Please enable JavaScript to use CodeHS

Introduction to Cybersecurity (Vigenere) - Outline

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Video 1.1.1 Welcome to Cybersecurity
    3. Check for Understanding 1.1.2 Welcome to Cybersecurity
    4. Example 1.1.3 Intruder Alert!
    5. Free Response 1.1.4 Cybersecurity and You
    6. Free Response 1.1.5 Course Goals
    7. 1.2 What is Cybersecurity?

    8. Video 1.2.1 What is Cybersecurity?
    9. Check for Understanding 1.2.2 What is Cybersecurity?
    10. Connection 1.2.3 WannaCry Ransomware Attack
    11. Free Response 1.2.4 WannaCry Reflection
    12. Example 1.2.5 Ransomware Simulator
    13. Connection 1.2.6 Internet of Things
    14. Connection 1.2.7 Cybersecurity and Connected Cars
    15. Free Response 1.2.8 Internet of Things Reflection
    16. Connection 1.2.9 Threat Map
    17. Free Response 1.2.10 Why Learn about Cybersecurity?
    18. Example 1.2.11 QR Code Generator
    19. 1.3 Impact of Cybersecurity

    20. Video 1.3.1 Impact of Cybersecurity
    21. Check for Understanding 1.3.2 Impact of Cybersecurity
    22. Connection 1.3.3 Yahoo! Attack
    23. Free Response 1.3.4 Yahoo! Reflection
    24. Connection 1.3.5 Fighting Cyber Crime
    25. Free Response 1.3.6 Cyber Crime Reflection
    26. Connection 1.3.7 FBI Cyber Crime
    27. Free Response 1.3.8 FBI Reflection
    28. Example 1.3.9 Phishing Simulator
    29. 1.4 The CIA Triad

    30. Video 1.4.1 CIA Triad
    31. Check for Understanding 1.4.2 CIA Triad
    32. Free Response 1.4.3 Which part of the CIA Triad?
    33. Free Response 1.4.4 Which part of the CIA Triad?
    34. Free Response 1.4.5 Breach of Confidentiality
    35. Free Response 1.4.6 Breach of Availability
    36. 1.5 What is Cybersecurity? Quiz

    37. Quiz 1.5.1 What is Cybersecurity? Quiz
    38. Badge 1.5.2 Intro to Cybersecurity Badge
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Free Response 2.1.3 Building a Positive Digital Footprint
    5. Connection 2.1.4 Right to be Forgotten?
    6. Free Response 2.1.5 Right to be Forgotten
    7. Free Response 2.1.6 What is your Digital Footprint?
    8. Example 2.1.7 Social Media Clean-up
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Free Response 2.2.5 Stopping Cyberbullying
    15. 2.3 Internet Safety

    16. Video 2.3.1 Internet Safety
    17. Check for Understanding 2.3.2 Internet Safety
    18. Free Response 2.3.3 Scenario: School Stranger
    19. Free Response 2.3.4 Scenario: Vacation Pals
    20. Free Response 2.3.5 Staying Safe
    21. 2.4 Privacy & Security

    22. Video 2.4.1 What is Data Privacy & Security?
    23. Check for Understanding 2.4.2 Privacy & Security Quiz
    24. Connection 2.4.3 How Strong is your Password?
    25. Free Response 2.4.4 How Strong is your password?
    26. Connection 2.4.5 Google Privacy Policy Search
    27. Free Response 2.4.6 Google Privacy Policy Search
    28. Example 2.4.7 Guess: Password List
    29. Example 2.4.8 Guess: Using an Algorithm
    30. Example 2.4.9 Guess: Brute Force
    31. 2.5 Information Literacy

    32. Video 2.5.1 Information Literacy
    33. Check for Understanding 2.5.2 Information Literacy
    34. Free Response 2.5.3 Effective Internet Searches
    35. Connection 2.5.4 Evaluate the Source 1
    36. Free Response 2.5.5 Respond: Evaluate the Source 1
    37. Connection 2.5.6 Evaluate the Source 2
    38. Free Response 2.5.7 Respond: Evaluate the Source 2
    39. Connection 2.5.8 Hero Pig?
    40. 2.6 Creative Credit & Copyright

    41. Video 2.6.1 Creative Credit and Copyright
    42. Check for Understanding 2.6.2 Creative Credit and Copyright
    43. Free Response 2.6.3 Cite!
    44. Connection 2.6.4 Exploring Creative Commons
    45. Free Response 2.6.5 Respond: Creative Commons
    46. Free Response 2.6.6 Task: Finding Images
    47. Free Response 2.6.7 Reflection: Why is Copyright Important?
    48. 2.7 Hacking Ethics

    49. Video 2.7.1 Hacking Ethics & Legality
    50. Check for Understanding 2.7.2 Hacking Ethics & Legality
    51. Connection 2.7.3 Penetration Testing
    52. Free Response 2.7.4 Reflection: Penetration Testing
    53. Connection 2.7.5 Hack the Pentagon?
    54. Free Response 2.7.6 Reflection: Hack the Pentagon
    55. Check for Understanding 2.7.7 Ethical Hacker Agreement
    56. 2.8 Digital Citizenship and Cyber Hygiene Quiz

    57. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
    58. Badge 2.8.2 Digital Citizenship and Cybersecurity Badge
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Connection 4.1.3 Securing the Cloud
    5. Free Response 4.1.4 Encryption Reflection
    6. Example 4.1.5 Encrypt/Decrypt
    7. Example 4.1.6 Cryptogram Game!
    8. 4.2 History of Cryptography

    9. Video 4.2.1 Cryptography: A Brief History
    10. Check for Understanding 4.2.2 Cryptography History Quiz
    11. Connection 4.2.3 How the Enigma Worked
    12. Free Response 4.2.4 How the Enigma Worked
    13. Connection 4.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 4.2.6 The Future of Cybersecurity
    15. 4.3 Why Encrypt?

    16. Video 4.3.1 Why encrypt?
    17. Check for Understanding 4.3.2 Why encrypt?
    18. 4.4 Basic Crypto Systems: Caesar Cipher

    19. Video 4.4.1 Caesar Cipher
    20. Check for Understanding 4.4.2 Caesar Cipher
    21. Example 4.4.3 Caesar Cipher Encryption
    22. Example 4.4.4 Decrypt Caesar's Cipher!
    23. Exercise 4.4.5 Decrypting Caesar
    24. 4.5 Basic Crypto Systems: Cracking Caesar

    25. Video 4.5.1 Cracking Caesar Cipher
    26. Check for Understanding 4.5.2 Cracking Caesar Cipher
    27. Example 4.5.3 Cracking Caesar with Brute Force
    28. Example 4.5.4 Letter Frequency and Caesar
    29. Free Response 4.5.5 Examining Caesar Cipher
    30. 4.6 Basic Crypto Systems: Vigenere Cipher

    31. Video 4.6.1 Vigenere Cipher
    32. Check for Understanding 4.6.2 Vigenere Cipher
    33. Example 4.6.3 Vigenere Cipher Example
    34. Example 4.6.4 Letter Frequency and Vigenere Cipher
    35. Free Response 4.6.5 Examining Vigenere Cipher
    36. Example 4.6.6 Improving Vigenere
    37. 4.7 Advanced Cryptography

    38. Video 4.7.1 Advanced Cryptography
    39. Check for Understanding 4.7.2 Advanced Cryptography
    40. Connection 4.7.3 Public Key Cryptography for Non-Geeks
    41. Free Response 4.7.4 Examining Public Key Cryptography
    42. Connection 4.7.5 Public Key Cryptography
    43. Free Response 4.7.6 Public Key Cryptography
    44. 4.8 Hash Functions

    45. Video 4.8.1 Hash Functions
    46. Check for Understanding 4.8.2 Hash Functions
    47. Connection 4.8.3 Google Shattered Crypto Algorithm
    48. Free Response 4.8.4 Hash Functions in the News
    49. Connection 4.8.5 Using a Hash Generator
    50. Free Response 4.8.6 Hash Generator
    51. 4.9 Hash Function Development

    52. Video 4.9.1 Hash Function Development
    53. Check for Understanding 4.9.2 Hash Function Development
    54. Example 4.9.3 Modulo Math Calculator
    55. Example 4.9.4 Understanding Modulo Math
    56. Example 4.9.5 Modulo Game!
    57. Exercise 4.9.6 Develop a Simple Hash Function
    58. 4.10 The ABCs of Cryptography Quiz

    59. Quiz 4.10.1 The ABCs of Cryptography Quiz
    60. Badge 4.10.2 ABCs of Cryptography Badge
  5. Project: Classic Cipher Newscast

    1. 5.1 Project: Classic Cipher Newscast

    2. Notes 5.1.1 Overview
    3. Free Response 5.1.2 Preview Sample Newscasts
    4. Notes 5.1.3 Investigate a Classic Cipher
    5. Free Response 5.1.4 Write the Script and Rehearse
    6. Free Response 5.1.5 Newscast Presentation
  6. Software Security

    1. 6.1 Inside Web Apps

    2. Video 6.1.1 Inside Web Apps
    3. Check for Understanding 6.1.2 Inside Web Apps
    4. Free Response 6.1.3 Using View Page Source
    5. Connection 6.1.4 Getting Started with OWASP
    6. Free Response 6.1.5 Getting Started with OWASP
    7. Example 6.1.6 Recreate a Webpage?
    8. 6.2 Developer Tools

    9. Video 6.2.1 Developer Tools
    10. Check for Understanding 6.2.2 Developer Tools
    11. Free Response 6.2.3 Using the Developer Tools
    12. Connection 6.2.4 The Top Cybersecurity Blogs and Websites
    13. Free Response 6.2.5 Selecting a Site to Follow
    14. Exercise 6.2.6 Console Secrets
    15. Example 6.2.7 Local Storage
    16. 6.3 Databases

    17. Video 6.3.1 Databases
    18. Check for Understanding 6.3.2 Databases
    19. Connection 6.3.3 Database Administrator Career
    20. Free Response 6.3.4 Database Administrator Career
    21. Video 6.3.5 Parts of a Database
    22. Check for Understanding 6.3.6 Parts of a Database
    23. Connection 6.3.7 SQL Database Diagram
    24. Free Response 6.3.8 SQL Database Diagram
    25. Free Response 6.3.9 Schema Brainstorm
    26. 6.4 Clients and Servers

    27. Video 6.4.1 Clients and Servers
    28. Check for Understanding 6.4.2 Clients and Servers
    29. Connection 6.4.3 Inside a Google Data Center
    30. Free Response 6.4.4 Inside a Google Data Center
    31. Connection 6.4.5 Cloud Vulnerabilities
    32. Free Response 6.4.6 Cloud Vulnerabilities Response
    33. Video 6.4.7 Client-Server Model
    34. Check for Understanding 6.4.8 Client-Server Model
    35. Connection 6.4.9 The Future of User Privacy
    36. Free Response 6.4.10 The Future of User Privacy
    37. 6.5 What is SQL?

    38. Notes 6.5.1 What is SQL Overview
    39. Video 6.5.2 Intro to SQL
    40. Check for Understanding 6.5.3 Quiz: What is SQL?
    41. 6.6 Structuring Data in SQL

    42. Video 6.6.1 How to Structure Data in SQL
    43. Check for Understanding 6.6.2 How to Structure Data in SQL
    44. Example 6.6.3 SQL Tables
    45. 6.7 Basic Querying in SQL

    46. Video 6.7.1 The SELECT Statement
    47. Check for Understanding 6.7.2 Basic Querying in SQL
    48. Example 6.7.3 Our First SELECT Statement
    49. Exercise 6.7.4 Your First SELECT Statement
    50. Video 6.7.5 More SELECT Statement
    51. Check for Understanding 6.7.6 More SELECT Statement
    52. Example 6.7.7 Selecting Specific Columns
    53. Exercise 6.7.8 Harry Potter Names
    54. 6.8 Filtering Queries in SQL

    55. Video 6.8.1 The WHERE Clause
    56. Check for Understanding 6.8.2 Condition Operators
    57. Example 6.8.3 Ravenclaw House
    58. Example 6.8.4 People in Gryffindor
    59. Example 6.8.5 Filter By ID
    60. Exercise 6.8.6 The Weasleys
    61. Exercise 6.8.7 The Potters
    62. 6.9 Common Security Problems

    63. Video 6.9.1 Common Security Problems
    64. Check for Understanding 6.9.2 Common Security Problems
    65. Connection 6.9.3 Meet Security Engineers at Google
    66. Free Response 6.9.4 Security Engineering Reflection
    67. Video 6.9.5 Living in a Digital World
    68. Free Response 6.9.6 Living in a Digital World
    69. 6.10 SQL Injection Overview

    70. Video 6.10.1 SQL Injection Overview
    71. Check for Understanding 6.10.2 SQL Injection Overview
    72. Connection 6.10.3 Equifax Security Breach
    73. Connection 6.10.4 Equifax Exposed Millions
    74. Free Response 6.10.5 Equifax SQL Injection Attack
    75. Example 6.10.6 SQLi
    76. 6.11 Types of SQLi and Prevention

    77. Video 6.11.1 Types of SQLi
    78. Check for Understanding 6.11.2 Types of SQLi
    79. Video 6.11.3 Preventing SQLi
    80. Check for Understanding 6.11.4 Preventing SQLi
    81. Connection 6.11.5 Mitigating SQL Injection
    82. Free Response 6.11.6 Reflection: Mitigating SQL Injection
    83. Connection 6.11.7 SQL Injection
    84. 6.12 Cross-site Scripting

    85. Video 6.12.1 Cross-site Scripting
    86. Check for Understanding 6.12.2 Cross-site Scripting
    87. Connection 6.12.3 XSS Bug in Yahoo Mail
    88. Free Response 6.12.4 XSS Bug in Yahoo Mail
    89. Notes 6.12.5 XSS Demo Overview
    90. Connection 6.12.6 Google Application Security: XSS
    91. Connection 6.12.7 Google's Tutorial for XSS
    92. Free Response 6.12.8 XSS Reflection
    93. 6.13 Software Security Quiz

    94. Quiz 6.13.1 Software Security Quiz
    95. Badge 6.13.2 Software Security Badge
  7. Networking Fundamentals

    1. 7.1 Introduction to the Internet

    2. Video 7.1.1 Welcome to the Internet
    3. Check for Understanding 7.1.2 Intro to the Internet
    4. Connection 7.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 7.1.4 Connectivity Lab Reflection
    6. 7.2 Internet Hardware and Sending Information

    7. Video 7.2.1 Internet Hardware
    8. Check for Understanding 7.2.2 Internet Hardware
    9. Video 7.2.3 Sending Information
    10. Check for Understanding 7.2.4 Sending Information
    11. Connection 7.2.5 The Internet is in the Ocean
    12. Free Response 7.2.6 Internet in the Ocean Reflection
    13. 7.3 Internet Addresses

    14. Video 7.3.1 Internet Addresses
    15. Check for Understanding 7.3.2 Internet Addresses
    16. Free Response 7.3.3 The Need for Addresses
    17. Connection 7.3.4 IPv4 vs. IPv6
    18. Connection 7.3.5 The Long Transition to IPv6
    19. Free Response 7.3.6 Reflection: IPv4 vs IPv6
    20. 7.4 Domain Name System (DNS)

    21. Video 7.4.1 Domain Name System (DNS)
    22. Check for Understanding 7.4.2 Domain Name System
    23. Connection 7.4.3 How Does DNS Work?
    24. Free Response 7.4.4 How Does DNS Work?
    25. 7.5 Routing

    26. Video 7.5.1 Routing
    27. Check for Understanding 7.5.2 Routing
    28. Traceroute 7.5.3 Route Tracing
    29. Free Response 7.5.4 Redundancy
    30. 7.6 Packets & Protocols

    31. Video 7.6.1 Packets
    32. Check for Understanding 7.6.2 Packets
    33. Video 7.6.3 Protocols
    34. Check for Understanding 7.6.4 Protocols
    35. Resource 7.6.5 Passing Notes
    36. Connection 7.6.6 How the Internet Works
    37. Free Response 7.6.7 The Journey of an Image
    38. 7.7 Viewing a Webpage

    39. Video 7.7.1 Viewing a Webpage
    40. Check for Understanding 7.7.2 Viewing a Webpage
    41. Free Response 7.7.3 Explaining a URL
    42. Connection 7.7.4 Net Neutrality Explained
    43. Connection 7.7.5 FCCs Net Neutrality Rules Officially Repealed
    44. Free Response 7.7.6 Take a Side on Net Neutrality
    45. Connection 7.7.7 Net Neutrality and Cybersecurity
    46. Free Response 7.7.8 Net Neutrality and Cybersecurity Research
    47. 7.8 Impact of the Internet

    48. Video 7.8.1 Impact of the Internet
    49. Check for Understanding 7.8.2 Impact of the Internet
    50. Connection 7.8.3 What is the Digital Divide?
    51. Free Response 7.8.4 What is the Digital Divide?
    52. 7.9 Network Attacks

    53. Video 7.9.1 Network Attacks Overview
    54. Free Response 7.9.2 Network Attacks
    55. Video 7.9.3 Common Network Attacks
    56. Check for Understanding 7.9.4 Network Attacks
    57. Connection 7.9.5 Social Engineering Hack
    58. Free Response 7.9.6 Social Engineering Reflection
    59. Connection 7.9.7 DDoS Attacks
    60. Free Response 7.9.8 DDoS Reflection
    61. Example 7.9.9 DDoS Simulation
    62. Video 7.9.10 SUPPLEMENTARY: Other Network Attacks
    63. 7.10 Securing a Network

    64. Video 7.10.1 Access Control
    65. Check for Understanding 7.10.2 Access Control
    66. Connection 7.10.3 RADIUS Overview with AAA Protocol
    67. Connection 7.10.4 RADIUS Server Access Control
    68. Free Response 7.10.5 RADIUS Reflection
    69. Video 7.10.6 Detecting Intrusions to Secure a Network
    70. Quiz 7.10.7 Securing a Network
    71. Connection 7.10.8 How to Secure your IT Network
    72. Free Response 7.10.9 Secure your IT Network Basics
    73. Connection 7.10.10 Network Administrator Career
    74. Free Response 7.10.11 Network Administrator Career
    75. Example 7.10.12 Multifactor Authentication
    76. Example 7.10.13 Two Factor Authentication
    77. Example 7.10.14 Authorization
    78. Example 7.10.15 Setting up a Firewall
    79. 7.11 Networking Fundamentals Quiz

    80. Quiz 7.11.1 Networking Fundamentals Quiz
    81. Badge 7.11.2 Networking Fundamentals Badge
  8. Project: Secure the Company's Network

    1. 8.1 Project: Secure the Company's Network

    2. Connection 8.1.1 Secure the Company's Network
    3. Free Response 8.1.2 Establish Firewall Rules
    4. Resource 8.1.3 Establish Firewall Rules Handout
    5. Free Response 8.1.4 Reading Logs
    6. Resource 8.1.5 Reading Logs Handout
    7. Example 8.1.6 SSH Logs
    8. Free Response 8.1.7 Project Reflection
  9. Final Course Project

    1. 9.1 Final Course Project

    2. Notes 9.1.1 Choose Your Own Adventure
    3. Free Response 9.1.2 Choose Your Adventure
    4. Free Response 9.1.3 Research
    5. Free Response 9.1.4 Choose Your Target Audience
    6. Free Response 9.1.5 Draft Your Presentation
    7. Free Response 9.1.6 Draft Your Flyer
    8. Free Response 9.1.7 Make Your Presentation with Handout!
  10. Final Exam

    1. 10.1 Final Exam

    2. Quiz 10.1.1 Final Exam
  11. Project: Security Assessment Report

    1. 11.1 Project: Security Assessment Report

    2. Free Response 11.1.1 Security Assessment Report
    3. Connection 11.1.2 Supercar Showdown Website
    4. Free Response 11.1.3 SQL Injection Testing
    5. Resource 11.1.4 SQLi Testing Handout
    6. Free Response 11.1.5 Cross-site Scripting Testing
    7. Resource 11.1.6 Cross-site Scripting Handout
    8. Free Response 11.1.7 Project Reflection
  12. Cryptocurrency

    1. 12.1 What is Currency?

    2. Video 12.1.1 What is Currency?
    3. Check for Understanding 12.1.2 What is Currency?
    4. Connection 12.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 12.1.4 What Gives Money Its Value
    6. Resource 12.1.5 Money: What is it Good For?
    7. 12.2 What is Cryptocurrency?

    8. Video 12.2.1 Cryptocurrency Basics
    9. Check for Understanding 12.2.2 Cryptocurrency Basics
    10. Video 12.2.3 Cryptocurrency Module Overview
    11. Connection 12.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 12.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 12.2.6 Show Me the Money
    14. Free Response 12.2.7 American Currency Exhibit
    15. 12.3 Intro to Blockchain

    16. Video 12.3.1 Intro to Blockchain
    17. Check for Understanding 12.3.2 Intro to Blockchain
    18. Connection 12.3.3 CryptoKitties
    19. Free Response 12.3.4 CryptoKitties
    20. 12.4 Hashing

    21. Video 12.4.1 Hashing
    22. Check for Understanding 12.4.2 Hashing
    23. Connection 12.4.3 SHA256 Hash Generator
    24. Free Response 12.4.4 Using the SHA256 Hash Generator
    25. 12.5 Proof of Work

    26. Video 12.5.1 Proof of Work
    27. Check for Understanding 12.5.2 Proof of Work
    28. Video 12.5.3 Mining the Block
    29. Check for Understanding 12.5.4 Mining the Block
    30. Connection 12.5.5 PoW vs. Proof of Stake
    31. Free Response 12.5.6 PoW vs. PoS
    32. Resource 12.5.7 Checking Proof of Work
    33. 12.6 Advanced Blockchain

    34. Video 12.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 12.6.2 Advanced Blockchain (part 1)
    36. Connection 12.6.3 Blockchain Buzz
    37. Free Response 12.6.4 Blockchain Buzz
    38. Video 12.6.5 Advanced Blockchain (part 2)
    39. Free Response 12.6.6 Advanced Blockchain (part 2)
    40. Resource 12.6.7 Make a Blockchain
    41. Connection 12.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 12.7 Cryptocurrencies

    43. Video 12.7.1 Cryptocurrencies
    44. Check for Understanding 12.7.2 Cryptocurrencies
    45. Free Response 12.7.3 Shiny Toy Phenomenon
    46. Connection 12.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 12.7.5 Walmart Use of Blockchain
    48. 12.8 Bitcoin

    49. Video 12.8.1 Bitcoin
    50. Check for Understanding 12.8.2 Bitcoin
    51. Connection 12.8.3 51% Attack Explained
    52. Free Response 12.8.4 51% Attack
    53. Connection 12.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 12.8.6 Bitcoin Bust
    55. Resource 12.8.7 Explore the Bitcoin Blockchain
    56. 12.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 12.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 12.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 12.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 12.9.4 Cryptocurrency Pros and Cons
    61. Free Response 12.9.5 Crypto Pros and Cons
    62. Connection 12.9.6 What is HODL?
    63. Free Response 12.9.7 What is HODL?
    64. Free Response 12.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 12.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 12.10.1 Overview
    67. Free Response 12.10.2 Preview Sample Expert Panels
    68. Free Response 12.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 12.10.4 Write an Outline and Rehearse
    70. Free Response 12.10.5 Expert Panel Talk (Presentation)
    71. 12.11 Cryptocurrency Quiz

    72. Unit Quiz 12.11.1 Cryptocurrency Quiz
    73. Badge 12.11.2 Cryptocurrency Badge
  13. Simulations

    1. 13.1 Simulations

    2. Example 13.1.1 Ransomware Simulator
    3. Example 13.1.2 Intruder Alert!
    4. Example 13.1.3 Phishing Simulator
    5. Example 13.1.4 QR Code Generator
    6. Example 13.1.5 You Can Be Tracked!
    7. Example 13.1.6 Social Media Clean-up
    8. Example 13.1.7 Guess: Password List
    9. Example 13.1.8 Guess: Using an Algorithm
    10. Example 13.1.9 Guess: Brute Force
    11. Example 13.1.10 Encrypt/Decrypt
    12. Example 13.1.11 Cryptogram Game!
    13. Example 13.1.12 Caesar Cipher Encryption
    14. Example 13.1.13 Decrypt Caesar's Cipher!
    15. Example 13.1.14 Cracking Caesar with Brute Force
    16. Example 13.1.15 Letter Frequency and Vigenere Cipher
    17. Example 13.1.16 Improving Vigenere
    18. Example 13.1.17 Modulo Math Calculator
    19. Example 13.1.18 Understanding Modulo Math
    20. Example 13.1.19 Modulo Game!
    21. Example 13.1.20 Recreate a Webpage?
    22. Exercise 13.1.21 Console Secrets
    23. Example 13.1.22 Local Storage
    24. Free Response 13.1.23 Schema Brainstorm
    25. Example 13.1.24 SQL Tables
    26. Example 13.1.25 SQLi
    27. Connection 13.1.26 SQL Injection
    28. Example 13.1.27 DDoS Simulation
    29. Example 13.1.28 Multifactor Authentication
    30. Example 13.1.29 Two Factor Authentication
    31. Example 13.1.30 Authorization
    32. Example 13.1.31 Setting up a Firewall
  14. SQL Part II: The SQL

    1. 14.1 More Filtering Practice

    2. Exercise 14.1.1 Initials
    3. Exercise 14.1.2 Compound Queries with BETWEEN
    4. Exercise 14.1.3 Gryffindors With G Names
    5. Exercise 14.1.4 R First Names
    6. Exercise 14.1.5 FF Houses
    7. 14.2 Ordering Results

    8. Video 14.2.1 The ORDER BY Keyword
    9. Notes 14.2.2 ORDER BY
    10. Example 14.2.3 ORDER BY First Name
    11. Example 14.2.4 Reverse Order
    12. Example 14.2.5 Order By Multiple Fields
    13. Exercise 14.2.6 House Ordering
    14. Exercise 14.2.7 Sort the P Names
    15. 14.3 Renaming Fields

    16. Notes 14.3.1 Renaming Fields with AS
    17. Example 14.3.2 Renaming in the House Table
    18. Exercise 14.3.3 Changing Column Names
    19. 14.4 Joining Tables

    20. Video 14.4.1 The JOIN command
    21. Notes 14.4.2 Basic Joining
    22. Example 14.4.3 Letters and Numbers
    23. Example 14.4.4 Person and House
    24. Example 14.4.5 Person and House (Correct)
    25. Example 14.4.6 Person and House (with namespacing)
    26. Exercise 14.4.7 List All Gryffindors
    27. Video 14.4.8 JOIN With Yourself
    28. Notes 14.4.9 Renaming Tables
    29. Example 14.4.10 Quidditch Matchups
    30. Exercise 14.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 14.5 More Joining Tables

    32. Example 14.5.1 The Course Table
    33. Exercise 14.5.2 Courses and Professors
    34. Exercise 14.5.3 Courses, Professors, and Houses
    35. Exercise 14.5.4 Courses Taught By Gryffindors
    36. Example 14.5.5 The Enrollment Table
    37. Exercise 14.5.6 Students Taking Potions
    38. Exercise 14.5.7 Non-Slytherins Taking Potions
    39. Exercise 14.5.8 Defense Students by House
    40. Exercise 14.5.9 Neville's Courses
  15. Web Development

    1. 15.1 Introduction to HTML

    2. Video 15.1.1 Introduction to HTML
    3. Check for Understanding 15.1.2 Introduction to HTML Quiz
    4. Example 15.1.3 Our First HTML Page
    5. Exercise 15.1.4 Say Hello!
    6. 15.2 Structure of an HTML Page

    7. Video 15.2.1 Structure of an HTML Page
    8. Check for Understanding 15.2.2 Structure of an HTML Page Quiz
    9. Example 15.2.3 HTML Template
    10. Example 15.2.4 Hello World Page
    11. Exercise 15.2.5 The <title> Tag
    12. Exercise 15.2.6 Your First HTML Page
    13. Badge 15.2.7 Structure Badge
    14. 15.3 Formatting Text

    15. Video 15.3.1 Formatting Text
    16. Check for Understanding 15.3.2 Formatting Text Quiz
    17. Example 15.3.3 Dictionary
    18. Exercise 15.3.4 That's Bold
    19. Exercise 15.3.5 Artificial Intelligence
    20. Exercise 15.3.6 State Capitals
    21. 15.4 Links

    22. Video 15.4.1 Links
    23. Check for Understanding 15.4.2 Links Quiz
    24. Example 15.4.3 The <a> Tag
    25. Exercise 15.4.4 Simple Link
    26. Exercise 15.4.5 My Favorite Websites
    27. 15.5 Images

    28. Video 15.5.1 Images
    29. Check for Understanding 15.5.2 Images Quiz
    30. Example 15.5.3 The <img> Tag
    31. Example 15.5.4 Building the CodeHS Homepage
    32. Exercise 15.5.5 Collage on a Theme
    33. Exercise 15.5.6 Linking an Image
    34. Exercise 15.5.7 Personal Library
    35. Badge 15.5.8 Images Badge
    36. 15.6 HTML Lists

    37. Video 15.6.1 HTML Lists
    38. Check for Understanding 15.6.2 HTML Lists Quiz
    39. Example 15.6.3 Grocery Shopping
    40. Exercise 15.6.4 Favorite Things
    41. Exercise 15.6.5 To-Do List
    42. Exercise 15.6.6 List Article
    43. 15.7 HTML Tables

    44. Video 15.7.1 HTML Tables
    45. Check for Understanding 15.7.2 HTML Tables Quiz
    46. Example 15.7.3 Address Book
    47. Exercise 15.7.4 Favorite Songs
    48. Exercise 15.7.5 Calendar
    49. 15.8 HTML Styling

    50. Video 15.8.1 HTML Styling
    51. Check for Understanding 15.8.2 HTML Styling Quiz
    52. Example 15.8.3 Stylish Address Book
    53. Exercise 15.8.4 Background Colors
    54. Exercise 15.8.5 Style Your To-Do List
    55. 15.9 Introduction to CSS

    56. Video 15.9.1 Introduction to CSS
    57. Check for Understanding 15.9.2 Introduction to CSS Quiz
    58. Example 15.9.3 Styling Your H1s
    59. Exercise 15.9.4 First Style with CSS
    60. Exercise 15.9.5 List Styling
    61. 15.10 CSS Select by Tag

    62. Video 15.10.1 CSS Select by Tag
    63. Check for Understanding 15.10.2 CSS Select by Tag Quiz
    64. Example 15.10.3 Rainbow
    65. Example 15.10.4 Dog Styling
    66. Exercise 15.10.5 Restaurant Menu
    67. Exercise 15.10.6 Put Karel Together
    68. 15.11 CSS Select by Class

    69. Video 15.11.1 CSS Select by Class
    70. Check for Understanding 15.11.2 CSS Select by Class Quiz
    71. Example 15.11.3 Simple Checkerboard
    72. Exercise 15.11.4 Tic Tac Toe
    73. Exercise 15.11.5 Music Library
    74. 15.12 CSS Select by ID

    75. Video 15.12.1 CSS Select by ID
    76. Check for Understanding 15.12.2 CSS Select by ID Quiz
    77. Example 15.12.3 Logo
    78. Exercise 15.12.4 Favorite Dog
    79. Exercise 15.12.5 Bingo
    80. Badge 15.12.6 CSS Badge
    81. 15.13 Viewing Websites

    82. Video 15.13.1 Viewing Websites
    83. Check for Understanding 15.13.2 Viewing Websites Quiz
    84. Free Response 15.13.3 Explaining a URL
    85. 15.14 Web Development Quiz

    86. Unit Quiz 15.14.1 Web Development Quiz
    87. 15.15 Your First Website

    88. Challenge 15.15.1 Set Up Your codehs.me Website
    89. Challenge 15.15.2 Practice PT: Your First Website
    90. Badge 15.15.3 Website Badge
  16. Midterm

    1. 16.1 Midterm

    2. Quiz 16.1.1 Midterm