentials 8 Quiz
29.1.2 Cybersecurity Essentials Reflection 5 Notes
29.2 Cryptography Lesson
29.2.1 Quiz: Cryptography 8 Quiz
29.2.2 Cryptography Reflection 5 Notes
29.3 System Administration Lesson
29.3.1 Quiz: System Administration 8 Quiz
29.3.2 System Administration Reflection 5 Notes
29.4 IT Concepts Lesson
29.4.1 Quiz: IT Infrastructure 8 Quiz
29.4.2 IT Concepts Reflection 5 Notes
29.5 IT Infrastructure Lesson
29.5.1 Quiz: Cybersecurity Essentials 3 Quiz
29.5.2 IT Infrastructure Reflection 5 Notes
29.6 Digital Safety and Data Security Lesson
29.6.1 Quiz: Digital Safety and Data Security 8 Quiz
29.6.2 Digital Safety and Data Security Reflection 5 Notes
29.7 Mixed Practice Test Lesson
29.7.1 Important Note 5 Notes
29.7.2 Mixed Practice 20 Quiz
29.7.3 Mixed Practice Reflection 5 Notes
Extra
30.1 Lesson 1 Lesson
30.1.1 Compound Queries 5 Example