Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
Introduction to Cybersecurity Pretest
1.1 Introduction to Cybersecurity Pretest Lesson
1.1.1 About the Pretest 1 Notes
1.1.2 Mindsets 1 Survey
1.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
What is Cybersecurity?
2.1 Module Overview - Cybersecurity Lesson
2.1.1 Welcome to Cybersecurity 1 Video
2.1.2 Welcome to Cybersecurity 2 Check for Understanding
2.1.3 Cybersecurity and You 5 Free Response
2.1.4 Course Goals 5 Free Response
2.2 What is Cybersecurity? Lesson
2.2.1 What is Cybersecurity? 1 Video
2.2.2 What is Cybersecurity? 3 Check for Understanding
2.2.3 City Services Ransomware 1 Connection
2.2.4 Ransomware Reflection 5 Free Response
2.2.5 Internet of Things 1 Connection
2.2.6 Hackers vs. Smart Homes 1 Connection
2.2.7 Internet of Things Reflection 5 Free Response
2.2.8 Threat Map 1 Connection
2.2.9 Why Learn about Cybersecurity? 5 Free Response
2.3 Impact of Cybersecurity Lesson
2.3.1 Impact of Cybersecurity 1 Video
2.3.2 Impact of Cybersecurity 2 Check for Understanding
2.3.3 Phishing for Your Info 1 Connection
2.3.4 Phishing Reflection 5 Free Response
2.3.5 Cyber Game 1 Connection
2.3.6 Cyber Game Reflection 5 Free Response
2.3.7 Cyber Crime Time 1 Connection
2.3.8 Cyber Crime Time Reflection 5 Free Response
2.4 The CIA Triad Lesson
2.4.1 CIA Triad 1 Video
2.4.2 CIA Triad 2 Check for Understanding
2.4.3 Which part of the CIA Triad? 5 Free Response
2.4.4 Which part of the CIA Triad? 5 Free Response
2.4.5 Breach of Confidentiality 5 Free Response
2.4.6 Breach of Availability 5 Free Response
2.5 What is Cybersecurity? Quiz Lesson
2.5.1 What is Cybersecurity? Quiz 10 Quiz
2.5.2 Intro to Cybersecurity Badge 1 Badge
Digital Citizenship and Cyber Hygiene
3.1 Digital Footprint and Reputation Lesson
3.1.1 Digital Footprint and Reputation 1 Video
3.1.2 Digital Footprint and Reputation 3 Check for Understanding
3.1.3 Building a Positive Digital Footprint 5 Free Response
3.1.4 Right to be Forgotten? 1 Connection
3.1.5 Right to be Forgotten 5 Free Response
3.1.6 What is your Digital Footprint? 5 Free Response
3.2 Cyberbullying Lesson
3.2.1 Cyberbullying 1 Video
3.2.2 Cyberbullying 3 Check for Understanding
3.2.3 Scenario: Student Ranking 5 Free Response
3.2.4 Scenario: Singled Out 5 Free Response
3.2.5 Stopping Cyberbullying 5 Free Response
3.3 Internet Safety Lesson
3.3.1 Internet Safety 1 Video
3.3.2 Internet Safety 2 Check for Understanding
3.3.3 Scenario: School Stranger 5 Free Response
3.3.4 Scenario: Vacation Pals 5 Free Response
3.3.5 Staying Safe 5 Free Response
3.4 Privacy & Security Lesson
3.4.1 What is Data Privacy & Security? 1 Video
3.4.2 Privacy & Security Quiz 2 Check for Understanding
3.4.3 How Strong is your Password? 1 Connection
3.4.4 How Strong is your password? 5 Free Response
3.4.5 Google Privacy Policy Search 1 Connection
3.4.6 Google Privacy Policy Search 5 Free Response
3.5 Information Literacy Lesson
3.5.1 Information Literacy 1 Video
3.5.2 Information Literacy 2 Check for Understanding
3.5.3 Effective Internet Searches 5 Free Response
3.5.4 Evaluate the Source 1 1 Connection
3.5.5 Respond: Evaluate the Source 1 5 Free Response
3.5.6 Evaluate the Source 2 1 Notes
3.5.7 Respond: Evaluate the Source 2 5 Free Response
3.5.8 Hero Pig? 1 Connection
3.6 Creative Credit & Copyright Lesson
3.6.1 Creative Credit and Copyright 1 Video
3.6.2 Creative Credit and Copyright 2 Check for Understanding
3.6.3 Cite! 5 Free Response
3.6.4 Exploring Creative Commons 1 Connection
3.6.5 Respond: Creative Commons 5 Free Response
3.6.6 Task: Finding Images 5 Free Response
3.6.7 Reflection: Why is Copyright Important? 5 Free Response
3.7 Hacking Ethics Lesson
3.7.1 Hacking Ethics & Legality 1 Video
3.7.2 Hacking Ethics & Legality 3 Check for Understanding
3.7.3 Penetration Testing 1 Connection
3.7.4 Reflection: Penetration Testing 5 Free Response
3.7.5 Hack the Pentagon? 1 Connection
3.7.6 Reflection: Hack the Pentagon 5 Free Response
3.7.7 Ethical Hacker Agreement 1 Check for Understanding
3.8 Project: Public Service Announcement Lesson
3.8.1 Pick a Topic 5 Free Response
3.8.2 Research 5 Free Response
3.8.3 Choose Your Audience 5 Free Response
3.8.4 What kind of PSA? 5 Free Response
3.8.5 Draft your PSA 5 Free Response
3.8.6 Finalize your PSA! 15 Free Response
3.9 Digital Citizenship and Cybersecurity Quiz Lesson
3.9.1 Digital Citizenship and Cybersecurity Quiz 10 Unit Quiz
3.9.2 Digital Citizenship and Cybersecurity Badge 1 Badge
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis Lesson
4.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
4.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
4.1.3 Securing the Cloud 1 Connection
4.1.4 Encryption Reflection 5 Free Response
4.2 History of Cryptography Lesson
4.2.1 Cryptography: A Brief History 1 Video
4.2.2 Cryptography History Quiz 2 Check for Understanding
4.2.3 How the Enigma Worked 1 Connection
4.2.4 How the Enigma Worked 5 Free Response
4.2.5 Unknown Languages and the Future of Cryptography 1 Connection
4.2.6 The Future of Cybersecurity 5 Free Response
4.3 Why encrypt? Lesson
4.3.1 Why encrypt? 1 Video
4.3.2 Why encrypt? 2 Check for Understanding
4.4 Basic Crypto Systems: Caesar Cipher Lesson
4.4.1 Caesar Cipher 1 Video
4.4.2 Caesar Cipher 2 Check for Understanding
4.4.3 Caesar Cipher 1 Example
4.4.4 Decrypting Caesar 5 Exercise
4.5 Basic Crypto Systems: Cracking Caesar Lesson
4.5.1 Cracking Caesar Cipher 1 Video
4.5.2 Cracking Caesar Cipher 2 Check for Understanding
4.5.3 Cracking Caesar with Brute Force 1 Example
4.5.4 Letter Frequency and Caesar 1 Example
4.5.5 Examining Caesar Cipher 5 Free Response
4.6 Basic Crypto Systems: Vigenere Cipher Lesson
4.6.1 Vigenere Cipher 1 Video
4.6.2 Vigenere Cipher 1 Check for Understanding
4.6.3 Vigenere Cipher Example 1 Example
4.6.4 Letter Frequency and Vigenere Cipher 1 Example
4.6.5 Examining Vigenere Cipher 5 Free Response
4.7 Advanced Cryptography Lesson
4.7.1 Advanced Cryptography 1 Video
4.7.2 Advanced Cryptography 3 Check for Understanding
4.7.3 Public Key Cryptography for Non-Geeks 1 Connection
4.7.4 Examining Public Key Cryptography 5 Free Response
4.7.5 Public Key Cryptography 1 Connection
4.7.6 Public Key Cryptography 5 Free Response
4.8 Hash Functions Lesson
4.8.1 Hash Functions 1 Video
4.8.2 Hash Functions 3 Check for Understanding
4.8.3 Google Shattered Crypto Algorithm 1 Connection
4.8.4 Hash Functions in the News 5 Free Response
4.8.5 Using a Hash Generator 1 Connection
4.8.6 Hash Generator 5 Free Response
4.9 Hash Function Development Lesson
4.9.1 Hash Function Development 1 Video
4.9.2 Hash Function Development 2 Check for Understanding
4.9.3 Develop a Simple Hash Function 5 Exercise
4.10 Project: Classic Cipher Newscast Lesson
4.10.1 Overview 1 Notes
4.10.2 Preview Sample Newscasts 5 Free Response
4.10.3 Investigate a Classic Cipher 1 Notes
4.10.4 Write the Script and Rehearse 5 Free Response
4.10.5 Newscast Presentation 15 Free Response
4.11 The ABCs of Cryptography Quiz Lesson
4.11.1 The ABCs of Cryptography Quiz 10 Quiz
4.11.2 ABCs of Cryptography Badge 1 Badge
Final Project: PSA
5.1 Project: PSA Lesson
5.1.1 Pick a Topic 5 Free Response
5.1.2 Research 5 Free Response
5.1.3 Choose Your Audience 5 Free Response
5.1.4 What kind of PSA? 5 Free Response
5.1.5 Draft your PSA 5 Free Response
5.1.6 Make your PSA! 5 Free Response
Software Security
6.1 Inside Web Apps Lesson
6.1.1 Getting Started 1 Notes
6.1.2 Inside Web Apps 1 Video
6.1.3 Inside Web Apps 2 Check for Understanding
6.1.4 Using View Page Source 5 Free Response
6.1.5 Getting Started with OWASP 1 Connection
6.1.6 Getting Started with OWASP 5 Free Response
6.2 Developer Tools Lesson
6.2.1 Developer Tools 1 Video
6.2.2 Developer Tools 3 Check for Understanding
6.2.3 Using the Developer Tools 5 Free Response
6.2.4 The Top Cybersecurity Blogs and Websites 1 Connection
6.2.5 Selecting a Site to Follow 5 Free Response
6.3 Databases Lesson
6.3.1 Databases 1 Video
6.3.2 Databases 1 Check for Understanding
6.3.3 Database Administrator Career 1 Connection
6.3.4 Database Administrator Career 5 Free Response
6.3.5 Parts of a Database 1 Video
6.3.6 Parts of a Database 1 Check for Understanding
6.3.7 SQL Database Diagram 1 Connection
6.3.8 SQL Database Diagram 5 Free Response
6.4 Clients and Servers Lesson
6.4.1 Clients and Servers 1 Video
6.4.2 Clients and Servers 2 Check for Understanding
6.4.3 Inside a Google Data Center 1 Connection
6.4.4 Inside a Google Data Center 5 Free Response
6.4.5 Cloud Vulnerabilities 1 Connection
6.4.6 Cloud Vulnerabilities Response 5 Free Response
6.4.7 Client-Server Model 1 Video
6.4.8 Client-Server Model 2 Check for Understanding
6.4.9 The Future of User Privacy 1 Connection
6.4.10 The Future of User Privacy 5 Free Response
6.5 What is SQL? Lesson
6.5.1 What is SQL Overview 1 Notes
6.5.2 Intro to SQL 1 Video
6.5.3 Quiz: What is SQL? 1 Check for Understanding
6.6 Structuring Data in SQL Lesson
6.6.1 How to Structure Data in SQL 1 Video
6.6.2 How to Structure Data in SQL 3 Check for Understanding
6.7 Basic Querying in SQL Lesson
6.7.1 The SELECT Statement 1 Video
6.7.2 Basic Querying in SQL 1 Check for Understanding
6.7.3 Our First SELECT Statement 1 Example
6.7.4 Your First SELECT Statement 5 Exercise
6.7.5 More SELECT Statement 1 Video
6.7.6 More SELECT Statement 1 Check for Understanding
6.7.7 Selecting Specific Columns 1 Example
6.7.8 Harry Potter Names 5 Exercise
6.8 Filtering Queries in SQL Lesson
6.8.1 The WHERE Clause 1 Video
6.8.2 Condition Operators 1 Check for Understanding
6.8.3 Ravenclaw House 1 Example
6.8.4 People in Gryffindor 1 Example
6.8.5 Filter By ID 1 Example
6.8.6 The Weasleys 5 Exercise
6.8.7 The Potters 5 Exercise
6.9 Common Security Problems Lesson
6.9.1 Common Security Problems 1 Video
6.9.2 Common Security Problems 1 Check for Understanding
6.9.3 Meet Security Engineers at Google 1 Connection
6.9.4 Security Engineering Reflection 5 Free Response
6.9.5 Living in a Digital World 1 Video
6.9.6 Living in a Digital World 5 Free Response
6.10 SQL Injection Overview Lesson
6.10.1 SQL Injection Overview 1 Video
6.10.2 SQL Injection Overview 2 Check for Understanding
6.10.3 Equifax Security Breach 1 Connection
6.10.4 Equifax Exposed Millions 1 Connection
6.10.5 Equifax SQL Injection Attack 5 Free Response
6.11 Types of SQLi and Prevention Lesson
6.11.1 Types of SQLi 1 Video
6.11.2 Types of SQLi 3 Check for Understanding
6.11.3 Preventing SQLi 1 Video
6.11.4 Preventing SQLi 2 Check for Understanding
6.11.5 Mitigating SQL Injection 1 Connection
6.11.6 Reflection: Mitigating SQL Injection 5 Free Response
6.12 Cross-site Scripting Lesson
6.12.1 Cross-site Scripting 1 Video
6.12.2 Cross-site Scripting 2 Check for Understanding
6.12.3 XSS Bug in Yahoo Mail 1 Connection
6.12.4 XSS Bug in Yahoo Mail 5 Free Response
6.12.5 XSS Demo Overview 1 Notes
6.12.6 Hacksplaining XSS Demo 1 Connection
6.12.7 Google's Tutorial for XSS 1 Connection
6.12.8 XSS Reflection 5 Free Response
6.13 Software Security Quiz Lesson
6.13.1 Software Security Quiz 10 Quiz
6.13.2 Software Security Badge 1 Badge
Networking Fundamentals
7.1 Introduction to the Internet Lesson
7.1.1 Getting Started 1 Notes
7.1.2 Welcome to the Internet 1 Video
7.1.3 Intro to the Internet 3 Check for Understanding
7.1.4 Inside Facebook's Connectivity Lab 1 Connection
7.1.5 Connectivity Lab Reflection 5 Free Response
7.2 Internet Hardware and Sending Information Lesson
7.2.1 Internet Hardware 1 Video
7.2.2 Internet Hardware 2 Check for Understanding
7.2.3 Sending Information 1 Video
7.2.4 Sending Information 3 Check for Understanding
7.2.5 The Internet is in the Ocean 1 Connection
7.2.6 Internet in the Ocean Reflection 5 Free Response
7.3 Internet Addresses Lesson
7.3.1 Internet Addresses 1 Video
7.3.2 Internet Addresses 2 Check for Understanding
7.3.3 The Need for Addresses 5 Free Response
7.3.4 IPv4 vs. IPv6 1 Connection
7.3.5 The Long Transition to IPv6 1 Connection
7.3.6 Reflection: IPv4 vs IPv6 5 Free Response
7.4 Domain Name System (DNS) Lesson
7.4.1 Domain Name System (DNS) 1 Video
7.4.2 Domain Name System 2 Check for Understanding
7.4.3 How Does DNS Work? 1 Connection
7.4.4 How Does DNS Work? 5 Free Response
7.5 Routing Lesson
7.5.1 Routing 1 Video
7.5.2 Routing 3 Check for Understanding
7.5.3 Redundancy 5 Free Response
7.6 Packets & Protocols Lesson
7.6.1 Packets 1 Video
7.6.2 Packets 2 Check for Understanding
7.6.3 Protocols 1 Video
7.6.4 Protocols 3 Check for Understanding
7.6.5 Passing Notes 1 Resource
7.6.6 How the Internet Works 1 Connection
7.6.7 How the Internet Works Reflection 5 Free Response
7.7 Viewing a Webpage Lesson
7.7.1 Viewing a Webpage 1 Video
7.7.2 Viewing a Webpage 2 Check for Understanding
7.7.3 Explaining a URL 5 Free Response
7.7.4 Net Neutrality Explained 1 Connection
7.7.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
7.7.6 Take a Side on Net Neutrality 5 Free Response
7.7.7 Net Neutrality and Cybersecurity 1 Connection
7.7.8 Net Neutrality and Cybersecurity Research 5 Free Response
7.8 Impact of the Internet Lesson
7.8.1 Impact of the Internet 1 Video
7.8.2 Impact of the Internet 3 Check for Understanding
7.8.3 The Internet and You 5 Free Response
7.8.4 Crucial Steps Needed to Close the U.S. Digital Div 1 Connection
7.8.5 Closing the Digital Divide 5 Free Response
7.9 Network Attacks Lesson
7.9.1 Network Attacks Overview 1 Video
7.9.2 Network Attacks 5 Free Response
7.9.3 Common Network Attacks 1 Video
7.9.4 Network Attacks 3 Check for Understanding
7.9.5 Social Engineering Hack 1 Connection
7.9.6 Social Engineering Reflection 5 Free Response
7.9.7 DDoS Attacks 1 Connection
7.9.8 DDoS Reflection 5 Free Response
7.9.9 SUPPLEMENTARY: Other Network Attacks 1 Video
7.10 Network Administration Lesson
7.10.1 Access Control 1 Video
7.10.2 Access Control 4 Check for Understanding
7.10.3 RADIUS Overview with AAA Protocol 1 Connection
7.10.4 RADIUS Server Access Control 1 Connection
7.10.5 RADIUS Reflection 5 Free Response
7.10.6 Detecting Intrusions to Secure a Network 1 Video
7.10.7 Securing a Network 2 Quiz
7.10.8 How to Secure your IT Network 1 Connection
7.10.9 Secure your IT Network Basics 5 Free Response
7.10.10 Network Administrator Career 1 Connection
7.10.11 Network Administrator Career 5 Free Response
7.11 Project: Secure the Company's Network Lesson
7.11.1 Secure the Company's Network 1 Connection
7.11.2 Establish Firewall Rules 5 Free Response
7.11.3 Establish Firewall Rules Handout 1 Resource
7.11.4 Reading Logs 5 Free Response
7.11.5 Reading Logs Handout 1 Resource
7.11.6 SSH Logs 1 Example
7.11.7 Project Reflection 5 Free Response
7.12 Networking Fundamentals Quiz Lesson
7.12.1 Networking Fundamentals Quiz 10 Quiz
7.12.2 Networking Fundamentals Badge 1 Badge
Final Course Project
8.1 Final Course Project Lesson
8.1.1 Choose Your Own Adventure 1 Notes
8.1.2 Choose Your Adventure 5 Free Response
8.1.3 Research 5 Free Response
8.1.4 Choose Your Target Audience 5 Free Response
8.1.5 Draft Your Presentation 5 Free Response
8.1.6 Draft Your Flyer 5 Free Response
8.1.7 Make Your Presentation with Handout! 5 Free Response
Cryptocurrency
9.1 What is Currency? Lesson
9.1.1 What is Currency? 1 Video
9.1.2 What is Currency? 2 Check for Understanding
9.1.3 What Gives Paper Money Its Actual Value 1 Connection
9.1.4 What Gives Money Its Value 5 Free Response
9.1.5 Money: What is it Good For? 1 Resource
9.2 What is Cryptocurrency? Lesson
9.2.1 Cryptocurrency Basics 1 Video
9.2.2 Cryptocurrency Basics 5 Check for Understanding
9.2.3 Cryptocurrency Module Overview 1 Video
9.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
9.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
9.2.6 Show Me the Money 1 Resource
9.2.7 American Currency Exhibit 5 Free Response
9.3 Intro to Blockchain Lesson
9.3.1 Intro to Blockchain 1 Video
9.3.2 Intro to Blockchain 3 Check for Understanding
9.3.3 CryptoKitties 1 Connection
9.3.4 CryptoKitties 5 Free Response
9.4 Hashing Lesson
9.4.1 Hashing 1 Video
9.4.2 Hashing 3 Check for Understanding
9.4.3 SHA256 Hash Generator 1 Connection
9.4.4 Using the SHA256 Hash Generator 5 Free Response
9.5 Proof of Work Lesson
9.5.1 Proof of Work 1 Video
9.5.2 Proof of Work 3 Check for Understanding
9.5.3 Mining the Block 1 Video
9.5.4 Mining the Block 3 Check for Understanding
9.5.5 PoW vs. Proof of Stake 1 Connection
9.5.6 PoW vs. PoS 5 Free Response
9.5.7 Checking Proof of Work 1 Resource
9.6 Advanced Blockchain Lesson
9.6.1 Advanced Blockchain (part 1) 1 Video
9.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
9.6.3 Blockchain Buzz 1 Connection
9.6.4 Blockchain Buzz 5 Free Response
9.6.5 Advanced Blockchain (part 2) 1 Video
9.6.6 Advanced Blockchain (part 2) 5 Free Response
9.6.7 Make a Blockchain 1 Resource
9.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
9.7 Cryptocurrencies Lesson
9.7.1 Cryptocurrencies 1 Video
9.7.2 Cryptocurrencies 3 Check for Understanding
9.7.3 Shiny Toy Phenomenon 5 Free Response
9.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
9.7.5 Walmart Use of Blockchain 5 Free Response
9.8 Bitcoin Lesson
9.8.1 Bitcoin 1 Video
9.8.2 Bitcoin 3 Check for Understanding
9.8.3 51% Attack Explained 1 Connection
9.8.4 51% Attack 5 Free Response
9.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
9.8.6 Bitcoin Bust 5 Free Response
9.8.7 Explore the Bitcoin Blockchain 1 Resource
9.9 Pros, Cons, and Future of Cryptocurrencies Lesson
9.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
9.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
9.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
9.9.4 Cryptocurrency Pros and Cons 1 Connection
9.9.5 Crypto Pros and Cons 5 Free Response
9.9.6 What is HODL? 1 Connection
9.9.7 What is HODL? 5 Free Response
9.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
9.10 Project: Cryptocurrency Expert Panel Talk Lesson
9.10.1 Overview 5 Free Response
9.10.2 Preview Sample Expert Panels 5 Free Response
9.10.3 Investigate a Cryptocurrency Topic 5 Free Response
9.10.4 Write an Outline and Rehearse 5 Free Response
9.10.5 Expert Panel Talk (Presentation) 5 Free Response
9.11 Cryptocurrency Quiz Lesson
9.11.1 Cryptocurrency Quiz 10 Unit Quiz
9.11.2 Cryptocurrency Badge 0 Badge
Project: Security Assessment Report
10.1 Project: Security Assessment Report Lesson
10.1.1 Security Assessment Report 5 Free Response
10.1.2 Supercar Showdown Website 1 Connection
10.1.3 SQL Injection Testing 5 Free Response
10.1.4 SQLi Testing Handout 1 Resource
10.1.5 Cross-site Scripting Testing 5 Free Response
10.1.6 Cross-site Scripting Handout 1 Resource
10.1.7 Project Reflection 5 Free Response