Please enable JavaScript to use CodeHS


Introduction to Cybersecurity (Alberti)

Lessons

  1. Introduction to Cybersecurity Pretest

    1. 1.1 Introduction to Cybersecurity Pretest

    2. Description

      In this pre-test for the Introduction to Cybersecurity course students and teachers can determine their general skills and current knowledge base before starting the course.

    3. Objective

      SWBAT complete the assessment.

  2. What is Cybersecurity?

    1. 2.1 Module Overview - Cybersecurity

    2. Description

      In this lesson, students learn that since the Internet is used to send, receive, and store valuable personal information, users are put at risk of having this information stolen through cyber attacks. Cybersecurity is a field that involves several disciplines of computer science. It is valuable to build basic computer science literacy no matter what field you eventually enter.

    3. Objective

      Students will be able to:

      • Set individual learning goals for themselves in the cybersecurity course
      • Explain why it is important to learn computer science, regardless of their goals in college and career
    4. 2.2 What is Cybersecurity?

    5. Description

      In this lesson, students will learn what is meant by cybersecurity and explore a few news worthy cyber attacks. They will also discuss the Internet of Things and the increase in connected devices.

      Cybersecurity is the protection of computer systems, networks, and data from digital attacks. Increased connectivity via the Internet of Things and reliance on computer devices to send and store data makes users more vulnerable to cyber attacks.

    6. Objective

      Students will be able to:

      • Define cybersecurity
      • Describe how the Internet of Things makes people more vulnerable to cyber attacks
      • Reflect on recent cyber attacks and identify the financial and societal impact of the attack
    7. 2.3 Impact of Cybersecurity

    8. Description

      In this lesson, students will learn and examine recent cyber attacks. Cyber attacks result in financial loss, lowered trust, disruption of important services, and more. There is a growing need for cybersecurity experts, and careers in the field are lucrative with high-impact.

    9. Objective

      Students will be able to:

      • Evaluate recent cyber attacks and understand the negative consequences of these attacks
      • Understand career opportunities in the field of cybersecurity
    10. 2.4 The CIA Triad

    11. Description

      In this lesson, students will learn about The CIA Triad. The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

      • Confidentiality is the protection of information from people who are not authorized to view it.
      • Integrity aims at ensuring that information is protected from unauthorized or unintentional alteration.
      • Availability is the assurance that systems and data are accessible by authorized users when and where needed.
    12. Objective

      Students will be able to:

      • Identify what the CIA triad is and how it relates to cybersecurity
      • Identify which part of the CIA triad has been broken in a given scenario
    13. 2.5 What is Cybersecurity? Quiz

    14. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    15. Objective

      Students will be able to:

      • Prove their knowledge of basic cybersecurity concepts and its impacts through a multiple choice quiz
  3. Digital Citizenship and Cyber Hygiene

    1. 3.1 Digital Footprint and Reputation

    2. Description

      In this lesson, students understand how they can control and protect their footprint. As students use the Internet, they are building their digital footprint. This includes social media posts, emails, picture and video uploads amongst other online activities.

    3. Objective

      Students will be able to:

      • Understand how their online activity contributes to a permanent and public digital footprint
      • Articulate their own social media guidelines to protect their digital footprint
    4. 3.2 Cyberbullying

    5. Description

      In this lesson, students will learn about and discuss cyberbullying. Cyberbullying is the use of electronic communication to harass or target someone. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.

    6. Objective

      Students will be able to:

      • Understand the impact of cyberbullying, and identify unacceptable bullying behavior
      • Identify proper actions to take if they are victims of cyberbullying or if they observe someone being cyberbullied
    7. 3.3 Internet Safety

    8. Description

      In this lesson, students will learn to recognize online predatory behavior and strategies on how to avoid and respond to it. The Internet is a great place to socialize, but it is important to be aware of risks. Common sense and following safety guidelines can help students stay safe online.

    9. Objective

      Students will be able to:

      • Identify predatory behavior and how to respond to it online
    10. 3.4 Privacy & Security

    11. Description

      In this lesson, students will discuss and examine policies regarding privacy and security. Using best practices like setting strong passwords, reading privacy policies, and using https can help in staying safe online.

    12. Objective

      Students will be able to:

      • Use best practices in personal privacy and security, including strong passwords, using https, and reading privacy policies
    13. 3.5 Information Literacy

    14. Description

      In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

    15. Objective

      Students will be able to:

      • Effectively search for and evaluate resources
    16. 3.6 Creative Credit & Copyright

    17. Description

      In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

    18. Objective

      Students will be able to:

      • Explain what copyright laws are and why they are important
      • Find images they are legally allowed to use in their projects
      • Accurately attribute images they find and want to use
    19. 3.7 Hacking Ethics

    20. Description

      In this lesson, students will explore and discuss the ethics and legality around hacking. A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network. There are white hat hackers, who help companies find and protect exploits in their systems, and black hat hackers who hack maliciously.

    21. Objective

      Students will be able to:

      • Identify the difference between white hat hacking and black hat hacking
      • Explain career opportunities in cybersecurity
    22. 3.8 Project: Public Service Announcement

    23. Description

      Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!

    24. Objective

      Students will be able to:

      • Create a public service announcement for members of their community about a topic in digital citizenship or cyber hygiene
      • Use google sheets to store and analyze data, and create a data visualization.
    25. 3.9 Digital Citizenship and Cybersecurity Quiz

    26. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    27. Objective

      Students will be able to:

      • Prove their knowledge of digital citizenship and cyber hygiene concepts through a multiple choice quiz
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Description

      In this lesson, students will learn how basic encryption and decryption works. There is a need for secrecy when sending and receiving personal information. Encryption and decryption are used to protect personal information.

    3. Objective

      Students will be able to:

      • Define cryptography, cryptology, and cryptanalysis
      • Explain the need for encryption and how basic encryption and decryption works
      • Relate encryption with how it affects the CIA Triad
    4. 4.2 History of Cryptography

    5. Description

      In this lesson, students will learn the history of cryptography. Humans have always had reasons to hide information, and throughout history they have used crypto systems of varying complexity to keep information safe.

    6. Objective

      Students will be able to:

      • Explain the purpose of cryptography and how different crypto systems have been used throughout history
    7. 4.3 Why encrypt?

    8. Description

      Encryption enforces the confidentiality and integrity of a network by preventing from unauthorized parties from viewing or tampering with information.

    9. Objective

      SWBAT explain which parts of the CIA triad are strengthened by encryption.

    10. 4.4 Basic Crypto Systems: Caesar Cipher

    11. Description

      In this lesson, students will learn and practice using the Caesar Cipher. The Caesar Cipher is an encryption method that predates computers in which each letter of the message is shifted by a certain amount, called the key.

    12. Objective

      Students will be able to:

      • Encrypt and decrypt messages using the Caesar Cipher
    13. 4.5 Basic Crypto Systems: Cracking Caesar

    14. Description

      In this lesson, students will practice using brute force and letter frequency to crack the Caesar Cipher. The Caesar Cipher is an encryption method in which each letter of the message is shifted by a certain amount, called the key. Cracking the Caesar Cipher with brute force (trying every combination) is a trivial matter for modern computers.

    15. Objective

      Students will be able to:

      • Explain why the Caesar Cipher is so easy for a computer to crack
      • Use basic letter distribution analysis to decrypt a simple message
    16. 4.6 Basic Crypto Systems: Vigenere Cipher

    17. Description

      In this lesson, students will learn and use the Vigenère Cipher. The Vigenère Cipher consists of several Caesar ciphers in sequence with different shift values based on a keyword, so brute force and letter frequency analysis do not work.

    18. Objective

      Students will be able to:

      • Explain how the Vigenère Cipher works and why it is not as easy to crack as the Caesar Cipher
    19. 4.7 Advanced Cryptography

    20. Description

      In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.

    21. Objective

      Students will be able to:

      • Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics

      • Explain the difference between symmetric and asymmetric encryption

    22. 4.8 Hash Functions

    23. Description

      In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.

    24. Objective

      Students will be able to:

      • Identify what a hashing algorithm is and its related vocabulary, such as digest and collisions
      • Describe what makes an ideal hashing algorithm and why they are important in encryption and cybersecurity overall
      • Describe how malicious actors try to crack hashing algorithms
    25. 4.9 Hash Function Development

    26. Description

      In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.

    27. Objective

      Students will be able to:

      • Solve simple modulo problems
      • Explain why modulo math is useful in hashing algorithms and protecting data in cybersecurity
    28. 4.10 Project: Classic Cipher Newscast

    29. Description

      In this project, students will get to create a newscast about a cipher! This could be pre-recorded or presented live and could be a great way to vary the standard group presentation on a topic. The components of the presentation should include:

      • Introduction to newscast
      • Breaking news or lead story
      • Expert or on-scene interview (this can be part of the lead story or second story)
      • Second story
      • Commercial
      • Wrap-up of newscast
    30. Objective

      Students will be able to:

      • Create a newscast as part of a group to report out about a cipher
    31. 4.11 The ABCs of Cryptography Quiz

    32. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    33. Objective

      Students will be able to:

      • Prove their knowledge of basic crytography concepts through a multiple choice quiz
  5. Final Project: PSA

    1. 5.1 Project: PSA

    2. Description

      Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!

    3. Objective

      SWBAT create a public service announcement for members of their community about a topic in digital citizenship or cyber hygiene.

  6. Software Security

    1. 6.1 Inside Web Apps

    2. Description

      In this lesson, students will look under the hood of web sites and web applications by using “view page source” in a browser. This will enable them to see HTML markup for images, navigation, and page layouts, CSS styling, and even JavaScript source code or links to JS files. Students will also view code that has been minified and understand what that means. Lastly, students will also take a first look at OWASP (Open Web Application Security Project) which is an important organization in cybersecurity.

    3. Objective

      Students will be able to:

      • Identify major sections of code within the view source of a web page/app
      • Understand the importance of OWASP and how it relates to the field of cybersecurity
    4. 6.2 Developer Tools

    5. Description

      In this lesson, students will learn about and use the developer tools in a browser. Web developers actually use these to help build and test websites. Cyber professionals need to be very familiar with the different ways of looking at how sites and apps function so they can use various tools to detect vulnerabilities or even detect attacks as they are starting.

    6. Objective

      Students will be able to:

      • Identify major developer tools within the inspect element
      • Explain the major difference between view page source and what is rendered in the inspect tools
      • Explain in general terms what each major tool in the inspect area can show a developer
      • Explain how the developer tools can help web developers build and maintain sites, and how understanding the tools can potentially help cyber professionals who are trying to keep sites and data secure
    7. 6.3 Databases

    8. Description

      In this lesson, students will take a look at what databases are, how they are organized and used, the major parts of a database, and what a database schema is and generally looks like.

    9. Objective

      Students will be able to:

      • Explain the primary purposes of a database
      • Identify and explain the major parts of a database
      • Understand the implications of database storage on the protection of data within the field of cybersecurity
    10. 6.4 Clients and Servers

    11. Description

      In this lesson, students take a look at what client and server devices and applications are, the client-server model, and how databases are part of that client-server model. They will get a high-level view of how clients and servers work together to help exchange information and data over a network or the Internet.

    12. Objective

      Students will be able to:

      • Identify a client device and explain its purpose
      • Identify a server device and explain its purpose
      • Explain the client-server model
    13. 6.5 What is SQL?

    14. Description

      In this lesson, students will be introduced to SQL (structured query language). Students will also learn how a database is structured into tables and rows.

    15. Objective

      Students will be able to:

      • Explain what the SQL programming language does
      • Define the different parts of a database (table, column, row)
      • Define what a schema is in relation to a database
    16. 6.6 Structuring Data in SQL

    17. Description

      This lesson is about how a database is structured into tables and rows.

    18. Objective

      *SWBAT define the different parts of a database (table, column, row).
      *SWBAT define what a schema is in relation to a database.

    19. 6.7 Basic Querying in SQL

    20. Description

      In this lesson, we learn about and use the SELECT statement in SQL. The SELECT statement is used to query the database and return a row or multiple rows from a table in the database.

    21. Objective

      Students will be able to:

      • Use a SELECT statement in SQL to query a database using * or the FROM statement
    22. 6.8 Filtering Queries in SQL

    23. Description

      In this lesson, students learn about the WHERE clause and basic filtering of queries in SQL.

    24. Objective

      Students will be able to:

      • Use a WHERE clause in a statement in SQL to filter queries
    25. 6.9 Common Security Problems

    26. Description

      In this lesson, students learn the overall concept of security: what it means to them personally and what it means to organizations in a digital world. They will reflect on what makes them feel secure.

    27. Objective

      Students will be able to:

      • Explain what security means on a personal and organizational level
    28. 6.10 SQL Injection Overview

    29. Description

      This lesson provides an overview of what SQL injection is, the impact, how it works, and how hackers use SQL to attack a site. The lesson also has connections on the Equifax cyber attack that was a very large scale SQL injection.

    30. Objective

      Students will be able to:

      • Understand and explain what a SQL injection attack is and the ongoing, pervasive impact of SQLi cyber attacks
    31. 6.11 Types of SQLi and Prevention

    32. Description

      In this lesson, students will learn and discuss types of SQLi and ways to prevent or at least mitigate an attack.

    33. Objective

      Students will be able to:

      • Explain the 3 types of SQLi and the vulnerability associated with each
      • Understand the fundamentals of how SQL injections are prevented or at least mitigated
    34. 6.12 Cross-site Scripting

    35. Description

      In this lesson, students will learn about and discuss cross-site scripting (XSS), which is another major OWASP (Open Web Application Security Project) cybersecurity risk.

    36. Objective

      Students will be able to:

      • Explain what XSS is, how it works, and what kind of damage can occur from an XSS attack
      • Understand the fundamentals of how XSS attacks are prevented or at least mitigated
    37. 6.13 Software Security Quiz

    38. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    39. Objective

      Students will be able to:

      • Prove their knowledge of software security concepts through a multiple choice quiz
  7. Networking Fundamentals

    1. 7.1 Introduction to the Internet

    2. Description

      In this lesson, students will explore at a high-level what the internet is and how the internet works.

    3. Objective

      Students will be able to:

      • Understand what the internet is
      • Understand how the internet works
    4. 7.2 Internet Hardware and Sending Information

    5. Description

      In this lesson, students will explore the hardware that makes up the internet and the characteristics of that hardware that define our experience on the internet.

    6. Objective

      Students will be able to:

      • Discuss and answer questions about the hardware that powers the internet
    7. 7.3 Internet Addresses

    8. Description

      In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol.

    9. Objective

      Students will be able to:

      • Discuss the necessity of internet protocols
      • Recognize the hierarchy of elements in an IP address
    10. 7.4 Domain Name System (DNS)

    11. Description

      In this lesson, students will explore the DNS system and how it maps human readable domain names into actual accessible IP addresses.

    12. Objective

      Students will be able to:

      • Understand the DNS system and how it works
      • Recognize the DNS system as an abstraction
    13. 7.5 Routing

    14. Description

      In this lesson, students explore how messages get from one address on the internet to another.

    15. Objective

      Students will be able to:

      • Explain how computers communicate using routers
      • Explain what considerations are made when choosing a route
      • Discuss how routers are fault-tolerant because of redundancy
    16. 7.6 Packets & Protocols

    17. Description

      In this lesson, students learn about the last piece of the puzzle for how the Internet works: Packets and Protocols. All information sent over the internet is broken down into small groups of bits called packets. The format for creating and reading packets is defined by open protocols so that all devices can read packets from all other devices.

    18. Objective

      Students will be able to:

      • Explain the packet process and how protocols (TCP/IP and HTTP) are vital to the exchange of information on the Internet
      • Explain the Hyper Text Transfer Protocol
    19. 7.7 Viewing a Webpage

    20. Description

      In this lesson, students learn how all of the pieces of the puzzle (IP addresses, the DNS system, routing, and packets and protocols) fit together to send information over the internet. Students will extend these new concepts to consider net neutrality and its ramifications on cybersecurity.

    21. Objective

      Students will be able to:

      • Describe the process that occurs when typing in a URL, from sending a request and response over the Internet to viewing a webpage
      • Explain what net neutrality is and any implications for cybersecurity
    22. 7.8 Impact of the Internet

    23. Description

      In this lesson, students are presented with different ways that the Internet impacts their lives. The Internet affects the way that people communicate (emails, social media, video chat) and collaborate to solve problems. It has revolutionized the way that people can learn and even buy things. Because the Internet is present in almost every facet of people’s lives, there are severe ethical and legal concerns that derive from the Internet.

    24. Objective

      Students will be able to:

      • Analyze the different ways that the Internet impacts their lives by learning about how the Internet contributes to collaboration, communication, etc
      • Evaluate whether the Internet has a more positive or negative effect on their community by citing examples from the lesson
      • Explain what the digital divide is and articulate their own opinions related to it
    25. 7.9 Network Attacks

    26. Description

      In this lesson, students are presented with the main ways that networks are attacked: social engineering and DoS or DDoS. They will build on their knowledge of how the internet works by shifting the focus from understanding the internet and networks to safeguarding networks from malicious attackers.

    27. Objective

      Students will be able to:

      • Explain the difference between a vulnerability and an exploit
      • Understand typical social engineering techniques used to bring down a network
      • Explain what a DOS or DDoS attack is and why it can be especially devastating and far reaching for organizations
    28. 7.10 Network Administration

    29. Description

      In this lesson, students explore what a network administrator career entails.

    30. Objective

      Students will be able to:

      • Explain the AAA (authentication, authorization, accounting) protocol and how it supports network security
      • Read a network log and analyze it for basic intrusion detection
      • Establish basic firewall rules for a network
      • Explain what an Intrusion Detection System (IDS) does to support network security
      • Explain in basic terms what a network administrator does
    31. 7.11 Project: Secure the Company's Network

    32. Description

      In this project, students will analyze a log file and establish a firewall, then write a security assessment report about their findings and recommendations.

    33. Objective

      Students will be able to:

      • Perform basic log reading and establish some firewall rules to help secure a simulated network at a company
      • Write a security assessment report for the CTO of a fictitious company (see description and outline in the project description)
    34. 7.12 Networking Fundamentals Quiz

    35. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    36. Objective

      Students will be able to:

      • Prove their knowledge of networking fundamentals concepts through a multiple choice quiz
  8. Final Course Project

    1. 8.1 Final Course Project

    2. Description

      In this culminating course project, students will get to research and create a presentation with a handout/flyer around either user education or a cyber security career with the intended audience being the general public.

    3. Objective

      Students will be able to:

      • Research and create a presentation and handout around one of the two possible cybersecurity-related topics.
  9. Cryptocurrency

    1. 9.1 What is Currency?

    2. Description
    3. Objective
    4. 9.2 What is Cryptocurrency?

    5. Description
    6. Objective
    7. 9.3 Intro to Blockchain

    8. Description
    9. Objective
    10. 9.4 Hashing

    11. Description
    12. Objective
    13. 9.5 Proof of Work

    14. Description
    15. Objective
    16. 9.6 Advanced Blockchain

    17. Description
    18. Objective
    19. 9.7 Cryptocurrencies

    20. Description
    21. Objective
    22. 9.8 Bitcoin

    23. Description
    24. Objective
    25. 9.9 Pros, Cons, and Future of Cryptocurrencies

    26. Description
    27. Objective
    28. 9.10 Project: Cryptocurrency Expert Panel Talk

    29. Description
    30. Objective
    31. 9.11 Cryptocurrency Quiz

    32. Description
    33. Objective
  10. Project: Security Assessment Report

    1. 10.1 Project: Security Assessment Report

    2. Description

      In this project, students will get to test a site for vulnerabilities and write a security assessment report about their findings and recommendations.

    3. Objective

      Students will be able to:

      • Perform basic SQLi testing to determine vulnerabilities on a site.
      • Write a security assessment report for the CTO of a fictitious company (see description and outline in the project description).