Please enable JavaScript to use CodeHS

Points

Activity Points
Computer Safety
1.1 Module Overview - Cybersecurity
1.1.1 Welcome to Cybersecurity 1
1.1.2 Welcome to Cybersecurity 5
1.1.3 Intruder Alert! 1
1.1.4 Cybersecurity and You 5
1.1.5 Course Goals 5
1.2 What is Cybersecurity?
1.2.1 What is Cybersecurity? 1
1.2.2 What is Cybersecurity? 5
1.2.3 WannaCry Ransomware Attack 1
1.2.4 WannaCry Reflection 5
1.2.5 Ransomware Simulator 1
1.2.6 Internet of Things 1
1.2.7 Cybersecurity and Connected Cars 1
1.2.8 Internet of Things Reflection 5
1.3 Impact of Cybersecurity
1.3.1 Impact of Cybersecurity 1
1.3.2 Impact of Cybersecurity 5
1.3.3 Phishing Simulator 1
1.3.4 Yahoo! Attack 1
1.3.5 Yahoo! Reflection 5
1.3.6 Fighting Cyber Crime 1
1.3.7 Cyber Crime Reflection 5
1.3.8 FBI Cyber Crime 1
1.3.9 FBI Reflection 5
1.4 Environmental Controls
1.4.1 Environmental Controls 1
1.4.2 Environmental Controls Quiz 5
1.4.3 Infographic 1
1.4.4 Infographic FR 5
1.4.5 Electrostatic Discharge 1
1.4.6 Your Security Systems 5
1.4.7 Security Design 10
1.5 Personal Safety
1.5.1 Safety Precautions 5
1.5.2 Electrical Hazards 5
1.5.3 Fire Suppression 1
1.5.4 Fire Suppression Response 5
1.5.5 Emergency Response Plan 5
Project: Put it in Writing!
2.1 Privacy & Security
2.1.1 What is Data Privacy & Security? 1
2.1.2 Privacy & Security Quiz 5
2.1.3 Google Privacy Policy Search 1
2.1.4 Google Privacy Policy Search 5
2.1.5 Guess: Password List 1
2.1.6 Guess: Using an Algorithm 1
2.1.7 Guess: Brute Force 1
2.1.8 How Strong is your Password? 1
2.1.9 How Strong is your password? 5
2.1.10 You Can Be Tracked! 1
2.2 Creative Credit & Copyright
2.2.1 Creative Credit and Copyright 1
2.2.2 Creative Credit and Copyright 5
2.2.3 Cite! 5
2.2.4 Exploring Creative Commons 1
2.2.5 Respond: Creative Commons 5
2.2.6 Task: Finding Images 5
2.2.7 Reflection: Why is Copyright Important? 5
2.2.8 Prohibited Content 5
2.3 Level 1: Entry Event
2.3.1 Company Development 5
2.3.2 Level 1: Attack! 5
2.3.3 Level 1: Project Overview 1
2.3.4 Put It In Writing! Rubric 5
2.4 Level 2: User Training
2.4.1 User Training Policy Development 5
2.4.2 Challenge: Employee Negligence 1 5
2.4.3 Challenge: Employee Negligence 2 5
2.4.4 Level 2 Debrief 5
2.5 Level 3: Incident Response
2.5.1 Incident Response Plan Template 5
2.5.2 Incident Response Plan Link 5
2.5.3 Challenge: Cyber Attack! 5
2.5.4 Level 3 Debrief 5
2.6 Level 4: Data and Licenses
2.6.1 Data and Licenses 5
2.6.2 FTC Data Security Guide 5
2.6.3 Data Policy Template 5
2.6.4 Data Policy Link 5
2.6.5 Challenge: Data Breach 1 5
2.6.6 Challenge: Data Breach 2 5
2.6.7 Challenge: Data Breach 3 5
2.6.8 Level 4 Debrief 5
2.7 Level 5: Change Management
2.7.1 Change Management 5
2.7.2 Change Management Plan 5
2.7.3 Change Management Plan Link 5
Operating Systems
3.1 Operating Systems
3.1.1 Operating Systems 1
3.1.2 Operating Systems Quiz 5
3.1.3 Detect My OS 1
3.1.4 Upgrading a Mac OS 1
3.1.5 Windows OS Installation Simulation 1
3.1.6 Installing an OS 5
3.2 Comparing Operating Systems
3.2.1 Comparing Operating Systems 1
3.2.2 Comparing Operating Systems Quiz 5
3.2.3 Windows Simulation 1
3.2.4 MacOS Simulation 1
3.2.5 Choose a Linux Distro! 1
3.2.6 Which would you choose? 5
3.3 Compatibility
3.3.1 Compatibility 1
3.3.2 Compatibility Quiz 5
3.3.3 What Processor? Windows 1
3.3.4 What Processor? Mac 1
3.3.5 What Processor are you running? 5
3.3.6 Lab: Configuring a Computer 1
3.4 Software and Applications
3.4.1 Software and Applications 1
3.4.2 Software and Applications Quiz 5
3.4.3 Spreadsheet Simulation 1
3.4.4 Messaging Simulation 1
3.4.5 Kanban Board Simulation 1
3.4.6 Software Simulations 5
3.5 Software Licenses
3.5.1 Software Licenses 1
3.5.2 Software Licenses Quiz 5
3.5.3 Do I need a Software License? 5
3.5.4 Is This Original? 5
3.6 Application Security
3.6.1 Application Security 1
3.6.2 Application Security 5
3.6.3 Windows Updates 1
3.6.4 Windows Defender Antivirus 1
3.6.5 Windows Defender Antivirus 5
3.6.6 CodeHS System Restore 5
3.7 Browser Configuration
3.7.1 Browser Configuration 1
3.7.2 Browser Configuration 5
3.7.3 Cached CodeHS 1
3.7.4 Cached CodeHS 5
3.7.5 Is Your Popup Blocker On? 1
3.7.6 Browser Extensions Lab 5
3.8 System Administration
3.8.1 User Accounts 1
3.8.2 User Accounts Quiz 2
3.8.3 User Accounts 5
3.8.4 Shared Folders and Files 5
3.8.5 Host Security 1
3.8.6 Host Security Quiz 3
3.8.7 Security Baseline 5
3.8.8 User Access Control 1
3.9 Command Line Interface
3.9.1 Linux/MacOS vs. Windows 1
3.9.2 Command Line Interface 1
3.9.3 Command Line Interface Quiz 5
3.9.4 Command Equivalents 1
3.9.5 Windows Command Prompt 1
3.9.6 Windows Command Prompt 5
3.9.7 Directory Directions 5
3.9.8 Neural Interface? 1
3.9.9 Neural Interface? 5
Hardware
4.1 Internal Components
4.1.1 Internal Components 1
4.1.2 Internal Components 5
4.1.3 Build a Computer 1
4.1.4 Build a Computer 5
4.1.5 Test Your Brain's RAM! 1
4.1.6 Test Your Brain's RAM! 5
4.1.7 The Machine Instruction Cycle 5
4.2 Lab: Computer Disassembly
4.2.1 Lab: Computer Disassembly 5
4.2.2 Video: Disassemble a Computer 1
4.2.3 Article: Disassemble a Computer 5
4.3 Peripheral Devices
4.3.1 Peripheral Devices 1
4.3.2 Peripheral Devices 5
4.3.3 Personalized Peripherals 5
4.3.4 IT Help 5
4.3.5 Your Ideal Computer Setup 5
4.4 Network Devices
4.4.1 Network Devices 1
4.4.2 Network Devices 5
4.4.3 Speed Test 1
4.4.4 Speed Test 5
4.4.5 Fiber Optics Bend Light! 1
4.4.6 Fiber Optics Bend Light! 5
4.4.7 Ethernet Standards 1
4.4.8 Ethernet Standards 5
4.4.9 Copper vs. Fiber Optic 1
4.4.10 Copper vs. Fiber Optic 5
4.4.11 Network Troubleshooting 5
4.4.12 Troubleshooting Cable Issues 1
4.4.13 Troubleshooting Cable Issues 5
4.5 Lab: Design a Distribution Frame
4.5.1 Lab: Design a Distribution Frame 5
4.6 Storage Options
4.6.1 Storage Options 1
4.6.2 Storage Options Quiz 5
4.6.3 Security of Cloud Storage 1
4.6.4 Security of Cloud Storage 5
4.6.5 Storage Suggestions 5
4.7 Network Options
4.7.1 Network Options 1
4.7.2 Network Options Quiz 5
4.7.3 What is an SSID? 1
4.7.4 What is an SSID? 5
4.7.5 Wireless Threats 1
4.7.6 Wireless Threats 5
4.7.7 Wireless Network Setup 5
4.8 Advanced Devices
4.8.1 Advanced Devices 1
4.8.2 Advanced Devices Quiz 5
4.8.3 Network Administrator Career 1
4.8.4 Network Administrator Career 5
4.8.5 Choosing the Best Devices 5
4.8.6 Network Diagram 5
4.9 Lab: SOHO Devices
4.9.1 SOHO Devices 1
4.9.2 Lab: Printer Settings 1
4.9.3 Sharing Devices 5
4.10 Network Communication
4.10.1 Network Communication 1
4.10.2 Network Communication Quiz 5
4.10.3 Setting up a Firewall 1
4.10.4 iptables 5
4.10.5 iptables simulation 1
4.11 Lab: Windows Networking
4.11.1 Lab: Windows Networking 1
4.11.2 Lab: Windows Networking w/Simulation 1
4.11.3 Windows Networking 1
4.12 Network Management
4.12.1 Linux/MacOS vs. Windows 1
4.12.2 Network Management 1
4.12.3 Network Management Quiz 5
4.12.4 MacOS Terminal Simulation 1
4.12.5 Windows Command Prompt Simulation 1
4.12.6 Windows Command Prompt Spy 5
4.12.7 Windows Command Prompt Spy 5
4.12.8 SSH Logs 1
4.12.9 SSH Logs 1
4.12.10 Reading Logs 5
4.13 Laptops and Tablets
4.13.1 Form Factor 5
4.13.2 Laptop vs. Tablet 1
4.13.3 Laptop vs. Tablet 5
4.13.4 Which is best? 1
4.13.5 Product Chart 5
4.13.6 Device Comparison 5
4.14 Mobile Devices
4.14.1 Mobile Devices 1
4.14.2 Mobile Devices Quiz 5
4.14.3 How Apple FaceID Works 1
4.14.4 How Apple FaceID Works Response 5
4.14.5 Biometric Data Debate 5
4.14.6 BYOD and MDM Concept Map 1
4.14.7 BYOD and MDM Conclusions 5
4.15 Lab: Mobile Device Connectivity
4.15.1 Mobile Device Features 1
4.15.2 Mobile Device Simulator 1
4.15.3 Lab: Mobile Device Connectivity 5
4.16 IT Infrastructure Quiz
4.16.1 IT Infrastructure Quiz 20
Project: Troubleshooting
5.1 Methodology
5.1.1 Troubleshooting Methodology 1
5.1.2 Identify the Problem 5
5.1.3 Research Solutions 5
5.1.4 Establish a Theory 5
5.1.5 Test the Theory 5
5.1.6 Fix the Problem! 5
5.1.7 Diagnostic Tools 5
5.2 Support Practice
5.2.1 Signal Strength 10
5.2.2 Interference 10
Project: IT Professional
6.1 Communication is Key!
6.1.1 Do you have what it takes? 5
6.1.2 Cybersecurity Careers 5
6.1.3 Customer Service Skills 1
6.1.4 Customer Service Skills 5
6.1.5 Act it Out! 15
6.2 Building a Knowledge Base
6.2.1 What is a Knowledge Base? 1
6.2.2 Draft a KB Article 5
6.2.3 Share your KB Article 5
6.2.4 Finalize your KB Article 15
6.3 Star in a Video!
6.3.1 Instructional Videos 1
6.3.2 Instructional Video Plan 5
6.3.3 Write the Script 5
6.3.4 Create the Storyboard 5
6.3.5 Record Your Video 5
6.4 Create a Service Agreement
6.4.1 Terms of Agreement 1
6.4.2 Agreement Checklist 1
6.4.3 Shake Hands 5
Networking
7.1 Introduction to the Internet
7.1.1 Welcome to the Internet 1
7.1.2 Intro to the Internet 5
7.1.3 Inside Facebook's Connectivity Lab 1
7.1.4 Connectivity Lab Reflection 5
7.2 Notational Systems
7.2.1 Number Systems 1
7.2.2 Number Systems Quiz 2
7.2.3 Number Base Tool 1
7.2.4 Decimal to Binary 1
7.2.5 Decimal to Binary Quiz 3
7.2.6 Binary Game 5
7.2.7 Analog to Digital 1
7.2.8 Respond: Analog to Digital 5
7.3 Data Representation
7.3.1 Hexadecimal 1
7.3.2 Hexadecimal Quiz 2
7.3.3 Binary to Hex Game 5
7.3.4 Encoding Text with Binary 1
7.3.5 Encoding Text with Binary Quiz 2
7.3.6 Custom Encoding 1
7.3.7 Bits to ASCII 1
7.3.8 Hello World in Bits 5
7.4 Internet Hardware and Sending Information
7.4.1 Internet Hardware 1
7.4.2 Internet Hardware 2
7.4.3 Sending Information 1
7.4.4 Sending Information 3
7.4.5 The Internet is in the Ocean 1
7.4.6 Internet in the Ocean Reflection 5
7.5 Internet Addresses
7.5.1 Internet Addresses 1
7.5.2 Internet Addresses 5
7.5.3 The Need for Addresses 5
7.5.4 IPv4 vs. IPv6 1
7.5.5 Reflection: IPv4 vs IPv6 5
7.6 Domain Name System (DNS)
7.6.1 Domain Name System (DNS) 1
7.6.2 Domain Name System 5
7.6.3 How Does DNS Work? 1
7.6.4 How Does DNS Work? 5
7.7 Routing
7.7.1 Routing 1
7.7.2 Routing 5
7.7.3 Redundancy 5
7.8 Packets & Protocols
7.8.1 Packets 1
7.8.2 Packets 2
7.8.3 Protocols 1
7.8.4 Protocols 3
7.8.5 How the Internet Works 1
7.8.6 The Journey of an Image 5
7.9 Protocols and Standards
7.9.1 Protocols 1
7.9.2 Protocols Quiz 3
7.9.3 Standards 1
7.9.4 Standards Quiz 2
7.9.5 The New Wireless Standard 1
7.9.6 801.11ax 1
7.9.7 Wavelength 1
7.9.8 801.11ax FR 5
7.10 Viewing a Webpage
7.10.1 Viewing a Webpage 1
7.10.2 Viewing a Webpage 5
7.10.3 Explaining a URL 5
7.10.4 Net Neutrality Explained 1
7.10.5 FCCs Net Neutrality Rules Officially Repealed 1
7.10.6 Take a Side on Net Neutrality 5
7.10.7 Net Neutrality and Cybersecurity 1
7.10.8 Net Neutrality and Cybersecurity Research 5
7.11 Impact of the Internet
7.11.1 Impact of the Internet 1
7.11.2 Impact of the Internet 5
7.11.3 What is the Digital Divide? 1
7.11.4 What is the Digital Divide? 5
7.12 Advanced Networking
7.12.1 The OSI Model and Network Attacks 1
7.12.2 The OSI Model and Network Attacks Response 5
7.12.3 Encapsulation 1
7.12.4 What is Virtualization? 1
7.12.5 Virtualization Response 5
7.12.6 Baseband vs. Broadband 5
7.12.7 Bit Rate vs. Baud Rate 5
7.12.8 CSMA/CD vs. CSMA/CA 1
7.13 Networking Fundamentals Quiz
7.13.1 Mindsets 1
7.13.2 Networking Fundamentals Quiz 15
Final Exam
8.1 Final Exam
8.1.1 Final Exam 20
What's Next?
9.1 After Fundamentals of Cybersecurity
9.1.1 Cybersecurity Pathways 1
9.1.2 CodeHS Advanced Cybersecurity 1
9.1.3 College Pathway 1
9.1.4 Certification Pathway 1
9.1.5 Career Spotlight 1
9.1.6 My Pathway 5
Midterm
10.1 Midterm
10.1.1 Midterm 20