Activity | Points | Item Type |
---|---|---|
Introduction to Cybersecurity Pretest | ||
1.1 Introduction to Cybersecurity Pretest | Lesson | |
1.1.1 About the Pretest | 1 | Notes |
1.1.2 Mindsets | 1 | Survey |
1.1.3 Introduction to Cybersecurity Knowledge & Skills | 15 | Quiz |
What is Cybersecurity? | ||
2.1 Module Overview - Cybersecurity | Lesson | |
2.1.1 Welcome to Cybersecurity | 1 | Video |
2.1.2 Welcome to Cybersecurity | 2 | Check for Understanding |
2.1.3 Cybersecurity and You | 5 | Free Response |
2.1.4 Course Goals | 5 | Free Response |
2.2 What is Cybersecurity? | Lesson | |
2.2.1 What is Cybersecurity? | 1 | Video |
2.2.2 What is Cybersecurity? | 3 | Check for Understanding |
2.2.3 City Services Ransomware | 1 | Connection |
2.2.4 Ransomware Reflection | 5 | Free Response |
2.2.5 Internet of Things | 1 | Connection |
2.2.6 Hackers vs. Smart Homes | 1 | Connection |
2.2.7 Internet of Things Reflection | 5 | Free Response |
2.2.8 Threat Map | 1 | Connection |
2.2.9 Why Learn about Cybersecurity? | 5 | Free Response |
2.3 Impact of Cybersecurity | Lesson | |
2.3.1 Impact of Cybersecurity | 1 | Video |
2.3.2 Impact of Cybersecurity | 2 | Check for Understanding |
2.3.3 Phishing for Your Info | 1 | Connection |
2.3.4 Phishing Reflection | 5 | Free Response |
2.3.5 Cyber Game | 1 | Connection |
2.3.6 Cyber Game Reflection | 5 | Free Response |
2.3.7 Cyber Crime Time | 1 | Connection |
2.3.8 Cyber Crime Time Reflection | 5 | Free Response |
2.4 The CIA Triad | Lesson | |
2.4.1 CIA Triad | 1 | Video |
2.4.2 CIA Triad | 2 | Check for Understanding |
2.4.3 Which part of the CIA Triad? | 5 | Free Response |
2.4.4 Which part of the CIA Triad? | 5 | Free Response |
2.4.5 Breach of Confidentiality | 5 | Free Response |
2.4.6 Breach of Availability | 5 | Free Response |
2.5 What is Cybersecurity? Quiz | Lesson | |
2.5.1 What is Cybersecurity? Quiz | 10 | Quiz |
2.5.2 Intro to Cybersecurity Badge | 1 | Badge |
Digital Citizenship and Cyber Hygiene | ||
3.1 Digital Footprint and Reputation | Lesson | |
3.1.1 Digital Footprint and Reputation | 1 | Video |
3.1.2 Digital Footprint and Reputation | 3 | Check for Understanding |
3.1.3 Building a Positive Digital Footprint | 5 | Free Response |
3.1.4 Right to be Forgotten? | 1 | Connection |
3.1.5 Right to be Forgotten | 5 | Free Response |
3.1.6 What is your Digital Footprint? | 5 | Free Response |
3.2 Cyberbullying | Lesson | |
3.2.1 Cyberbullying | 1 | Video |
3.2.2 Cyberbullying | 3 | Check for Understanding |
3.2.3 Scenario: Student Ranking | 5 | Free Response |
3.2.4 Scenario: Singled Out | 5 | Free Response |
3.2.5 Stopping Cyberbullying | 5 | Free Response |
3.3 Internet Safety | Lesson | |
3.3.1 Internet Safety | 1 | Video |
3.3.2 Internet Safety | 2 | Check for Understanding |
3.3.3 Scenario: School Stranger | 5 | Free Response |
3.3.4 Scenario: Vacation Pals | 5 | Free Response |
3.3.5 Staying Safe | 5 | Free Response |
3.4 Privacy & Security | Lesson | |
3.4.1 What is Data Privacy & Security? | 1 | Video |
3.4.2 Privacy & Security Quiz | 2 | Check for Understanding |
3.4.3 How Strong is your Password? | 1 | Connection |
3.4.4 How Strong is your password? | 5 | Free Response |
3.4.5 Google Privacy Policy Search | 1 | Connection |
3.4.6 Google Privacy Policy Search | 5 | Free Response |
3.5 Information Literacy | Lesson | |
3.5.1 Information Literacy | 1 | Video |
3.5.2 Information Literacy | 2 | Check for Understanding |
3.5.3 Effective Internet Searches | 5 | Free Response |
3.5.4 Evaluate the Source 1 | 1 | Connection |
3.5.5 Respond: Evaluate the Source 1 | 5 | Free Response |
3.5.6 Evaluate the Source 2 | 1 | Notes |
3.5.7 Respond: Evaluate the Source 2 | 5 | Free Response |
3.5.8 Hero Pig? | 1 | Connection |
3.6 Creative Credit & Copyright | Lesson | |
3.6.1 Creative Credit and Copyright | 1 | Video |
3.6.2 Creative Credit and Copyright | 2 | Check for Understanding |
3.6.3 Cite! | 5 | Free Response |
3.6.4 Exploring Creative Commons | 1 | Connection |
3.6.5 Respond: Creative Commons | 5 | Free Response |
3.6.6 Task: Finding Images | 5 | Free Response |
3.6.7 Reflection: Why is Copyright Important? | 5 | Free Response |
3.7 Hacking Ethics | Lesson | |
3.7.1 Hacking Ethics & Legality | 1 | Video |
3.7.2 Hacking Ethics & Legality | 3 | Check for Understanding |
3.7.3 Penetration Testing | 1 | Connection |
3.7.4 Reflection: Penetration Testing | 5 | Free Response |
3.7.5 Hack the Pentagon? | 1 | Connection |
3.7.6 Reflection: Hack the Pentagon | 5 | Free Response |
3.7.7 Ethical Hacker Agreement | 1 | Check for Understanding |
3.8 Project: Public Service Announcement | Lesson | |
3.8.1 Pick a Topic | 5 | Free Response |
3.8.2 Research | 5 | Free Response |
3.8.3 Choose Your Audience | 5 | Free Response |
3.8.4 What kind of PSA? | 5 | Free Response |
3.8.5 Draft your PSA | 5 | Free Response |
3.8.6 Finalize your PSA! | 15 | Free Response |
3.9 Digital Citizenship and Cybersecurity Quiz | Lesson | |
3.9.1 Digital Citizenship and Cybersecurity Quiz | 10 | Unit Quiz |
3.9.2 Digital Citizenship and Cybersecurity Badge | 1 | Badge |
The ABCs of Cryptography | ||
4.1 Cryptography, Cryptology, Cryptanalysis | Lesson | |
4.1.1 Cryptography, Cryptology, Cryptanalysis | 1 | Video |
4.1.2 Cryptography, Cryptology, Cryptanalysis | 2 | Check for Understanding |
4.1.3 Securing the Cloud | 1 | Connection |
4.1.4 Encryption Reflection | 5 | Free Response |
4.2 History of Cryptography | Lesson | |
4.2.1 Cryptography: A Brief History | 1 | Video |
4.2.2 Cryptography History Quiz | 2 | Check for Understanding |
4.2.3 How the Enigma Worked | 1 | Connection |
4.2.4 How the Enigma Worked | 5 | Free Response |
4.2.5 Unknown Languages and the Future of Cryptography | 1 | Connection |
4.2.6 The Future of Cybersecurity | 5 | Free Response |
4.3 Why encrypt? | Lesson | |
4.3.1 Why encrypt? | 1 | Video |
4.3.2 Why encrypt? | 2 | Check for Understanding |
4.4 Basic Crypto Systems: Caesar Cipher | Lesson | |
4.4.1 Caesar Cipher | 1 | Video |
4.4.2 Caesar Cipher | 2 | Check for Understanding |
4.4.3 Caesar Cipher | 1 | Example |
4.4.4 Decrypting Caesar | 5 | Exercise |
4.5 Basic Crypto Systems: Cracking Caesar | Lesson | |
4.5.1 Cracking Caesar Cipher | 1 | Video |
4.5.2 Cracking Caesar Cipher | 2 | Check for Understanding |
4.5.3 Cracking Caesar with Brute Force | 1 | Example |
4.5.4 Letter Frequency and Caesar | 1 | Example |
4.5.5 Examining Caesar Cipher | 5 | Free Response |
4.6 Basic Crypto Systems: Vigenere Cipher | Lesson | |
4.6.1 Vigenere Cipher | 1 | Video |
4.6.2 Vigenere Cipher | 1 | Check for Understanding |
4.6.3 Vigenere Cipher Example | 1 | Example |
4.6.4 Letter Frequency and Vigenere Cipher | 1 | Example |
4.6.5 Examining Vigenere Cipher | 5 | Free Response |
4.7 Advanced Cryptography | Lesson | |
4.7.1 Advanced Cryptography | 1 | Video |
4.7.2 Advanced Cryptography | 3 | Check for Understanding |
4.7.3 Public Key Cryptography for Non-Geeks | 1 | Connection |
4.7.4 Examining Public Key Cryptography | 5 | Free Response |
4.7.5 Public Key Cryptography | 1 | Connection |
4.7.6 Public Key Cryptography | 5 | Free Response |
4.8 Hash Functions | Lesson | |
4.8.1 Hash Functions | 1 | Video |
4.8.2 Hash Functions | 3 | Check for Understanding |
4.8.3 Google Shattered Crypto Algorithm | 1 | Connection |
4.8.4 Hash Functions in the News | 5 | Free Response |
4.8.5 Using a Hash Generator | 1 | Connection |
4.8.6 Hash Generator | 5 | Free Response |
4.9 Hash Function Development | Lesson | |
4.9.1 Hash Function Development | 1 | Video |
4.9.2 Hash Function Development | 2 | Check for Understanding |
4.9.3 Develop a Simple Hash Function | 5 | Exercise |
4.10 Project: Classic Cipher Newscast | Lesson | |
4.10.1 Overview | 1 | Notes |
4.10.2 Preview Sample Newscasts | 5 | Free Response |
4.10.3 Investigate a Classic Cipher | 1 | Notes |
4.10.4 Write the Script and Rehearse | 5 | Free Response |
4.10.5 Newscast Presentation | 15 | Free Response |
4.11 The ABCs of Cryptography Quiz | Lesson | |
4.11.1 The ABCs of Cryptography Quiz | 10 | Quiz |
4.11.2 ABCs of Cryptography Badge | 1 | Badge |
Final Project: PSA | ||
5.1 Project: PSA | Lesson | |
5.1.1 Pick a Topic | 5 | Free Response |
5.1.2 Research | 5 | Free Response |
5.1.3 Choose Your Audience | 5 | Free Response |
5.1.4 What kind of PSA? | 5 | Free Response |
5.1.5 Draft your PSA | 5 | Free Response |
5.1.6 Make your PSA! | 5 | Free Response |
Software Security | ||
6.1 Inside Web Apps | Lesson | |
6.1.1 Getting Started | 1 | Notes |
6.1.2 Inside Web Apps | 1 | Video |
6.1.3 Inside Web Apps | 2 | Check for Understanding |
6.1.4 Using View Page Source | 5 | Free Response |
6.1.5 Getting Started with OWASP | 1 | Connection |
6.1.6 Getting Started with OWASP | 5 | Free Response |
6.2 Developer Tools | Lesson | |
6.2.1 Developer Tools | 1 | Video |
6.2.2 Developer Tools | 3 | Check for Understanding |
6.2.3 Using the Developer Tools | 5 | Free Response |
6.2.4 The Top Cybersecurity Blogs and Websites | 1 | Connection |
6.2.5 Selecting a Site to Follow | 5 | Free Response |
6.3 Databases | Lesson | |
6.3.1 Databases | 1 | Video |
6.3.2 Databases | 1 | Check for Understanding |
6.3.3 Database Administrator Career | 1 | Connection |
6.3.4 Database Administrator Career | 5 | Free Response |
6.3.5 Parts of a Database | 1 | Video |
6.3.6 Parts of a Database | 1 | Check for Understanding |
6.3.7 SQL Database Diagram | 1 | Connection |
6.3.8 SQL Database Diagram | 5 | Free Response |
6.4 Clients and Servers | Lesson | |
6.4.1 Clients and Servers | 1 | Video |
6.4.2 Clients and Servers | 2 | Check for Understanding |
6.4.3 Inside a Google Data Center | 1 | Connection |
6.4.4 Inside a Google Data Center | 5 | Free Response |
6.4.5 Cloud Vulnerabilities | 1 | Connection |
6.4.6 Cloud Vulnerabilities Response | 5 | Free Response |
6.4.7 Client-Server Model | 1 | Video |
6.4.8 Client-Server Model | 2 | Check for Understanding |
6.4.9 The Future of User Privacy | 1 | Connection |
6.4.10 The Future of User Privacy | 5 | Free Response |
6.5 What is SQL? | Lesson | |
6.5.1 What is SQL Overview | 1 | Notes |
6.5.2 Intro to SQL | 1 | Video |
6.5.3 Quiz: What is SQL? | 1 | Check for Understanding |
6.6 Structuring Data in SQL | Lesson | |
6.6.1 How to Structure Data in SQL | 1 | Video |
6.6.2 How to Structure Data in SQL | 3 | Check for Understanding |
6.7 Basic Querying in SQL | Lesson | |
6.7.1 The SELECT Statement | 1 | Video |
6.7.2 Basic Querying in SQL | 1 | Check for Understanding |
6.7.3 Our First SELECT Statement | 1 | Example |
6.7.4 Your First SELECT Statement | 5 | Exercise |
6.7.5 More SELECT Statement | 1 | Video |
6.7.6 More SELECT Statement | 1 | Check for Understanding |
6.7.7 Selecting Specific Columns | 1 | Example |
6.7.8 Harry Potter Names | 5 | Exercise |
6.8 Filtering Queries in SQL | Lesson | |
6.8.1 The WHERE Clause | 1 | Video |
6.8.2 Condition Operators | 1 | Check for Understanding |
6.8.3 Ravenclaw House | 1 | Example |
6.8.4 People in Gryffindor | 1 | Example |
6.8.5 Filter By ID | 1 | Example |
6.8.6 The Weasleys | 5 | Exercise |
6.8.7 The Potters | 5 | Exercise |
6.9 Common Security Problems | Lesson | |
6.9.1 Common Security Problems | 1 | Video |
6.9.2 Common Security Problems | 1 | Check for Understanding |
6.9.3 Meet Security Engineers at Google | 1 | Connection |
6.9.4 Security Engineering Reflection | 5 | Free Response |
6.9.5 Living in a Digital World | 1 | Video |
6.9.6 Living in a Digital World | 5 | Free Response |
6.10 SQL Injection Overview | Lesson | |
6.10.1 SQL Injection Overview | 1 | Video |
6.10.2 SQL Injection Overview | 2 | Check for Understanding |
6.10.3 Equifax Security Breach | 1 | Connection |
6.10.4 Equifax Exposed Millions | 1 | Connection |
6.10.5 Equifax SQL Injection Attack | 5 | Free Response |
6.11 Types of SQLi and Prevention | Lesson | |
6.11.1 Types of SQLi | 1 | Video |
6.11.2 Types of SQLi | 3 | Check for Understanding |
6.11.3 Preventing SQLi | 1 | Video |
6.11.4 Preventing SQLi | 2 | Check for Understanding |
6.11.5 Mitigating SQL Injection | 1 | Connection |
6.11.6 Reflection: Mitigating SQL Injection | 5 | Free Response |
6.12 Cross-site Scripting | Lesson | |
6.12.1 Cross-site Scripting | 1 | Video |
6.12.2 Cross-site Scripting | 2 | Check for Understanding |
6.12.3 XSS Bug in Yahoo Mail | 1 | Connection |
6.12.4 XSS Bug in Yahoo Mail | 5 | Free Response |
6.12.5 XSS Demo Overview | 1 | Notes |
6.12.6 Hacksplaining XSS Demo | 1 | Connection |
6.12.7 Google's Tutorial for XSS | 1 | Connection |
6.12.8 XSS Reflection | 5 | Free Response |
6.13 Software Security Quiz | Lesson | |
6.13.1 Software Security Quiz | 10 | Quiz |
6.13.2 Software Security Badge | 1 | Badge |
Networking Fundamentals | ||
7.1 Introduction to the Internet | Lesson | |
7.1.1 Getting Started | 1 | Notes |
7.1.2 Welcome to the Internet | 1 | Video |
7.1.3 Intro to the Internet | 3 | Check for Understanding |
7.1.4 Inside Facebook's Connectivity Lab | 1 | Connection |
7.1.5 Connectivity Lab Reflection | 5 | Free Response |
7.2 Internet Hardware and Sending Information | Lesson | |
7.2.1 Internet Hardware | 1 | Video |
7.2.2 Internet Hardware | 2 | Check for Understanding |
7.2.3 Sending Information | 1 | Video |
7.2.4 Sending Information | 3 | Check for Understanding |
7.2.5 The Internet is in the Ocean | 1 | Connection |
7.2.6 Internet in the Ocean Reflection | 5 | Free Response |
7.3 Internet Addresses | Lesson | |
7.3.1 Internet Addresses | 1 | Video |
7.3.2 Internet Addresses | 2 | Check for Understanding |
7.3.3 The Need for Addresses | 5 | Free Response |
7.3.4 IPv4 vs. IPv6 | 1 | Connection |
7.3.5 The Long Transition to IPv6 | 1 | Connection |
7.3.6 Reflection: IPv4 vs IPv6 | 5 | Free Response |
7.4 Domain Name System (DNS) | Lesson | |
7.4.1 Domain Name System (DNS) | 1 | Video |
7.4.2 Domain Name System | 2 | Check for Understanding |
7.4.3 How Does DNS Work? | 1 | Connection |
7.4.4 How Does DNS Work? | 5 | Free Response |
7.5 Routing | Lesson | |
7.5.1 Routing | 1 | Video |
7.5.2 Routing | 3 | Check for Understanding |
7.5.3 Redundancy | 5 | Free Response |
7.6 Packets & Protocols | Lesson | |
7.6.1 Packets | 1 | Video |
7.6.2 Packets | 2 | Check for Understanding |
7.6.3 Protocols | 1 | Video |
7.6.4 Protocols | 3 | Check for Understanding |
7.6.5 Passing Notes | 1 | Resource |
7.6.6 How the Internet Works | 1 | Connection |
7.6.7 How the Internet Works Reflection | 5 | Free Response |
7.7 Viewing a Webpage | Lesson | |
7.7.1 Viewing a Webpage | 1 | Video |
7.7.2 Viewing a Webpage | 2 | Check for Understanding |
7.7.3 Explaining a URL | 5 | Free Response |
7.7.4 Net Neutrality Explained | 1 | Connection |
7.7.5 FCCs Net Neutrality Rules Officially Repealed | 1 | Connection |
7.7.6 Take a Side on Net Neutrality | 5 | Free Response |
7.7.7 Net Neutrality and Cybersecurity | 1 | Connection |
7.7.8 Net Neutrality and Cybersecurity Research | 5 | Free Response |
7.8 Impact of the Internet | Lesson | |
7.8.1 Impact of the Internet | 1 | Video |
7.8.2 Impact of the Internet | 3 | Check for Understanding |
7.8.3 The Internet and You | 5 | Free Response |
7.8.4 Crucial Steps Needed to Close the U.S. Digital Div | 1 | Connection |
7.8.5 Closing the Digital Divide | 5 | Free Response |
7.9 Network Attacks | Lesson | |
7.9.1 Network Attacks Overview | 1 | Video |
7.9.2 Network Attacks | 5 | Free Response |
7.9.3 Common Network Attacks | 1 | Video |
7.9.4 Network Attacks | 3 | Check for Understanding |
7.9.5 Social Engineering Hack | 1 | Connection |
7.9.6 Social Engineering Reflection | 5 | Free Response |
7.9.7 DDoS Attacks | 1 | Connection |
7.9.8 DDoS Reflection | 5 | Free Response |
7.9.9 SUPPLEMENTARY: Other Network Attacks | 1 | Video |
7.10 Network Administration | Lesson | |
7.10.1 Access Control | 1 | Video |
7.10.2 Access Control | 4 | Check for Understanding |
7.10.3 RADIUS Overview with AAA Protocol | 1 | Connection |
7.10.4 RADIUS Server Access Control | 1 | Connection |
7.10.5 RADIUS Reflection | 5 | Free Response |
7.10.6 Detecting Intrusions to Secure a Network | 1 | Video |
7.10.7 Securing a Network | 2 | Quiz |
7.10.8 How to Secure your IT Network | 1 | Connection |
7.10.9 Secure your IT Network Basics | 5 | Free Response |
7.10.10 Network Administrator Career | 1 | Connection |
7.10.11 Network Administrator Career | 5 | Free Response |
7.11 Project: Secure the Company's Network | Lesson | |
7.11.1 Secure the Company's Network | 1 | Connection |
7.11.2 Establish Firewall Rules | 5 | Free Response |
7.11.3 Establish Firewall Rules Handout | 1 | Resource |
7.11.4 Reading Logs | 5 | Free Response |
7.11.5 Reading Logs Handout | 1 | Resource |
7.11.6 SSH Logs | 1 | Example |
7.11.7 Project Reflection | 5 | Free Response |
7.12 Networking Fundamentals Quiz | Lesson | |
7.12.1 Networking Fundamentals Quiz | 10 | Quiz |
7.12.2 Networking Fundamentals Badge | 1 | Badge |
Final Course Project | ||
8.1 Final Course Project | Lesson | |
8.1.1 Choose Your Own Adventure | 1 | Notes |
8.1.2 Choose Your Adventure | 5 | Free Response |
8.1.3 Research | 5 | Free Response |
8.1.4 Choose Your Target Audience | 5 | Free Response |
8.1.5 Draft Your Presentation | 5 | Free Response |
8.1.6 Draft Your Flyer | 5 | Free Response |
8.1.7 Make Your Presentation with Handout! | 5 | Free Response |
Cryptocurrency | ||
9.1 What is Currency? | Lesson | |
9.1.1 What is Currency? | 1 | Video |
9.1.2 What is Currency? | 2 | Check for Understanding |
9.1.3 What Gives Paper Money Its Actual Value | 1 | Connection |
9.1.4 What Gives Money Its Value | 5 | Free Response |
9.1.5 Money: What is it Good For? | 1 | Resource |
9.2 What is Cryptocurrency? | Lesson | |
9.2.1 Cryptocurrency Basics | 1 | Video |
9.2.2 Cryptocurrency Basics | 5 | Check for Understanding |
9.2.3 Cryptocurrency Module Overview | 1 | Video |
9.2.4 Cryptocurrencies Might Help Developing Countries | 1 | Connection |
9.2.5 Cryptocurrencies are Helping Developing Countries | 5 | Free Response |
9.2.6 Show Me the Money | 1 | Resource |
9.2.7 American Currency Exhibit | 5 | Free Response |
9.3 Intro to Blockchain | Lesson | |
9.3.1 Intro to Blockchain | 1 | Video |
9.3.2 Intro to Blockchain | 3 | Check for Understanding |
9.3.3 CryptoKitties | 1 | Connection |
9.3.4 CryptoKitties | 5 | Free Response |
9.4 Hashing | Lesson | |
9.4.1 Hashing | 1 | Video |
9.4.2 Hashing | 3 | Check for Understanding |
9.4.3 SHA256 Hash Generator | 1 | Connection |
9.4.4 Using the SHA256 Hash Generator | 5 | Free Response |
9.5 Proof of Work | Lesson | |
9.5.1 Proof of Work | 1 | Video |
9.5.2 Proof of Work | 3 | Check for Understanding |
9.5.3 Mining the Block | 1 | Video |
9.5.4 Mining the Block | 3 | Check for Understanding |
9.5.5 PoW vs. Proof of Stake | 1 | Connection |
9.5.6 PoW vs. PoS | 5 | Free Response |
9.5.7 Checking Proof of Work | 1 | Resource |
9.6 Advanced Blockchain | Lesson | |
9.6.1 Advanced Blockchain (part 1) | 1 | Video |
9.6.2 Advanced Blockchain (part 1) | 3 | Check for Understanding |
9.6.3 Blockchain Buzz | 1 | Connection |
9.6.4 Blockchain Buzz | 5 | Free Response |
9.6.5 Advanced Blockchain (part 2) | 1 | Video |
9.6.6 Advanced Blockchain (part 2) | 5 | Free Response |
9.6.7 Make a Blockchain | 1 | Resource |
9.6.8 SUPPLEMENTARY: How to TimeStamp a Document | 1 | Connection |
9.7 Cryptocurrencies | Lesson | |
9.7.1 Cryptocurrencies | 1 | Video |
9.7.2 Cryptocurrencies | 3 | Check for Understanding |
9.7.3 Shiny Toy Phenomenon | 5 | Free Response |
9.7.4 Walmart Using Blockchain to Stop Spread of Disease | 1 | Connection |
9.7.5 Walmart Use of Blockchain | 5 | Free Response |
9.8 Bitcoin | Lesson | |
9.8.1 Bitcoin | 1 | Video |
9.8.2 Bitcoin | 3 | Check for Understanding |
9.8.3 51% Attack Explained | 1 | Connection |
9.8.4 51% Attack | 5 | Free Response |
9.8.5 Why the Bitcoin Bubble will Burst in 2018 | 1 | Connection |
9.8.6 Bitcoin Bust | 5 | Free Response |
9.8.7 Explore the Bitcoin Blockchain | 1 | Resource |
9.9 Pros, Cons, and Future of Cryptocurrencies | Lesson | |
9.9.1 Pros, Cons, and Future of Cryptocurrencies | 1 | Video |
9.9.2 Pros, Cons and Future of Cryptocurrencies | 3 | Check for Understanding |
9.9.3 Pros, Cons and future of Cryptocurrencies | 5 | Free Response |
9.9.4 Cryptocurrency Pros and Cons | 1 | Connection |
9.9.5 Crypto Pros and Cons | 5 | Free Response |
9.9.6 What is HODL? | 1 | Connection |
9.9.7 What is HODL? | 5 | Free Response |
9.9.8 Pros, Cons, and Future of Cryptocurrencies | 5 | Free Response |
9.10 Project: Cryptocurrency Expert Panel Talk | Lesson | |
9.10.1 Overview | 5 | Free Response |
9.10.2 Preview Sample Expert Panels | 5 | Free Response |
9.10.3 Investigate a Cryptocurrency Topic | 5 | Free Response |
9.10.4 Write an Outline and Rehearse | 5 | Free Response |
9.10.5 Expert Panel Talk (Presentation) | 5 | Free Response |
9.11 Cryptocurrency Quiz | Lesson | |
9.11.1 Cryptocurrency Quiz | 10 | Unit Quiz |
9.11.2 Cryptocurrency Badge | 0 | Badge |
Project: Security Assessment Report | ||
10.1 Project: Security Assessment Report | Lesson | |
10.1.1 Security Assessment Report | 5 | Free Response |
10.1.2 Supercar Showdown Website | 1 | Connection |
10.1.3 SQL Injection Testing | 5 | Free Response |
10.1.4 SQLi Testing Handout | 1 | Resource |
10.1.5 Cross-site Scripting Testing | 5 | Free Response |
10.1.6 Cross-site Scripting Handout | 1 | Resource |
10.1.7 Project Reflection | 5 | Free Response |
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.
Teacher SignupSign up as a student if you are in a school and have a class code given to you by your teacher.
Student Signup