Please enable JavaScript to use CodeHS

Georgia Foundations of Secure Information Systems - Outline

  1. Computer Basics

    1. 1.1 Internal Components

    2. Video 1.1.1 Internal Components
    3. Check for Understanding 1.1.2 Internal Components
    4. Connection 1.1.3 Build a Computer
    5. Free Response 1.1.4 Build a Computer
    6. Example 1.1.5 Test Your Brain's RAM!
    7. Free Response 1.1.6 Test Your Brain's RAM!
    8. 1.2 Storage Options

    9. Video 1.2.1 Storage Options
    10. Check for Understanding 1.2.2 Storage Options Quiz
    11. Connection 1.2.3 Security of Cloud Storage
    12. Free Response 1.2.4 Security of Cloud Storage
    13. Free Response 1.2.5 Storage Suggestions
    14. 1.3 Network Devices

    15. Video 1.3.1 Network Devices
    16. Check for Understanding 1.3.2 Network Devices
    17. Connection 1.3.3 Speed Test
    18. Free Response 1.3.4 Speed Test
    19. Connection 1.3.5 Fiber Optics Bend Light!
    20. Free Response 1.3.6 Fiber Optics Bend Light!
    21. Connection 1.3.7 Ethernet Standards
    22. Free Response 1.3.8 Ethernet Standards
    23. Free Response 1.3.9 Network Troubleshooting
    24. 1.4 Network Options

    25. Video 1.4.1 Network Options
    26. Check for Understanding 1.4.2 Network Options Quiz
    27. Connection 1.4.3 What is an SSID?
    28. Free Response 1.4.4 What is an SSID?
    29. Free Response 1.4.5 Wireless Network Setup
    30. 1.5 Network Communication

    31. Video 1.5.1 Network Communication
    32. Check for Understanding 1.5.2 Network Communication Quiz
    33. Example 1.5.3 Setting up a Firewall
    34. Free Response 1.5.4 Establish Firewall Rules
    35. 1.6 Operating Systems

    36. Video 1.6.1 Operating Systems
    37. Check for Understanding 1.6.2 Operating Systems Quiz
    38. Connection 1.6.3 Understanding Operating Systems
    39. Free Response 1.6.4 Understanding Operating Systems
    40. Example 1.6.5 Detect My OS
    41. Connection 1.6.6 Upgrading a Mac OS
    42. Example 1.6.7 Windows OS Installation Simulation
    43. Free Response 1.6.8 Installing an OS
    44. 1.7 Software and Applications

    45. Video 1.7.1 Software and Applications
    46. Check for Understanding 1.7.2 Software and Applications Quiz
    47. Example 1.7.3 Spreadsheet Simulation
    48. Example 1.7.4 Messaging Simulation
    49. Example 1.7.5 Kanban Board Simulation
    50. Free Response 1.7.6 Software Simulations
    51. 1.8 Application Security

    52. Video 1.8.1 Application Security
    53. Check for Understanding 1.8.2 Application Security
    54. Example 1.8.3 Windows Updates
    55. Connection 1.8.4 Windows Defender Antivirus
    56. Free Response 1.8.5 Windows Defender Antivirus
    57. Free Response 1.8.6 CodeHS System Restore
    58. 1.9 System Administration

    59. Video 1.9.1 User Accounts
    60. Check for Understanding 1.9.2 User Accounts Quiz
    61. Free Response 1.9.3 User Accounts
    62. Free Response 1.9.4 Shared Folders and Files
    63. Video 1.9.5 Host Security
    64. Check for Understanding 1.9.6 Host Security Quiz
    65. Free Response 1.9.7 Security Baseline
  2. Networking Fundamentals

    1. 2.1 Introduction to the Internet

    2. Video 2.1.1 Welcome to the Internet
    3. Check for Understanding 2.1.2 Intro to the Internet
    4. Connection 2.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 2.1.4 Connectivity Lab Reflection
    6. 2.2 Internet Hardware and Sending Information

    7. Video 2.2.1 Internet Hardware
    8. Check for Understanding 2.2.2 Internet Hardware
    9. Video 2.2.3 Sending Information
    10. Check for Understanding 2.2.4 Sending Information
    11. Connection 2.2.5 The Internet is in the Ocean
    12. Free Response 2.2.6 Internet in the Ocean Reflection
    13. 2.3 Internet Addresses

    14. Video 2.3.1 Internet Addresses
    15. Check for Understanding 2.3.2 Internet Addresses
    16. Free Response 2.3.3 The Need for Addresses
    17. Connection 2.3.4 IPv4 vs. IPv6
    18. Connection 2.3.5 The Long Transition to IPv6
    19. Free Response 2.3.6 Reflection: IPv4 vs IPv6
    20. 2.4 Domain Name System (DNS)

    21. Video 2.4.1 Domain Name System (DNS)
    22. Check for Understanding 2.4.2 Domain Name System
    23. Connection 2.4.3 How Does DNS Work?
    24. Free Response 2.4.4 How Does DNS Work?
    25. 2.5 Routing

    26. Video 2.5.1 Routing
    27. Check for Understanding 2.5.2 Routing
    28. Traceroute 2.5.3 Route Tracing
    29. Free Response 2.5.4 Redundancy
    30. Notes 2.5.5 Network Topologies
    31. Example 2.5.6 Network Topologies
    32. 2.6 Packets & Protocols

    33. Video 2.6.1 Packets
    34. Check for Understanding 2.6.2 Packets
    35. Video 2.6.3 Protocols
    36. Check for Understanding 2.6.4 Protocols
    37. Resource 2.6.5 Passing Notes
    38. Connection 2.6.6 How the Internet Works
    39. Free Response 2.6.7 The Journey of an Image
    40. 2.7 Impact of the Internet

    41. Video 2.7.1 Impact of the Internet
    42. Check for Understanding 2.7.2 Impact of the Internet
    43. Connection 2.7.3 What is the Digital Divide?
    44. Free Response 2.7.4 What is the Digital Divide?
    45. 2.8 Securing a Network

    46. Video 2.8.1 Access Control
    47. Check for Understanding 2.8.2 Access Control
    48. Connection 2.8.3 RADIUS Overview with AAA Protocol
    49. Connection 2.8.4 RADIUS Server Access Control
    50. Free Response 2.8.5 RADIUS Reflection
    51. Video 2.8.6 Detecting Intrusions to Secure a Network
    52. Quiz 2.8.7 Securing a Network
    53. Connection 2.8.8 How to Secure your IT Network
    54. Free Response 2.8.9 Secure your IT Network Basics
    55. Connection 2.8.10 Network Administrator Career
    56. Free Response 2.8.11 Network Administrator Career
    57. Example 2.8.12 Multifactor Authentication
    58. Example 2.8.13 Two Factor Authentication
    59. Example 2.8.14 Authorization
    60. Example 2.8.15 Setting up a Firewall
    61. 2.9 Networking Fundamentals Quiz

    62. Quiz 2.9.1 Networking Fundamentals Quiz
    63. Badge 2.9.2 Networking Fundamentals Badge
  3. Project: Troubleshooting

    1. 3.1 Methodology

    2. Notes 3.1.1 Troubleshooting Methodology
    3. Free Response 3.1.2 Identify the Problem
    4. Free Response 3.1.3 Research Solutions
    5. Free Response 3.1.4 Establish a Theory
    6. Free Response 3.1.5 Test the Theory
    7. Free Response 3.1.6 Fix the Problem!
    8. 3.2 Support Practice

    9. Exercise 3.2.1 Signal Strength
    10. Exercise 3.2.2 Interference
  4. Cybersecurity and Digital Citizenship

    1. 4.1 What is Cybersecurity?

    2. Video 4.1.1 What is Cybersecurity?
    3. Check for Understanding 4.1.2 What is Cybersecurity?
    4. Connection 4.1.3 WannaCry Ransomware Attack
    5. Free Response 4.1.4 WannaCry Reflection
    6. Example 4.1.5 Ransomware Simulator
    7. Connection 4.1.6 Internet of Things
    8. Connection 4.1.7 Cybersecurity and Connected Cars
    9. Free Response 4.1.8 Internet of Things Reflection
    10. Connection 4.1.9 Threat Map
    11. Free Response 4.1.10 Why Learn about Cybersecurity?
    12. 4.2 Impact of Cybersecurity

    13. Video 4.2.1 Impact of Cybersecurity
    14. Check for Understanding 4.2.2 Impact of Cybersecurity
    15. Connection 4.2.3 Yahoo! Attack
    16. Free Response 4.2.4 Yahoo! Reflection
    17. Connection 4.2.5 Fighting Cyber Crime
    18. Free Response 4.2.6 Cyber Crime Reflection
    19. Connection 4.2.7 FBI Cyber Crime
    20. Free Response 4.2.8 FBI Reflection
    21. Example 4.2.9 Phishing Simulator
    22. 4.3 Hacking Ethics

    23. Video 4.3.1 Hacking Ethics & Legality
    24. Check for Understanding 4.3.2 Hacking Ethics & Legality
    25. Connection 4.3.3 Penetration Testing
    26. Free Response 4.3.4 Reflection: Penetration Testing
    27. Connection 4.3.5 Hack the Pentagon?
    28. Free Response 4.3.6 Reflection: Hack the Pentagon
    29. 4.4 The CIA Triad

    30. Video 4.4.1 CIA Triad
    31. Check for Understanding 4.4.2 CIA Triad
    32. Free Response 4.4.3 Which part of the CIA Triad?
    33. Free Response 4.4.4 Which part of the CIA Triad?
    34. Free Response 4.4.5 Breach of Confidentiality
    35. Free Response 4.4.6 Breach of Availability
    36. 4.5 Privacy & Security

    37. Video 4.5.1 What is Data Privacy & Security?
    38. Check for Understanding 4.5.2 Privacy & Security Quiz
    39. Connection 4.5.3 How Strong is your Password?
    40. Free Response 4.5.4 How Strong is your password?
    41. Connection 4.5.5 Google Privacy Policy Search
    42. Free Response 4.5.6 Google Privacy Policy Search
    43. Resource 4.5.7 Is Your Head in the Cloud?
    44. 4.6 Cryptography, Cryptology, Cryptanalysis

    45. Video 4.6.1 Cryptography, Cryptology, Cryptanalysis
    46. Check for Understanding 4.6.2 Cryptography, Cryptology, Cryptanalysis
    47. Connection 4.6.3 Securing the Cloud
    48. Free Response 4.6.4 Encryption Reflection
    49. 4.7 Hash Functions

    50. Video 4.7.1 Hash Functions
    51. Check for Understanding 4.7.2 Hash Functions
    52. Connection 4.7.3 Google Shattered Crypto Algorithm
    53. Free Response 4.7.4 Hash Functions in the News
    54. Connection 4.7.5 Using a Hash Generator
    55. Free Response 4.7.6 Hash Generator
    56. 4.8 Cyberbullying

    57. Video 4.8.1 Cyberbullying
    58. Check for Understanding 4.8.2 Cyberbullying
    59. Free Response 4.8.3 Scenario: Student Ranking
    60. Free Response 4.8.4 Scenario: Singled Out
    61. Free Response 4.8.5 Stopping Cyberbullying
    62. 4.9 Creative Credit & Copyright

    63. Video 4.9.1 Creative Credit and Copyright
    64. Check for Understanding 4.9.2 Creative Credit and Copyright
    65. Free Response 4.9.3 Cite!
    66. Connection 4.9.4 Exploring Creative Commons
    67. Free Response 4.9.5 Respond: Creative Commons
    68. Free Response 4.9.6 Finding Images
    69. Free Response 4.9.7 Reflection: Why is Copyright Important?
  5. Project: Public Service Announcement

    1. 5.1 Project: Public Service Announcement

    2. Free Response 5.1.1 Pick a Topic
    3. Free Response 5.1.2 Research
    4. Free Response 5.1.3 Choose Your Audience
    5. Free Response 5.1.4 What kind of PSA?
    6. Free Response 5.1.5 Draft your PSA
    7. Free Response 5.1.6 Finalize your PSA!
  6. Programming Fundamentals

    1. 6.1 Programming Concepts

    2. Video 6.1.1 Programming Concepts
    3. Check for Understanding 6.1.2 Programming Concepts Quiz
    4. Connection 6.1.3 Compilers vs. Interpreters
    5. Free Response 6.1.4 Compilers vs. Interpreters
    6. Example 6.1.5 Variables in Action
    7. Example 6.1.6 Data Types using Typeof
    8. Example 6.1.7 Basic Variables
    9. Exercise 6.1.8 Daily Activities
    10. 6.2 Programming with Karel

    11. Video 6.2.1 Programming With Karel
    12. Check for Understanding 6.2.2 Quiz: Karel Commands
    13. Example 6.2.3 Our First Karel Program
    14. Exercise 6.2.4 Your First Karel Program
    15. Video 6.2.5 Functions in Karel
    16. Check for Understanding 6.2.6 Functions in Karel Quiz
    17. Example 6.2.7 Turn Around
    18. Example 6.2.8 Digging Karel
    19. Exercise 6.2.9 Backflip
    20. 6.3 Looping

    21. Video 6.3.1 For Loops
    22. Check for Understanding 6.3.2 For Loops Quiz
    23. Example 6.3.3 Take 'em All
    24. Example 6.3.4 For Loop Square
    25. Exercise 6.3.5 Lots of Hurdles
    26. Video 6.3.6 While Loops in Karel
    27. Check for Understanding 6.3.7 While Loops in Karel Quiz
    28. Example 6.3.8 Move to Wall
    29. Example 6.3.9 Big Tower
    30. Exercise 6.3.10 Follow The Yellow Ball Road
    31. 6.4 Branching

    32. Video 6.4.1 If/Else Statements
    33. Check for Understanding 6.4.2 If/Else Statements Quiz
    34. Example 6.4.3 If/Else Statements
    35. Example 6.4.4 One Ball in Each Spot
    36. Exercise 6.4.5 Right Side Up
    37. 6.5 Organizational Techniques

    38. Video 6.5.1 Organizational Techniques
    39. Check for Understanding 6.5.2 Organizational Techniques Quiz
    40. Example 6.5.3 Hurdle Karel
    41. Exercise 6.5.4 One Ball in Each Spot
    42. Exercise 6.5.5 The Two Towers
    43. Example 6.5.6 Interactive Sequence Diagram