Activity | Points | Item Type |
---|---|---|
Digital Citizenship and Cyber Hygiene | ||
1.1 Welcome to Introduction to Hardware Technology | Lesson | |
1.1.1 Course Introduction | 5 | Notes |
1.1.2 Course Goals | 5 | Free Response |
1.2 Digital Footprint and Reputation | Lesson | |
1.2.1 Digital Footprint and Reputation | 1 | Video |
1.2.2 Digital Footprint and Reputation | 3 | Check for Understanding |
1.2.3 Building a Positive Digital Footprint | 5 | Free Response |
1.2.4 Right to be Forgotten? | 1 | Connection |
1.2.5 Right to be Forgotten | 5 | Free Response |
1.2.6 What is your Digital Footprint? | 5 | Free Response |
1.3 Privacy & Security | Lesson | |
1.3.1 What is Data Privacy & Security? | 1 | Video |
1.3.2 Privacy & Security Quiz | 2 | Check for Understanding |
1.3.3 How Strong is your Password? | 1 | Connection |
1.3.4 How Strong is your password? | 5 | Free Response |
1.3.5 Guess: Password List | 1 | Example |
1.3.6 Guess: Using an Algorithm | 1 | Example |
1.3.7 Guess: Brute Force | 1 | Example |
1.3.8 Google Privacy Policy Search | 1 | Connection |
1.3.9 Google Privacy Policy Search | 5 | Free Response |
1.3.10 Is Your Head in the Cloud? | 5 | Resource |
1.3.11 You Can Be Tracked! | 1 | Example |
1.4 Creative Credit & Copyright | Lesson | |
1.4.1 Creative Credit and Copyright | 1 | Video |
1.4.2 Creative Credit and Copyright | 2 | Check for Understanding |
1.4.3 Cite! | 5 | Free Response |
1.4.4 Exploring Creative Commons | 1 | Connection |
1.4.5 Respond: Creative Commons | 5 | Free Response |
1.4.6 Finding Images | 5 | Free Response |
1.4.7 Reflection: Why is Copyright Important? | 5 | Free Response |
1.4.8 Consequences | 5 | Free Response |
1.5 Hacking Ethics | Lesson | |
1.5.1 Hacking Ethics & Legality | 1 | Video |
1.5.2 Hacking Ethics & Legality | 3 | Check for Understanding |
1.5.3 Penetration Testing | 1 | Connection |
1.5.4 Reflection: Penetration Testing | 5 | Free Response |
1.5.5 Hack the Pentagon? | 1 | Connection |
1.5.6 Reflection: Hack the Pentagon | 5 | Free Response |
1.5.7 Ethical Hacker Agreement | 1 | Check for Understanding |
1.6 Common Security Problems | Lesson | |
1.6.1 Common Security Problems | 1 | Video |
1.6.2 Common Security Problems | 1 | Check for Understanding |
1.6.3 Meet Security Engineers at Google | 1 | Connection |
1.6.4 Security Engineering Reflection | 5 | Free Response |
1.6.5 Living in a Digital World | 1 | Video |
1.6.6 Living in a Digital World | 5 | Free Response |
1.7 Always Connected | Lesson | |
1.7.1 Pre-Lesson Reflection | 5 | Free Response |
1.7.2 Time to Do Some Research | 5 | Notes |
1.7.3 Internet Addiction Pt 1 | 5 | Connection |
1.7.4 Internet Addiction Pt 2 | 5 | Connection |
1.7.5 Cell Phone Addiction | 5 | Connection |
1.7.6 Video Game Addiction | 5 | Connection |
1.7.7 Present Your Findings | 5 | Presentation |
Operating Systems and Software | ||
2.1 Software vs. Hardware | Lesson | |
2.1.1 Software | 1 | Video |
2.1.2 Software Quiz | 2 | Check for Understanding |
2.1.3 Software Explained | 1 | Connection |
2.1.4 Hardware Review | 4 | Check for Understanding |
2.1.5 Hardware vs. Software | 5 | Free Response |
2.1.6 What Do You Suggest? | 5 | Resource |
2.2 Operating Systems | Lesson | |
2.2.1 Operating Systems | 1 | Video |
2.2.2 Operating Systems Quiz | 5 | Check for Understanding |
2.2.3 Detect My OS | 1 | Example |
2.2.4 Upgrading a Mac OS | 1 | Connection |
2.2.5 Windows OS Installation Simulation | 1 | Example |
2.2.6 Installing an OS | 5 | Free Response |
2.3 Comparing Operating Systems | Lesson | |
2.3.1 Comparing Operating Systems | 1 | Video |
2.3.2 Comparing Operating Systems Quiz | 5 | Check for Understanding |
2.3.3 Windows Simulation | 1 | Example |
2.3.4 MacOS Simulation | 1 | Example |
2.3.5 Choose a Linux Distro! | 1 | Connection |
2.3.6 Which would you choose? | 5 | Free Response |
2.4 File and Folder Management | Lesson | |
2.4.1 File Management, Pt 1 | 5 | Connection |
2.4.2 File Management, Pt 2 | 5 | Connection |
2.4.3 Organize These Files! | 5 | Free Response |
2.4.4 Back Up These Files! | 5 | Presentation |
2.5 Compatibility | Lesson | |
2.5.1 Compatibility | 1 | Video |
2.5.2 Compatibility Quiz | 3 | Check for Understanding |
2.5.3 What Processor? Windows | 1 | Example |
2.5.4 What Processor? Mac | 1 | Example |
2.5.5 What Processor are you running? | 5 | Free Response |
2.5.6 Compatibility Testing | 5 | Connection |
2.5.7 Compatibility Reflection | 5 | Free Response |
2.6 Software and Applications | Lesson | |
2.6.1 Software and Applications | 1 | Video |
2.6.2 Software and Applications Quiz | 2 | Check for Understanding |
2.6.3 Spreadsheet Simulation | 1 | Example |
2.6.4 Messaging Simulation | 1 | Example |
2.6.5 Kanban Board Simulation | 1 | Example |
2.6.6 Software Simulations | 5 | Free Response |
2.7 Software Licenses | Lesson | |
2.7.1 Software Licenses | 1 | Video |
2.7.2 Software Licenses Quiz | 3 | Check for Understanding |
2.7.3 Do I need a Software License? | 5 | Free Response |
2.7.4 Is This Original? | 5 | Free Response |
2.8 Software Development | Lesson | |
2.8.1 Development Life Cycle | 1 | Video |
2.8.2 Development Life Cycle | 3 | Check for Understanding |
2.8.3 Scrum Framework | 1 | Connection |
2.8.4 SCRUM Response | 5 | Free Response |
2.8.5 Using Flowcharts | 5 | Connection |
2.8.6 Project: Mapping an App | 5 | Presentation |
2.9 What is Artificial Intelligence? | Lesson | |
2.9.1 What is Artificial Intelligence? | 5 | Video |
2.9.2 What is Artificial Intelligence? | 3 | Quiz |
2.9.3 A Day in the Life of AI | 5 | Connection |
2.9.4 A Day in the Life of AI | 5 | Free Response |
2.9.5 Guess the Drawing | 5 | Connection |
2.9.6 Drawing with AI | 5 | Connection |
2.9.7 Drawing with AI | 5 | Free Response |
2.10 The Ethics of Artificial Intelligence | Lesson | |
2.10.1 The Ethics of Artificial Intelligence | 5 | Video |
2.10.2 The Ethics of Artificial Intelligence | 3 | Quiz |
2.10.3 Bias in Facial Recognition Software | 5 | Connection |
2.10.4 Bias in Facial Recognition Software | 5 | Free Response |
2.10.5 Testing a Biased Dataset | 5 | Notes |
2.10.6 Debating the Ethics of Self Driving Cars | 5 | Free Response |
Hardware | ||
3.1 Internal Components | Lesson | |
3.1.1 Internal Components | 1 | Video |
3.1.2 Internal Components | 5 | Check for Understanding |
3.1.3 Build a Computer | 1 | Connection |
3.1.4 Build a Computer | 5 | Free Response |
3.1.5 Test Your Brain's RAM! | 1 | Example |
3.1.6 Test Your Brain's RAM! Reflection | 5 | Free Response |
3.1.7 The Machine Instruction Cycle | 5 | Connection |
3.1.8 Computer Crashes | 5 | Connection |
3.1.9 Computer Crashes Reflection | 5 | Free Response |
3.2 Storage Options | Lesson | |
3.2.1 Storage Options | 1 | Video |
3.2.2 Storage Options Quiz | 5 | Check for Understanding |
3.2.3 Security of Cloud Storage | 1 | Connection |
3.2.4 Security of Cloud Storage | 5 | Free Response |
3.2.5 Storage Suggestions | 5 | Free Response |
3.3 Lab: Computer Disassembly | Lesson | |
3.3.1 Lab: Computer Disassembly | 5 | Resource |
3.3.2 Video: Disassemble a Computer | 1 | Connection |
3.3.3 Article: Disassemble a Computer | 5 | Connection |
3.4 Peripheral Devices | Lesson | |
3.4.1 Peripheral Devices | 1 | Video |
3.4.2 Peripheral Devices | 5 | Check for Understanding |
3.4.3 Personalized Peripherals | 5 | Free Response |
3.4.4 IT Help | 5 | Free Response |
3.4.5 Your Ideal Computer Setup | 5 | Free Response |
3.5 Network Devices | Lesson | |
3.5.1 Network Devices | 1 | Video |
3.5.2 Network Devices | 5 | Check for Understanding |
3.5.3 Speed Test | 1 | Connection |
3.5.4 Speed Test | 5 | Free Response |
3.5.5 Fiber Optics Bend Light! | 1 | Connection |
3.5.6 Fiber Optics Bend Light! | 5 | Free Response |
3.5.7 Ethernet Standards | 1 | Connection |
3.5.8 Ethernet Standards | 5 | Free Response |
3.5.9 Copper vs. Fiber Optic | 1 | Connection |
3.5.10 Copper vs. Fiber Optic | 5 | Free Response |
3.5.11 Network Troubleshooting | 5 | Free Response |
3.5.12 Troubleshooting Cable Issues | 1 | Connection |
3.5.13 Troubleshooting Cable Issues | 5 | Free Response |
3.6 Laptops and Tablets | Lesson | |
3.6.1 Form Factor | 5 | Free Response |
3.6.2 Laptop vs. Tablet | 1 | Connection |
3.6.3 Laptop vs. Tablet | 5 | Free Response |
3.6.4 Which is best? | 1 | Notes |
3.6.5 Product Chart | 5 | Video |
3.6.6 Device Comparison | 5 | Free Response |
3.7 Mobile Devices | Lesson | |
3.7.1 Mobile Devices | 1 | Video |
3.7.2 Mobile Devices Quiz | 5 | Check for Understanding |
3.7.3 How Apple FaceID Works | 1 | Connection |
3.7.4 How Apple FaceID Works Response | 5 | Free Response |
3.7.5 Biometric Data Debate | 5 | Free Response |
3.7.6 BYOD and MDM Concept Map | 1 | Connection |
3.7.7 BYOD and MDM Conclusions | 5 | Free Response |
3.8 Lab: Mobile Device Connectivity | Lesson | |
3.8.1 Mobile Device Features | 1 | Connection |
3.8.2 Mobile Device Simulator | 1 | Notes |
3.8.3 Lab: Mobile Device Connectivity | 5 | Resource |
3.9 The Internet of Things | Lesson | |
3.9.1 Internet of Things | 1 | Connection |
3.9.2 IoT Deep Dive | 5 | Connection |
3.9.3 Smart Devices in Your Life | 5 | Free Response |
3.9.4 IoT Reflection | 5 | Free Response |
Project: Troubleshooting | ||
4.1 Methodology | Lesson | |
4.1.1 Troubleshooting Methodology | 1 | Notes |
4.1.2 Identify the Problem | 5 | Free Response |
4.1.3 Research Solutions | 5 | Free Response |
4.1.4 Establish a Theory | 5 | Free Response |
4.1.5 Test the Theory | 5 | Free Response |
4.1.6 Fix the Problem! | 5 | Free Response |
4.1.7 Diagnostic Tools | 5 | Connection |
4.2 Support Practice | Lesson | |
4.2.1 Signal Strength | 10 | Exercise |
4.2.2 Interference | 10 | Exercise |
Networking | ||
5.1 Introduction to the Internet | Lesson | |
5.1.1 Welcome to the Internet | 1 | Video |
5.1.2 Intro to the Internet | 3 | Check for Understanding |
5.1.3 Inside Facebook's Connectivity Lab | 1 | Connection |
5.1.4 Connectivity Lab Reflection | 5 | Free Response |
5.2 Impact of the Internet | Lesson | |
5.2.1 Impact of the Internet | 1 | Video |
5.2.2 Impact of the Internet | 3 | Check for Understanding |
5.2.3 What is the Digital Divide? | 1 | Connection |
5.2.4 What is the Digital Divide? | 5 | Free Response |
5.3 Internet Hardware and Sending Information | Lesson | |
5.3.1 Internet Hardware | 1 | Video |
5.3.2 Internet Hardware | 2 | Check for Understanding |
5.3.3 Sending Information | 1 | Video |
5.3.4 Sending Information | 3 | Check for Understanding |
5.3.5 The Internet is in the Ocean | 1 | Connection |
5.3.6 Internet in the Ocean Reflection | 5 | Free Response |
5.4 Internet Addresses | Lesson | |
5.4.1 Internet Addresses | 1 | Video |
5.4.2 Internet Addresses | 2 | Check for Understanding |
5.4.3 The Need for Addresses | 5 | Free Response |
5.4.4 IPv4 vs. IPv6 | 1 | Connection |
5.4.5 Reflection: IPv4 vs IPv6 | 5 | Free Response |
5.5 Domain Name System (DNS) | Lesson | |
5.5.1 Domain Name System (DNS) | 1 | Video |
5.5.2 Domain Name System | 2 | Check for Understanding |
5.5.3 How Does DNS Work? | 1 | Connection |
5.5.4 How Does DNS Work? | 5 | Free Response |
5.6 Routing | Lesson | |
5.6.1 Routing | 1 | Video |
5.6.2 Routing | 3 | Check for Understanding |
5.6.3 Route Tracing | 1 | Traceroute |
5.6.4 Redundancy | 5 | Free Response |
5.7 Packets & Protocols | Lesson | |
5.7.1 Packets | 1 | Video |
5.7.2 Packets | 2 | Check for Understanding |
5.7.3 Protocols | 1 | Video |
5.7.4 Protocols | 3 | Check for Understanding |
5.7.5 How the Internet Works | 1 | Connection |
5.7.6 The Journey of an Image | 5 | Free Response |
5.8 Protocols and Standards | Lesson | |
5.8.1 Protocols | 1 | Video |
5.8.2 Protocols Quiz | 3 | Check for Understanding |
5.8.3 Standards | 1 | Video |
5.8.4 Standards Quiz | 2 | Check for Understanding |
5.8.5 The New Wireless Standard | 1 | Connection |
5.8.6 801.11ax | 1 | Connection |
5.8.7 Wavelength | 1 | Connection |
5.8.8 801.11ax FR | 5 | Free Response |
5.9 Viewing a Webpage | Lesson | |
5.9.1 Viewing a Webpage | 1 | Video |
5.9.2 Viewing a Webpage | 2 | Check for Understanding |
5.9.3 Explaining a URL | 5 | Free Response |
5.9.4 Net Neutrality Explained | 1 | Connection |
5.9.5 FCCs Net Neutrality Rules Officially Repealed | 1 | Connection |
5.9.6 Take a Side on Net Neutrality | 5 | Free Response |
5.9.7 Net Neutrality and Cybersecurity | 1 | Connection |
5.9.8 Net Neutrality and Cybersecurity Research | 5 | Free Response |
5.10 Network Options | Lesson | |
5.10.1 Network Options | 1 | Video |
5.10.2 Network Options Quiz | 5 | Check for Understanding |
5.10.3 What is an SSID? | 1 | Connection |
5.10.4 What is an SSID? | 5 | Free Response |
5.10.5 Wireless Threats | 1 | Connection |
5.10.6 Wireless Threats | 5 | Free Response |
5.10.7 Wireless Network Setup | 5 | Free Response |
5.11 Network Administrator | Lesson | |
5.11.1 Advanced Devices | 1 | Video |
5.11.2 Advanced Devices Quiz | 5 | Check for Understanding |
5.11.3 Network Administrator Career | 1 | Connection |
5.11.4 Network Administrator Career | 5 | Free Response |
5.11.5 Choosing the Best Devices | 5 | Free Response |
5.11.6 Network Diagram | 5 | Free Response |
5.12 Network Communication | Lesson | |
5.12.1 Network Communication | 1 | Video |
5.12.2 Network Communication Quiz | 2 | Check for Understanding |
5.12.3 Setting up a Firewall | 1 | Example |
5.12.4 iptables | 5 | Free Response |
5.12.5 iptables simulation | 1 | Notes |
5.13 Network Management | Lesson | |
5.13.1 Linux/MacOS vs. Windows | 1 | Notes |
5.13.2 Network Management | 1 | Video |
5.13.3 Network Management Quiz | 3 | Check for Understanding |
5.13.4 MacOS Terminal Simulation | 1 | Example |
5.13.5 Windows Command Prompt Simulation | 1 | Example |
5.13.6 Windows Command Prompt Spy | 5 | Video |
5.13.7 Windows Command Prompt Spy | 5 | Free Response |
5.13.8 SSH Logs | 1 | Notes |
5.13.9 SSH Logs | 1 | Example |
5.13.10 SSH Logs Submission | 5 | Free Response |
5.14 Advanced Networking | Lesson | |
5.14.1 The OSI Model and Network Attacks | 1 | Connection |
5.14.2 The OSI Model and Network Attacks Response | 5 | Free Response |
5.14.3 Encapsulation | 1 | Connection |
5.14.4 What is Virtualization? | 1 | Connection |
5.14.5 Virtualization Response | 5 | Free Response |
5.14.6 Baseband vs. Broadband | 5 | Free Response |
5.14.7 Bit Rate vs. Baud Rate | 5 | Free Response |
5.14.8 CSMA/CD vs. CSMA/CA | 1 | Resource |
IT Professionals | ||
6.1 IT Helpdesk | Lesson | |
6.1.1 The Many Jobs at the IT Helpdesk | 5 | Connection |
6.1.2 IT Helpdesk Scavenger Hunt | 5 | Free Response |
6.1.3 Find an IT Job! | 5 | Free Response |
6.2 Working with Customers | Lesson | |
6.2.1 What is a CRM System? | 5 | Connection |
6.2.2 CRM System Reflection | 5 | Free Response |
6.2.3 Customer Service Skills | 1 | Connection |
6.2.4 Customer Service Skills Reflection | 5 | Free Response |
6.2.5 Act it Out! | 15 | Free Response |
6.2.6 Log it in the CRM! | 5 | Free Response |
6.3 Building a Knowledge Base | Lesson | |
6.3.1 What is a Knowledge Base? | 1 | Connection |
6.3.2 Draft a KB Article | 5 | Free Response |
6.3.3 Share your KB Article | 5 | Free Response |
6.3.4 Finalize your KB Article | 15 | Free Response |
6.4 Star in a Video! | Lesson | |
6.4.1 Instructional Videos | 1 | Connection |
6.4.2 Example Tutorial | 1 | Connection |
6.4.3 Instructional Video Plan | 5 | Free Response |
6.4.4 Write the Script | 5 | Free Response |
6.4.5 Create the Storyboard | 5 | Free Response |
6.4.6 Record Your Video | 5 | Free Response |
6.5 Keeping a Database | Lesson | |
6.5.1 Databases | 1 | Video |
6.5.2 Databases | 1 | Check for Understanding |
6.5.3 Personally Identifiable Information (PII) | 5 | Free Response |
6.5.4 FERPA | 5 | Connection |
6.5.5 What is SQL? | 5 | Notes |
6.5.6 How to Structure Data in SQL | 1 | Video |
6.5.7 How to Structure Data in SQL | 3 | Check for Understanding |
6.5.8 SQL Table: Tiktok | 1 | Example |
6.5.9 Customer List | 5 | Example |
6.6 Compliance Laws | Lesson | |
6.6.1 IT Compliance | 5 | Connection |
6.6.2 National Regulation Table | 5 | Connection |
6.6.3 Georgia State Regulations | 5 | Free Response |
6.6.4 Compliance Reflection | 5 | Free Response |
6.7 Asset Management | Lesson | |
6.7.1 IT Asset Management | 5 | Notes |
6.7.2 What is ITAM? | 5 | Connection |
6.7.3 Diving Deeper into ITAM | 5 | Connection |
6.7.4 ITAM Presentation | 5 | Presentation |
6.8 Emerging Technology and IT | Lesson | |
6.8.1 What is Cloud Computing? | 5 | Connection |
6.8.2 Cloud Computing and IT | 5 | Connection |
6.8.3 Reflection: Cloud Computing | 5 | Free Response |
6.9 Environmental Controls | Lesson | |
6.9.1 Environmental Controls | 1 | Video |
6.9.2 Environmental Controls Quiz | 5 | Check for Understanding |
6.9.3 Infographic | 1 | Connection |
6.9.4 Infographic FR | 5 | Free Response |
6.9.5 Electrostatic Discharge | 1 | Connection |
6.9.6 Your Security Systems | 5 | Free Response |
6.9.7 Security Design | 10 | Free Response |
6.10 Personal Safety | Lesson | |
6.10.1 Safety Precautions | 5 | Free Response |
6.10.2 Electrical Hazards | 5 | Free Response |
6.10.3 Fire Suppression | 1 | Connection |
6.10.4 Fire Suppression Response | 5 | Free Response |
6.10.5 Emergency Response Plan | 5 | Connection |
Project: IT Proposal | ||
7.1 IT Department Proposal | Lesson | |
7.1.1 Project Introduction | 5 | Notes |
7.1.2 Find Your Companies | 5 | Free Response |
7.1.3 Get to Know Your Companies | 5 | Free Response |
7.1.4 Draft Your Pitch | 5 | Free Response |
7.1.5 Create Your Presentation | 5 | Presentation |
7.1.6 Next Steps | 5 | Free Response |
Cybersecurity | ||
8.1 What is Cybersecurity? | Lesson | |
8.1.1 What is Cybersecurity? | 1 | Video |
8.1.2 What is Cybersecurity? | 3 | Check for Understanding |
8.1.3 City Services Ransomware | 1 | Connection |
8.1.4 Ransomware Reflection | 5 | Free Response |
8.1.5 Ransomware Simulator | 1 | Example |
8.1.6 Hackers vs. Smart Homes | 1 | Connection |
8.1.7 Connectivity Reflection | 5 | Free Response |
8.2 Impact of Cybersecurity | Lesson | |
8.2.1 Impact of Cybersecurity | 1 | Video |
8.2.2 Impact of Cybersecurity | 2 | Check for Understanding |
8.2.3 Phishing Simulator | 1 | Example |
8.2.4 Phishing for Your Info | 1 | Connection |
8.2.5 Phishing Reflection | 5 | Free Response |
8.2.6 Cyber Game | 1 | Connection |
8.2.7 Cyber Game Reflection | 5 | Free Response |
8.2.8 Cyber Crime Time | 1 | Connection |
8.2.9 Cyber Crime Time Reflection | 5 | Free Response |
8.3 Network Attacks | Lesson | |
8.3.1 Network Attacks Overview | 1 | Video |
8.3.2 Network Attacks Quiz | 4 | Check for Understanding |
8.3.3 Check for Vulnerabilities | 1 | Notes |
8.3.4 Bug Bounty Hunting | 1 | Connection |
8.3.5 Bug Bounty Hunting | 5 | Free Response |
8.3.6 Common Port Targets | 1 | Connection |
8.3.7 Port Scanner Simulation | 1 | Example |
8.3.8 Open Port Reflection | 5 | Free Response |
8.4 Malware Types and Prevention | Lesson | |
8.4.1 Malware Types and Prevention | 1 | Video |
8.4.2 Malware Types and Prevention | 5 | Check for Understanding |
8.4.3 How Anti-malware Works | 1 | Connection |
8.4.4 How Anti-malware Works | 5 | Free Response |
8.4.5 OS Malware Security | 5 | Free Response |
8.4.6 Reverse Engineering Malware | 5 | Free Response |
8.5 Common Network Attacks | Lesson | |
8.5.1 Common Network Attacks | 1 | Video |
8.5.2 Network Attacks | 3 | Check for Understanding |
8.5.3 Social Engineering Hack | 1 | Connection |
8.5.4 Social Engineering Reflection | 5 | Free Response |
8.5.5 DDoS Attacks | 1 | Connection |
8.5.6 DDoS Simulation | 1 | Example |
8.5.7 DDoS Reflection | 5 | Free Response |
8.6 Additional Attacks | Lesson | |
8.6.1 Additional Attacks | 1 | Video |
8.6.2 Additional Attacks Quiz | 5 | Check for Understanding |
8.6.3 Botnet Attacks - Mirai | 1 | Connection |
8.6.4 Botnet Attacks - 3ve | 1 | Connection |
8.6.5 Botnet Attacks - 3ve Video | 1 | Connection |
8.6.6 Botnet Attacks - Reflection | 5 | Free Response |
8.6.7 Zero-day Exploit: Stuxnet | 5 | Connection |
8.6.8 Zero-day Exploit: Stuxnet | 5 | Notes |
8.6.9 Zero-day Exploit Reflection | 5 | Free Response |
8.6.10 US-CERT Current Activity | 5 | Free Response |
8.7 Internal Threats | Lesson | |
8.7.1 Internal Threats | 1 | Video |
8.7.2 Internal Threats | 5 | Check for Understanding |
8.7.3 BIOS/UEFI Attack Example | 1 | Connection |
8.7.4 Accessing BIOS/UEFI | 1 | Notes |
8.7.5 Causes of Data Breaches | 5 | Connection |
8.7.6 Causes of Data Breaches | 5 | Free Response |
8.7.7 Protecting Data at All Times | 1 | Connection |
8.7.8 Protecting Data at All Times | 5 | Free Response |
Project: Digital Forensics | ||
9.1 Digital Forensics | Lesson | |
9.1.1 Digital Forensics | 1 | Video |
9.1.2 Student Success Story | 1 | Connection |
9.1.3 Student Success Story Response | 5 | Free Response |
9.2 Forensic Case 1: Logs | Lesson | |
9.2.1 Network Logs | 1 | Notes |
9.2.2 Network Log Evidence | 1 | Example |
9.2.3 Network Logs Conclusion | 5 | Free Response |
9.3 Forensic Case 2: File Metadata | Lesson | |
9.3.1 File Metadata | 1 | Notes |
9.3.2 File Metadata Evidence | 1 | Example |
9.3.3 File Metadata Conclusion | 5 | Free Response |
9.4 Forensic Case 3: Exif Data | Lesson | |
9.4.1 Photo Exif | 1 | Notes |
9.4.2 Exif Using Inspector | 1 | Connection |
9.4.3 Exif Using the CLI | 1 | Example |
9.4.4 Photo Exif Conclusion | 5 | Free Response |
Computer Science Careers | ||
10.1 Computer Science Careers | Lesson | |
10.1.1 Computer Science All Around Us | 1 | Video |
10.1.2 Computer Science All Around Us | 2 | Quiz |
10.1.3 Coding in the Wild | 1 | Connection |
10.1.4 Coding in the Wild Response | 5 | Free Response |
10.1.5 Emerging Technologies and Careers | 5 | Connection |
10.1.6 The Impact of Emerging Technologies | 5 | Free Response |
10.1.7 Career Research | 5 | Resource |
10.2 Create an Online Portfolio | Lesson | |
10.2.1 Online Repositories | 5 | Free Response |
10.2.2 What is a Resume? | 5 | Connection |
10.2.3 What is a Resume? | 5 | Free Response |
10.2.4 Upload Relevant Documents | 5 | Notes |
10.3 Student Organizations | Lesson | |
10.3.1 What Are They? | 5 | Notes |
10.3.2 Their Mission | 5 | Free Response |
10.3.3 Career Development | 5 | Free Response |
10.3.4 Additional Opportunities | 5 | Free Response |
10.3.5 Lifelong Lessons | 5 | Free Response |
Supplemental: Unit Quizzes | ||
11.1 Note to Teacher | Lesson | |
11.1.1 Note to Teacher | 5 | Notes |
11.2 IT Infrastructure Quiz | Lesson | |
11.2.1 IT Infrastructure Quiz | 20 | Unit Quiz |
11.3 Networking Fundamentals Quiz | Lesson | |
11.3.1 Mindsets | 1 | Survey |
11.3.2 Networking Fundamentals Quiz | 15 | Unit Quiz |
11.4 Cyber Defense Quiz | Lesson | |
11.4.1 Cyber Defense Quiz | 20 | Unit Quiz |
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.
Teacher SignupSign up as a student if you are in a school and have a class code given to you by your teacher.
Student Signup