Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
What is Cybersecurity?
1.1 Welcome to Cybersecurity Fundamentals Lesson
1.1.1 Course Introduction 1 Notes
1.1.2 Course Goals 5 Free Response
1.2 Module Overview - Cybersecurity Lesson
1.2.1 Welcome to Cybersecurity 1 Video
1.2.2 Welcome to Cybersecurity 2 Check for Understanding
1.2.3 Intruder Alert! 1 Example
1.2.4 Cybersecurity and You 5 Free Response
1.2.5 Course Goals 5 Free Response
1.3 What is Cybersecurity? Lesson
1.3.1 What is Cybersecurity? 1 Video
1.3.2 What is Cybersecurity? 3 Check for Understanding
1.3.3 City Services Ransomware 1 Connection
1.3.4 Ransomware Reflection 5 Free Response
1.3.5 Ransomware Simulator 1 Example
1.3.6 Internet of Things 1 Connection
1.3.7 Hackers vs. Smart Homes 1 Connection
1.3.8 Internet of Things Reflection 5 Free Response
1.4 Impact of Cybersecurity Lesson
1.4.1 Impact of Cybersecurity 1 Video
1.4.2 Impact of Cybersecurity 2 Check for Understanding
1.4.3 Phishing Simulator 1 Example
1.4.4 Phishing for Your Info 1 Connection
1.4.5 Phishing Reflection 5 Free Response
1.4.6 Cyberterrorism 1 Connection
1.4.7 Cyberterrorism Response 5 Free Response
1.4.8 Cyber Game 1 Connection
1.4.9 Cyber Game Reflection 5 Free Response
1.5 The CIA Triad Lesson
1.5.1 CIA Triad 1 Video
1.5.2 CIA Triad 2 Check for Understanding
1.5.3 Which part of the CIA Triad? 5 Free Response
1.5.4 Which part of the CIA Triad? 5 Free Response
1.5.5 Breach of Confidentiality 5 Free Response
1.5.6 Breach of Availability 5 Free Response
1.5.7 CIA Connections 5 Free Response
1.6 What is Cybersecurity? Quiz Lesson
1.6.1 What is Cybersecurity? Quiz 15 Unit Quiz
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation Lesson
2.1.1 Digital Footprint and Reputation 1 Video
2.1.2 Digital Footprint and Reputation 3 Check for Understanding
2.1.3 Social Media Clean-up 1 Example
2.1.4 Building a Positive Digital Footprint 5 Free Response
2.1.5 Right to be Forgotten? 1 Connection
2.1.6 Right to be Forgotten 5 Free Response
2.1.7 What is your Digital Footprint? 5 Free Response
2.2 Cyberbullying Lesson
2.2.1 Cyberbullying 1 Video
2.2.2 Cyberbullying 3 Check for Understanding
2.2.3 Scenario: Student Ranking 5 Free Response
2.2.4 Scenario: Singled Out 5 Free Response
2.2.5 Stopping Cyberbullying 5 Free Response
2.3 Internet Safety Lesson
2.3.1 Internet Safety 1 Video
2.3.2 Internet Safety 2 Check for Understanding
2.3.3 Scenario: School Stranger 5 Free Response
2.3.4 Scenario: Vacation Pals 5 Free Response
2.3.5 Staying Safe 5 Free Response
2.4 Privacy & Security Lesson
2.4.1 What is Data Privacy & Security? 1 Video
2.4.2 Privacy & Security Quiz 2 Check for Understanding
2.4.3 Google Privacy Policy Search 1 Connection
2.4.4 Google Privacy Policy Search 5 Free Response
2.4.5 Guess: Password List 1 Example
2.4.6 Guess: Using an Algorithm 1 Example
2.4.7 Guess: Brute Force 1 Example
2.4.8 How Strong is your Password? 1 Connection
2.4.9 How Strong is your password? 5 Free Response
2.4.10 You Can Be Tracked! 1 Example
2.5 Information Literacy Lesson
2.5.1 Information Literacy 1 Video
2.5.2 Information Literacy 2 Check for Understanding
2.5.3 Effective Internet Searches 5 Free Response
2.5.4 Evaluate the Source 1 1 Connection
2.5.5 Respond: Evaluate the Source 1 5 Free Response
2.5.6 Evaluate the Source 2 1 Notes
2.5.7 Respond: Evaluate the Source 2 5 Free Response
2.5.8 Hero Pig? 1 Connection
2.5.9 Respond: Hero Pig? 5 Free Response
2.6 Creative Credit & Copyright Lesson
2.6.1 Creative Credit and Copyright 1 Video
2.6.2 Creative Credit and Copyright 2 Check for Understanding
2.6.3 Cite! 5 Free Response
2.6.4 Exploring Creative Commons 1 Connection
2.6.5 Respond: Creative Commons 5 Free Response
2.6.6 Task: Finding Images 5 Free Response
2.6.7 Reflection: Why is Copyright Important? 5 Free Response
2.7 Hacking Ethics Lesson
2.7.1 Hacking Ethics & Legality 1 Video
2.7.2 Hacking Ethics & Legality 3 Check for Understanding
2.7.3 Penetration Testing 1 Connection
2.7.4 Reflection: Penetration Testing 5 Free Response
2.7.5 Hack the Pentagon? 1 Connection
2.7.6 Reflection: Hack the Pentagon 5 Free Response
2.7.7 Ethical Hacker Agreement 1 Check for Understanding
2.8 Digital Citizenship and Cybersecurity Quiz Lesson
2.8.1 Digital Citizenship and Cyber Hygiene Quiz 20 Unit Quiz
Project: Public Service Announcement
3.1 Project: Public Service Announcement Lesson
3.1.1 Pick a Topic 5 Free Response
3.1.2 Research 5 Free Response
3.1.3 Choose Your Audience 5 Free Response
3.1.4 What kind of PSA? 5 Free Response
3.1.5 Draft your PSA 5 Free Response
3.1.6 Finalize your PSA! 15 Free Response
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis Lesson
4.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
4.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
4.1.3 Cryptogram Game! 1 Example
4.1.4 Why encrypt? 1 Video
4.1.5 Why encrypt? 2 Check for Understanding
4.1.6 Encrypt/Decrypt 1 Example
4.2 History of Cryptography Lesson
4.2.1 Cryptography: A Brief History 1 Video
4.2.2 Cryptography History Quiz 2 Check for Understanding
4.2.3 How the Enigma Worked 1 Connection
4.2.4 How the Enigma Worked 5 Free Response
4.2.5 Unknown Languages and the Future of Cryptography 1 Connection
4.2.6 The Future of Cybersecurity 5 Free Response
4.3 Basic Crypto Systems: Caesar Cipher Lesson
4.3.1 Caesar Cipher 1 Video
4.3.2 Caesar Cipher 2 Check for Understanding
4.3.3 Caesar Cipher Encryption 1 Example
4.3.4 Decrypt Caesar's Cipher! 1 Example
4.4 Basic Crypto Systems: Cracking Caesar Lesson
4.4.1 Cracking Caesar Cipher 1 Video
4.4.2 Cracking Caesar Cipher 2 Check for Understanding
4.4.3 Cracking Caesar with Brute Force 1 Example
4.4.4 Letter Frequency and Caesar 1 Example
4.4.5 Examining Caesar Cipher 5 Free Response
4.5 Basic Crypto Systems: Vigenere Cipher Lesson
4.5.1 Vigenere Cipher 1 Video
4.5.2 Vigenere Cipher 1 Check for Understanding
4.5.3 Vigenere Cipher Example 1 Example
4.5.4 Letter Frequency and Vigenere Cipher 1 Example
4.5.5 Examining Vigenere Cipher 5 Free Response
4.5.6 Improving Vigenere 1 Example
4.6 The ABCs of Cryptography Quiz Lesson
4.6.1 The ABCs of Cryptography Quiz 15 Unit Quiz
Advanced Cryptography
5.1 Welcome to Advanced Cybersecurity! Lesson
5.1.1 Course Introduction 1 Notes
5.1.2 Cybersecurity 101 1 Connection
5.1.3 Cyber Heat Map 5 Free Response
5.1.4 Career Pathways 5 Free Response
5.1.5 Starting with Cryptography 1 Connection
5.1.6 Course Goals 5 Free Response
5.2 Encryption Algorithms Lesson
5.2.1 Symmetric Encryption 1 Video
5.2.2 Ciphers Quiz 2 Check for Understanding
5.2.3 Enhanced Caesar Cipher 5 Free Response
5.2.4 Mixed Alphabet Cipher 5 Free Response
5.2.5 Pigpen Encoder 1 Example
5.2.6 Pigpen Cipher 5 Free Response
5.2.7 Rail Fence Cipher 5 Free Response
5.2.8 Encryption Standards 1 Video
5.2.9 Encryption Standards Quiz 3 Check for Understanding
5.3 Advanced Cryptography Lesson
5.3.1 Advanced Cryptography 1 Video
5.3.2 Advanced Cryptography 3 Check for Understanding
5.3.3 Public Key Cryptography for Non-Geeks 1 Connection
5.3.4 Examining Public Key Cryptography 5 Free Response
5.3.5 Public Key Cryptography 1 Connection
5.3.6 Public Key Cryptography 5 Free Response
5.4 Hash Functions Lesson
5.4.1 Hash Functions 1 Video
5.4.2 Hash Functions 3 Check for Understanding
5.4.3 Google Shattered Crypto Algorithm 1 Connection
5.4.4 Hash Functions in the News 5 Free Response
5.4.5 Using a Hash Generator 1 Connection
5.4.6 Hash Generator 5 Free Response
5.4.7 Password Salting 1 Connection
5.4.8 Password Salting 5 Free Response
5.5 Hash Function Development Lesson
5.5.1 Hash Function Development 1 Video
5.5.2 Hash Function Development 2 Check for Understanding
5.5.3 Modulo Math Calculator 1 Example
5.5.4 Understanding Modulo Math 1 Example
5.5.5 Modulo Game! 1 Example
5.5.6 Develop a Simple Hash Function 5 Exercise
5.6 Asymmetric Encryption Lesson
5.6.1 Asymmetric Encryption 1 Video
5.6.2 Asymmetric Encryption Quiz 5 Check for Understanding
5.6.3 Diffie-Hellman Key Exchange 1 Example
5.6.4 Affine Cipher 5 Free Response
5.6.5 Trapdoor Functions 5 Free Response
5.6.6 Public-Key Encryption Explorer 1 Notes
5.6.7 Public-Key Encryption Explorer Reflection 5 Free Response
5.7 Digital Certificates Lesson
5.7.1 Digital Certificates 1 Video
5.7.2 Digital Certificates 4 Check for Understanding
5.7.3 SSL Explained 1 Connection
5.7.4 SSL Explained Response 5 Free Response
5.7.5 Digital Certificate Connection 5 Free Response
5.7.6 In The News 1 Connection
5.7.7 In The News Response 5 Free Response
5.7.8 Become a Certificate Authority! 10 Free Response
5.8 Advanced Cryptography Quiz Lesson
5.8.1 Advanced Cryptography Quiz 20 Unit Quiz
Project: Steganography
6.1 Project: Steganography Lesson
6.1.1 What is Steganography? 1 Video
6.1.2 Government Surveillance and Reality Winner 1 Connection
6.1.3 Government Surveillance and Reality Winner 5 Free Response
6.1.4 Data Hiding and Extraction 1 Connection
6.1.5 Reflect: Data Hiding and Extraction 5 Free Response
6.1.6 Hide Text 1 Example
6.1.7 Hidden Message 1 Example
6.1.8 Your turn: Encryption Algorithm 5 Free Response
6.1.9 Your turn: Image Creation 10 Challenge
6.1.10 Final Algorithm and Partner Decode 5 Free Response
6.1.11 Final Reflection 5 Free Response
System Administration
7.1 Operating Systems Lesson
7.1.1 Operating Systems 1 Video
7.1.2 Operating Systems Quiz 5 Check for Understanding
7.1.3 Detect My OS 1 Example
7.1.4 Windows OS Installation Simulation 1 Example
7.1.5 Installing an OS 5 Free Response
7.1.6 Upgrading a Mac OS 1 Connection
7.2 Comparing Operating Systems Lesson
7.2.1 Comparing Operating Systems 1 Video
7.2.2 Comparing Operating Systems Quiz 5 Check for Understanding
7.2.3 Windows Simulation 1 Example
7.2.4 MacOS Simulation 1 Example
7.2.5 Choose a Linux Distro! 1 Connection
7.2.6 Which would you choose? 5 Free Response
7.3 Compatibility Lesson
7.3.1 Compatibility 1 Video
7.3.2 Compatibility Quiz 3 Check for Understanding
7.3.3 What Processor? Windows 1 Example
7.3.4 What Processor? Mac 1 Example
7.3.5 What Processor are you running? 5 Free Response
7.4 Software and Applications Lesson
7.4.1 Software and Applications 1 Video
7.4.2 Software and Applications Quiz 2 Check for Understanding
7.4.3 Spreadsheet Simulation 1 Example
7.4.4 Messaging Simulation 1 Example
7.4.5 Kanban Board Simulation 1 Example
7.4.6 Software Simulations 5 Free Response
7.5 Software Licenses Lesson
7.5.1 Software Licenses 1 Video
7.5.2 Software Licenses Quiz 3 Check for Understanding
7.5.3 Do I need a Software License? 5 Free Response
7.5.4 Is This Original? 5 Free Response
7.6 Application Security Lesson
7.6.1 Application Security 1 Video
7.6.2 Application Security 5 Check for Understanding
7.6.3 Windows Updates 1 Example
7.6.4 Windows Defender Antivirus 1 Connection
7.6.5 Windows Defender Antivirus 5 Free Response
7.6.6 CodeHS System Restore 5 Free Response
7.7 Browser Configuration Lesson
7.7.1 Browser Configuration 1 Video
7.7.2 Browser Configuration 5 Check for Understanding
7.7.3 Cached CodeHS 1 Connection
7.7.4 Cached CodeHS 5 Free Response
7.7.5 Is Your Popup Blocker On? 1 Example
7.7.6 Browser Extensions Lab 5 Free Response
7.8 System Administration Lesson
7.8.1 User Accounts 1 Video
7.8.2 User Accounts Quiz 2 Check for Understanding
7.8.3 User Accounts 5 Free Response
7.8.4 Shared Folders and Files 5 Free Response
7.8.5 Host Security 1 Video
7.8.6 Host Security Quiz 3 Check for Understanding
7.8.7 Security Baseline 5 Free Response
7.9 Access Control Lesson
7.9.1 Access Control 1 Video
7.9.2 Access Control 4 Check for Understanding
7.9.3 Multifactor Authentication 1 Example
7.9.4 Two Factor Authentication 1 Example
7.9.5 Two Factor Authentication Reflection 5 Free Response
7.9.6 RADIUS Overview with AAA Protocol 1 Connection
7.9.7 RADIUS Server Access Control 1 Connection
7.9.8 RADIUS Reflection 5 Free Response
7.10 Command Line Interface Lesson
7.10.1 Linux/MacOS vs. Windows 1 Notes
7.10.2 Command Line Interface 1 Video
7.10.3 Command Line Interface Quiz 5 Check for Understanding
7.10.4 Command Equivalents 1 Resource
7.10.5 Windows Command Prompt 1 Video
7.10.6 Windows Command Prompt 5 Free Response
7.10.7 Directory Directions 5 Free Response
7.10.8 Neural Interface? 1 Connection
7.10.9 Neural Interface? 5 Free Response
7.11 System Administration Quiz Lesson
7.11.1 Mindsets 1 Survey
7.11.2 System Administration Quiz 20 Unit Quiz
Cyber Defense
8.1 Network Attacks Lesson
8.1.1 Network Attacks Overview 1 Video
8.1.2 Network Attacks Quiz 4 Check for Understanding
8.1.3 Check for Vulnerabilities 1 Notes
8.1.4 Bug Bounty Hunting 1 Connection
8.1.5 Bug Bounty Hunting 5 Free Response
8.1.6 Common Port Targets 1 Connection
8.1.7 Port Scanner Simulation 1 Example
8.1.8 Open Port Reflection 5 Free Response
8.2 Malware Types and Prevention Lesson
8.2.1 Malware Types and Prevention 1 Video
8.2.2 Malware Types and Prevention 5 Check for Understanding
8.2.3 How Anti-malware Works 1 Connection
8.2.4 How Anti-malware Works 5 Free Response
8.2.5 OS Malware Security 5 Free Response
8.2.6 Reverse Engineering Malware 5 Free Response
8.3 What is SQL? Lesson
8.3.1 What is SQL Overview 1 Notes
8.3.2 Intro to SQL 1 Video
8.3.3 Quiz: What is SQL? 1 Check for Understanding
8.3.4 How to Structure Data in SQL 1 Video
8.3.5 How to Structure Data in SQL 3 Check for Understanding
8.3.6 SQL Tables 1 Example
8.3.7 SQL Tables Response 5 Free Response
8.4 Basic Querying in SQL Lesson
8.4.1 The SELECT Statement 1 Video
8.4.2 Basic Querying in SQL 1 Check for Understanding
8.4.3 Our First SELECT Statement 1 Example
8.4.4 Your First SELECT Statement 5 Exercise
8.4.5 More SELECT Statement 1 Video
8.4.6 More SELECT Statement 1 Check for Understanding
8.4.7 Selecting Specific Columns 1 Example
8.4.8 Harry Potter Names 5 Exercise
8.5 Filtering Queries in SQL Lesson
8.5.1 The WHERE Clause 1 Video
8.5.2 Condition Operators 1 Check for Understanding
8.5.3 Ravenclaw House 1 Example
8.5.4 People in Gryffindor 1 Example
8.5.5 Filter By ID 1 Example
8.5.6 The Weasleys 5 Exercise
8.5.7 The Potters 5 Exercise
8.6 Common Security Problems Lesson
8.6.1 Common Security Problems 1 Video
8.6.2 Common Security Problems 1 Check for Understanding
8.6.3 Meet Security Engineers at Google 1 Connection
8.6.4 Security Engineering Reflection 5 Free Response
8.6.5 Living in a Digital World 1 Video
8.6.6 Living in a Digital World 5 Free Response
8.7 SQL Injection Overview Lesson
8.7.1 SQL Injection Overview 1 Video
8.7.2 SQL Injection Overview 2 Check for Understanding
8.7.3 Equifax Security Breach 1 Connection
8.7.4 Equifax Exposed Millions 1 Connection
8.7.5 Equifax SQL Injection Attack 5 Free Response
8.7.6 SQLi 1 Example
8.8 Types of SQLi and Prevention Lesson
8.8.1 Types of SQLi 1 Video
8.8.2 Types of SQLi 3 Check for Understanding
8.8.3 Preventing SQLi 1 Video
8.8.4 Preventing SQLi 2 Check for Understanding
8.8.5 Mitigating SQL Injection 1 Connection
8.8.6 Reflection: Mitigating SQL Injection 5 Free Response
8.8.7 SQL Injection Practice 1 Connection
8.9 Software Security Quiz Lesson
8.9.1 Software Security Quiz 15 Unit Quiz
Project: Security Assessment Report
9.1 Project: Security Assessment Report Lesson
9.1.1 Project Requirements 1 Notes
9.1.2 Supercar Showdown Website 1 Connection
9.1.3 SQL Injection Testing 5 Free Response
9.1.4 SQLi Testing Handout 1 Resource
9.1.5 Security Assessment Report 15 Free Response
9.1.6 Project Reflection 5 Free Response
Networking Fundamentals
10.1 Introduction to the Internet Lesson
10.1.1 Welcome to the Internet 1 Video
10.1.2 Intro to the Internet 3 Check for Understanding
10.1.3 Inside Facebook's Connectivity Lab 1 Connection
10.1.4 Connectivity Lab Reflection 5 Free Response
10.2 Notational Systems Lesson
10.2.1 Number Systems 1 Video
10.2.2 Number Systems Quiz 2 Check for Understanding
10.2.3 Number Base Tool 1 Notes
10.2.4 Decimal to Binary 1 Video
10.2.5 Decimal to Binary Quiz 3 Check for Understanding
10.2.6 Binary Game 5 Exercise
10.3 Data Representation Lesson
10.3.1 Hexadecimal 1 Video
10.3.2 Hexadecimal Quiz 2 Check for Understanding
10.3.3 Binary to Hex Game 5 Exercise
10.3.4 Encoding Text with Binary 1 Video
10.3.5 Encoding Text with Binary Quiz 2 Check for Understanding
10.3.6 Custom Encoding 1 Example
10.3.7 Bits to ASCII 1 Example
10.3.8 Hello World in Bits 5 Exercise
10.4 Internet Hardware and Sending Information Lesson
10.4.1 Internet Hardware 1 Video
10.4.2 Internet Hardware 2 Check for Understanding
10.4.3 Sending Information 1 Video
10.4.4 Sending Information 3 Check for Understanding
10.4.5 The Internet is in the Ocean 1 Connection
10.4.6 Internet in the Ocean Reflection 5 Free Response
10.5 Internet Addresses Lesson
10.5.1 Internet Addresses 1 Video
10.5.2 Internet Addresses 2 Check for Understanding
10.5.3 The Need for Addresses 5 Free Response
10.5.4 IPv4 vs. IPv6 1 Connection
10.5.5 Reflection: IPv4 vs IPv6 5 Free Response
10.6 Domain Name System (DNS) Lesson
10.6.1 Domain Name System (DNS) 1 Video
10.6.2 Domain Name System 2 Check for Understanding
10.6.3 How Does DNS Work? 1 Connection
10.6.4 How Does DNS Work? 5 Free Response
10.7 Routing Lesson
10.7.1 Routing 1 Video
10.7.2 Routing 3 Check for Understanding
10.7.3 Redundancy 5 Free Response
10.8 Packets & Protocols Lesson
10.8.1 Packets 1 Video
10.8.2 Packets 2 Check for Understanding
10.8.3 Protocols 1 Video
10.8.4 Protocols 3 Check for Understanding
10.8.5 How the Internet Works 1 Connection
10.8.6 The Journey of an Image 5 Free Response
10.9 Viewing a Webpage Lesson
10.9.1 Viewing a Webpage 1 Video
10.9.2 Viewing a Webpage 2 Check for Understanding
10.9.3 Explaining a URL 5 Free Response
10.9.4 Net Neutrality Explained 1 Connection
10.9.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
10.9.6 Take a Side on Net Neutrality 5 Free Response
10.9.7 Net Neutrality and Cybersecurity 1 Connection
10.9.8 Net Neutrality and Cybersecurity Research 5 Free Response
10.10 Impact of the Internet Lesson
10.10.1 Impact of the Internet 1 Video
10.10.2 Impact of the Internet 3 Check for Understanding
10.10.3 What is the Digital Divide? 1 Connection
10.10.4 What is the Digital Divide? 5 Free Response
10.11 Networking Fundamentals Quiz Lesson
10.11.1 Mindsets 1 Survey
10.11.2 Networking Fundamentals Quiz 15 Unit Quiz
IT Infrastructure
11.1 Internal Components Lesson
11.1.1 Internal Components 1 Video
11.1.2 Internal Components 5 Check for Understanding
11.1.3 Build a Computer 1 Connection
11.1.4 Build a Computer 5 Free Response
11.1.5 Test Your Brain's RAM! 1 Example
11.1.6 Test Your Brain's RAM! Reflection 5 Free Response
11.2 Peripheral Devices Lesson
11.2.1 Peripheral Devices 1 Video
11.2.2 Peripheral Devices 5 Check for Understanding
11.2.3 Personalized Peripherals 5 Free Response
11.2.4 IT Help 5 Free Response
11.2.5 Your Ideal Computer Setup 5 Free Response
11.3 Network Devices Lesson
11.3.1 Network Devices 1 Video
11.3.2 Network Devices 5 Check for Understanding
11.3.3 Speed Test 1 Connection
11.3.4 Speed Test 5 Free Response
11.3.5 Fiber Optics Bend Light! 1 Connection
11.3.6 Fiber Optics Bend Light! 5 Free Response
11.3.7 Ethernet Standards 1 Connection
11.3.8 Ethernet Standards 5 Free Response
11.3.9 Network Troubleshooting 5 Free Response
11.4 Storage Options Lesson
11.4.1 Storage Options 1 Video
11.4.2 Storage Options Quiz 5 Check for Understanding
11.4.3 Security of Cloud Storage 1 Connection
11.4.4 Security of Cloud Storage 5 Free Response
11.4.5 Storage Suggestions 5 Free Response
11.5 Network Options Lesson
11.5.1 Network Options 1 Video
11.5.2 Network Options Quiz 5 Check for Understanding
11.5.3 What is an SSID? 1 Connection
11.5.4 What is an SSID? 5 Free Response
11.5.5 Wireless Network Setup 5 Free Response
11.6 Network Communication Lesson
11.6.1 Network Communication 1 Video
11.6.2 Network Communication Quiz 2 Check for Understanding
11.6.3 Setting up a Firewall 1 Example
11.6.4 iptables 5 Free Response
11.6.5 iptables simulation 1 Notes
11.6.6 What is Virtualization? 1 Connection
11.6.7 Virtualization Response 5 Free Response
11.7 Network Management Lesson
11.7.1 Linux/MacOS vs. Windows 1 Notes
11.7.2 Network Management 1 Video
11.7.3 Network Management Quiz 3 Check for Understanding
11.7.4 MacOS Terminal Simulation 1 Example
11.7.5 Windows Command Prompt Simulation 1 Example
11.7.6 Windows Command Prompt Spy 5 Video
11.7.7 Windows Command Prompt Spy 5 Free Response
11.7.8 SSH Logs 1 Notes
11.7.9 SSH Logs 1 Example
11.7.10 SSH Logs Submission 5 Free Response
11.8 Private Networks Lesson
11.8.1 IP and MAC Addresses 1 Video
11.8.2 IP and MAC Addresses Quiz 2 Check for Understanding
11.8.3 Intranet Permissions 1 Example
11.8.4 Coffee Shop: Design an Intranet 5 Free Response
11.8.5 DMZs and VPNs 1 Video
11.8.6 DMZs and VPNs Quiz 3 Check for Understanding
11.8.7 Protecting Privacy with VPNs 1 Connection
11.8.8 Protecting Privacy with VPNs 5 Free Response
11.8.9 Coffee Shop: Network Plan 5 Free Response
11.8.10 Coffee Shop: Network Diagram 5 Free Response
11.8.11 SOHO Network 1 Video
11.8.12 Network Topologies 1 Example
11.9 IT Infrastructure Quiz Lesson
11.9.1 IT Infrastructure Quiz 20 Unit Quiz
Project: Troubleshooting
12.1 Methodology Lesson
12.1.1 Troubleshooting Methodology 1 Notes
12.1.2 Identify the Problem 5 Free Response
12.1.3 Research Solutions 5 Free Response
12.1.4 Establish a Theory 5 Free Response
12.1.5 Test the Theory 5 Free Response
12.1.6 Fix the Problem! 5 Free Response
12.2 Support Practice Lesson
12.2.1 Signal Strength 10 Exercise
12.2.2 Interference 10 Exercise
Risk Management
13.1 Identifying Risks Lesson
13.1.1 Identifying Risks 1 Video
13.1.2 Identifying Risks Quiz 5 Check for Understanding
13.1.3 What is a Honeypot? 1 Connection
13.1.4 Honeypot Attacks 1 Connection
13.1.5 Honeypot Attacks 5 Free Response
13.1.6 Whois 1 Connection
13.1.7 Whois 5 Free Response
13.1.8 Packet Sniffing 1 Connection
13.1.9 Packet Sniffing Response 5 Free Response
13.1.10 Breach Trends 5 Free Response
13.2 Assessing Risks Lesson
13.2.1 Assessing Risks 1 Notes
13.2.2 Malware Risk Assessment 5 Free Response
13.2.3 Poor Password Assessment 5 Free Response
13.2.4 Social Engineering Assessment 5 Free Response
13.2.5 Assessing Risks 1 Video
13.2.6 Assessing Risks Quiz 5 Check for Understanding
13.2.7 End-of-Life OS 1 Connection
13.2.8 End-of-Life Proposal 5 Free Response
13.2.9 Input Handling 1 Example
13.2.10 Input Handling Responses 5 Free Response
13.2.11 Input Validation 1 Example
13.2.12 Input Validation Responses 5 Free Response
13.3 Risk Response Lesson
13.3.1 Risk Response 1 Video
13.3.2 Risk Response 5 Check for Understanding
13.3.3 Defense in Depth Risk Mitigation 5 Free Response
13.3.4 Sample Risk Assessment Report 5 Connection
13.3.5 Sample Risk Assessment Reflection 5 Free Response
13.3.6 Delta Outage Video 5 Connection
13.3.7 Delta Outage Reflection 5 Free Response
13.3.8 What Happens When Your Servers Go Down 5 Connection
13.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
13.3.10 Server Upgrade Memo 5 Free Response
13.4 Penetration Testing Lesson
13.4.1 Penetration Testing 1 Video
13.4.2 Penetration Testing 5 Check for Understanding
13.4.3 Penetration Test Report 5 Connection
13.4.4 Penetration Test Report 5 Free Response
13.4.5 Chaos Engineering 5 Notes
13.4.6 Chaos Engineering Reflection 5 Free Response
13.4.7 Pen Test Simulation Handout 5 Resource
13.4.8 Pen Test Simulation: Active Recon 5 Exercise
13.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
13.5 Risk Management Quiz Lesson
13.5.1 Risk Management Quiz 20 Unit Quiz
Final Exam
14.1 Final Exam Lesson
14.1.1 Final Exam 25 Final
What's Next?
15.1 After Fundamentals of Cybersecurity Lesson
15.1.1 Cybersecurity Pathways 1 Notes
15.1.2 CodeHS Advanced Cybersecurity 1 Connection
15.1.3 College Pathway 1 Notes
15.1.4 Certification Pathway 1 Connection
15.1.5 Career Spotlight 1 Connection
15.1.6 My Pathway 5 Free Response
Programming Fundamentals
16.1 Programming Concepts Lesson
16.1.1 Programming Concepts 1 Video
16.1.2 Programming Concepts Quiz 5 Check for Understanding
16.1.3 Compilers vs. Interpreters 1 Connection
16.1.4 Compilers vs. Interpreters 5 Free Response
16.1.5 Variables in Action 1 Example
16.1.6 Data Types using Typeof 1 Example
16.1.7 Basic Variables 1 Example
16.1.8 Daily Activities 5 Exercise
16.2 Programming with Karel Lesson
16.2.1 Learning to Program 1 Notes
16.2.2 Programming With Karel 1 Video
16.2.3 Quiz: Karel Commands 1 Check for Understanding
16.2.4 Our First Karel Program 1 Example
16.2.5 Your First Karel Program 5 Exercise
16.2.6 Functions in Karel 1 Video
16.2.7 Functions in Karel Quiz 1 Check for Understanding
16.2.8 Turn Around 1 Example
16.2.9 Digging Karel 1 Example
16.2.10 Backflip 5 Exercise
16.3 Looping Lesson
16.3.1 For Loops 1 Video
16.3.2 For Loops Quiz 1 Check for Understanding
16.3.3 Take 'em All 1 Example
16.3.4 For Loop Square 1 Example
16.3.5 Lots of Hurdles 5 Exercise
16.3.6 While Loops in Karel 1 Video
16.3.7 While Loops in Karel Quiz 2 Check for Understanding
16.3.8 Move to Wall 1 Example
16.3.9 Big Tower 1 Example
16.3.10 Follow The Yellow Ball Road 5 Exercise
16.4 Branching Lesson
16.4.1 If/Else Statements 1 Video
16.4.2 If/Else Statements Quiz 2 Check for Understanding
16.4.3 If/Else Statements 1 Example
16.4.4 One Ball in Each Spot 1 Example
16.4.5 Right Side Up 5 Exercise
16.4.6 Programming with Karel Badge 5 Badge
16.5 Arrays and Objects Lesson
16.5.1 More JS Topics 1 Notes
16.5.2 Arrays and Objects 1 Video
16.5.3 Arrays and Objects 5 Check for Understanding
16.5.4 Making an Array 1 Example
16.5.5 List of Places to Travel 5 Exercise
16.5.6 List of Prime Numbers 5 Exercise
16.5.7 Phonebook 1 Example
16.5.8 Sidekicks 5 Exercise
16.6 Organizational Techniques Lesson
16.6.1 Organizational Techniques 1 Video
16.6.2 Organizational Techniques Quiz 4 Check for Understanding
16.6.3 Hurdle Karel 1 Example
16.6.4 One Ball in Each Spot 5 Exercise
16.6.5 The Two Towers 5 Exercise
16.6.6 Interactive Sequence Diagram 1 Example
16.7 Programming Fundamentals Quiz Lesson
16.7.1 Mindsets 1 Survey
16.7.2 Programming Fundamentals Quiz 15 Unit Quiz
Software Security
17.1 Inside Web Apps Lesson
17.1.1 Inside Web Apps 1 Video
17.1.2 Inside Web Apps 2 Check for Understanding
17.1.3 Using View Page Source 5 Free Response
17.1.4 Recreate a Webpage? 1 Example
17.1.5 Getting Started with OWASP 1 Connection
17.1.6 Getting Started with OWASP 5 Free Response
17.2 Developer Tools Lesson
17.2.1 Developer Tools 1 Video
17.2.2 Developer Tools 3 Check for Understanding
17.2.3 Using the Developer Tools 5 Free Response
17.2.4 Console Secrets 5 Exercise
17.2.5 Local Storage 1 Example
17.2.6 The Top Cybersecurity Blogs and Websites 1 Connection
17.2.7 Selecting a Site to Follow 5 Free Response
17.3 The Value of Data Lesson
17.3.1 The Value of Data 1 Video
17.3.2 The Value of Data Quiz 5 Check for Understanding
17.3.3 Exploring Data Visualizations 1 Notes
17.3.4 US Recorded Music Revenue 1 Connection
17.3.5 National Parks 1 Connection
17.3.6 March Madness 1 Connection
17.3.7 Captain Marvel 1 Connection
17.3.8 Respond: Visualizations 5 Free Response
17.3.9 Free Response: Choosing a Visualization 5 Free Response
17.3.10 Reflection: Design a Survey 5 Free Response
17.4 Databases Lesson
17.4.1 Databases 1 Video
17.4.2 Databases 1 Check for Understanding
17.4.3 Database Administrator Career 1 Connection
17.4.4 Database Administrator Career 5 Free Response
17.4.5 Parts of a Database 1 Video
17.4.6 Parts of a Database 1 Check for Understanding
17.4.7 SQL Database Diagram 1 Connection
17.4.8 SQL Database Diagram 5 Free Response
17.4.9 Schema Brainstorm 5 Free Response
17.5 Clients and Servers Lesson
17.5.1 Clients and Servers 1 Video
17.5.2 Clients and Servers 2 Check for Understanding
17.5.3 Inside a Google Data Center 1 Connection
17.5.4 Inside a Google Data Center 5 Free Response
17.5.5 Cloud Vulnerabilities 1 Connection
17.5.6 Cloud Vulnerabilities Response 5 Free Response
17.5.7 Client-Server Model 1 Video
17.5.8 Client-Server Model 2 Check for Understanding
17.5.9 The Future of User Privacy 1 Connection
17.5.10 The Future of User Privacy 5 Free Response
17.6 What is SQL? Lesson
17.6.1 What is SQL Overview 1 Notes
17.6.2 Intro to SQL 1 Video
17.6.3 Quiz: What is SQL? 1 Check for Understanding
17.6.4 How to Structure Data in SQL 1 Video
17.6.5 How to Structure Data in SQL 3 Check for Understanding
17.6.6 SQL Tables 1 Example
17.6.7 SQL Tables Response 5 Free Response
17.7 Basic Querying in SQL Lesson
17.7.1 The SELECT Statement 1 Video
17.7.2 Basic Querying in SQL 1 Check for Understanding
17.7.3 Our First SELECT Statement 1 Example
17.7.4 Your First SELECT Statement 5 Exercise
17.7.5 More SELECT Statement 1 Video
17.7.6 More SELECT Statement 1 Check for Understanding
17.7.7 Selecting Specific Columns 1 Example
17.7.8 Harry Potter Names 5 Exercise
17.8 Filtering Queries in SQL Lesson
17.8.1 The WHERE Clause 1 Video
17.8.2 Condition Operators 1 Check for Understanding
17.8.3 Ravenclaw House 1 Example
17.8.4 People in Gryffindor 1 Example
17.8.5 Filter By ID 1 Example
17.8.6 The Weasleys 5 Exercise
17.8.7 The Potters 5 Exercise
17.9 Common Security Problems Lesson
17.9.1 Common Security Problems 1 Video
17.9.2 Common Security Problems 1 Check for Understanding
17.9.3 Meet Security Engineers at Google 1 Connection
17.9.4 Security Engineering Reflection 5 Free Response
17.9.5 Living in a Digital World 1 Video
17.9.6 Living in a Digital World 5 Free Response
17.10 SQL Injection Overview Lesson
17.10.1 SQL Injection Overview 1 Video
17.10.2 SQL Injection Overview 2 Check for Understanding
17.10.3 Equifax Security Breach 1 Connection
17.10.4 Equifax Exposed Millions 1 Connection
17.10.5 Equifax SQL Injection Attack 5 Free Response
17.10.6 SQLi 1 Example
17.11 Types of SQLi and Prevention Lesson
17.11.1 Types of SQLi 1 Video
17.11.2 Types of SQLi 3 Check for Understanding
17.11.3 Preventing SQLi 1 Video
17.11.4 Preventing SQLi 2 Check for Understanding
17.11.5 Mitigating SQL Injection 1 Connection
17.11.6 Reflection: Mitigating SQL Injection 5 Free Response
17.11.7 SQL Injection Practice 1 Connection
17.12 Software Security Quiz Lesson
17.12.1 Software Security Quiz 15 Unit Quiz
Advanced Networking
18.1 Network Administrator Lesson
18.1.1 Advanced Devices 1 Video
18.1.2 Advanced Devices Quiz 5 Check for Understanding
18.1.3 Network Administrator Career 1 Connection
18.1.4 Network Administrator Career 5 Free Response
18.1.5 Choosing the Best Devices 5 Free Response
18.1.6 Network Diagram 5 Free Response
18.2 Environmental Controls Lesson
18.2.1 Environmental Controls 1 Video
18.2.2 Environmental Controls Quiz 5 Check for Understanding
18.2.3 Infographic 1 Connection
18.2.4 Infographic FR 5 Free Response
18.2.5 Your Security Systems 5 Free Response
18.2.6 Security Design 10 Free Response
18.3 Protocols and Standards Lesson
18.3.1 Protocols 1 Video
18.3.2 Protocols Quiz 3 Check for Understanding
18.3.3 Standards 1 Video
18.3.4 Standards Quiz 2 Check for Understanding
18.3.5 The New Wireless Standard 1 Connection
18.3.6 801.11ax 1 Connection
18.3.7 801.11ax FR 5 Free Response
18.4 Private Networks Lesson
18.4.1 IP and MAC Addresses 1 Video
18.4.2 IP and MAC Addresses Quiz 2 Check for Understanding
18.4.3 Intranet Permissions 1 Example
18.4.4 Coffee Shop: Design an Intranet 5 Free Response
18.4.5 DMZs and VPNs 1 Video
18.4.6 DMZs and VPNs Quiz 3 Check for Understanding
18.4.7 Protecting Privacy with VPNs 1 Connection
18.4.8 Protecting Privacy with VPNs 5 Free Response
18.4.9 Coffee Shop: Network Plan 5 Free Response
18.4.10 Coffee Shop: Network Diagram 5 Free Response
18.4.11 SOHO Network 1 Video
18.4.12 Network Topologies 1 Example
18.5 Mobile Devices Lesson
18.5.1 Mobile Devices 1 Video
18.5.2 Mobile Devices Quiz 5 Check for Understanding
18.5.3 How Apple FaceID Works 1 Connection
18.5.4 How Apple FaceID Works Response 5 Free Response
18.5.5 Biometric Data Debate 5 Free Response
18.5.6 BYOD and MDM Concept Map 1 Connection
18.5.7 BYOD and MDM Conclusions 5 Free Response
18.6 Access Control Lesson
18.6.1 Access Control 1 Video
18.6.2 Access Control 4 Check for Understanding
18.6.3 Multifactor Authentication 1 Example
18.6.4 Two Factor Authentication 1 Example
18.6.5 Two Factor Authentication Reflection 5 Free Response
18.6.6 RADIUS Overview with AAA Protocol 1 Connection
18.6.7 RADIUS Server Access Control 1 Connection
18.6.8 RADIUS Reflection 5 Free Response
18.7 Advanced Networking Quiz Lesson
18.7.1 Advanced Networking Quiz 20 Unit Quiz
Project: Put it in Writing!
19.1 Level 1: Entry Event Lesson
19.1.1 Company Development 5 Free Response
19.1.2 Level 1: Attack! 5 Free Response
19.1.3 Level 1: Project Overview 1 Video
19.1.4 Put It In Writing! Rubric 5 Connection
19.2 Level 2: User Training Lesson
19.2.1 User Training Policy Development 5 Free Response
19.2.2 Challenge: Employee Negligence 1 5 Free Response
19.2.3 Challenge: Employee Negligence 2 5 Free Response
19.2.4 Level 2 Debrief 5 Free Response
19.3 Level 3: Incident Response Lesson
19.3.1 Incident Response Plan Template 5 Connection
19.3.2 Incident Response Plan Link 5 Free Response
19.3.3 Challenge: Cyber Attack! 5 Free Response
19.3.4 Level 3 Debrief 5 Free Response
19.4 Level 4: Data and Licenses Lesson
19.4.1 Data and Licenses 5 Video
19.4.2 FTC Data Security Guide 5 Connection
19.4.3 Data Policy Template 5 Connection
19.4.4 Data Policy Link 5 Free Response
19.4.5 Challenge: Data Breach 1 5 Free Response
19.4.6 Challenge: Data Breach 2 5 Free Response
19.4.7 Challenge: Data Breach 3 5 Free Response
19.4.8 Level 4 Debrief 5 Free Response
19.5 Level 5: Change Management Lesson
19.5.1 Change Management 5 Video
19.5.2 Change Management Plan 5 Connection
19.5.3 Change Management Plan Link 5 Free Response
Project: Digital Forensics
20.1 Digital Forensics Lesson
20.1.1 Digital Forensics 1 Video
20.1.2 Student Success Story 1 Connection
20.1.3 Student Success Story Response 5 Free Response
20.2 Forensic Case 1: Logs Lesson
20.2.1 Network Logs 1 Notes
20.2.2 Network Log Evidence 1 Example
20.2.3 Network Logs Conclusion 5 Free Response
20.3 Forensic Case 2: File Metadata Lesson
20.3.1 File Metadata 1 Notes
20.3.2 File Metadata Evidence 1 Example
20.3.3 File Metadata Conclusion 5 Free Response
20.4 Forensic Case 3: Exif Data Lesson
20.4.1 Photo Exif 1 Notes
20.4.2 Exif Using Inspector 1 Connection
20.4.3 Exif Using the CLI 1 Example
20.4.4 Photo Exif Conclusion 5 Free Response
Cryptocurrency
21.1 What is Currency? Lesson
21.1.1 What is Currency? 1 Video
21.1.2 What is Currency? 2 Check for Understanding
21.1.3 What Gives Paper Money Its Actual Value 1 Connection
21.1.4 What Gives Money Its Value 5 Free Response
21.1.5 Money: What is it Good For? 1 Resource
21.2 What is Cryptocurrency? Lesson
21.2.1 Cryptocurrency Basics 1 Video
21.2.2 Cryptocurrency Basics 5 Check for Understanding
21.2.3 Cryptocurrency Module Overview 1 Video
21.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
21.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
21.2.6 Show Me the Money 1 Resource
21.2.7 American Currency Exhibit 5 Free Response
21.3 Intro to Blockchain Lesson
21.3.1 Intro to Blockchain 1 Video
21.3.2 Intro to Blockchain 3 Check for Understanding
21.3.3 CryptoKitties 1 Connection
21.3.4 CryptoKitties 5 Free Response
21.4 Hashing Lesson
21.4.1 Hashing 1 Video
21.4.2 Hashing 3 Check for Understanding
21.4.3 SHA256 Hash Generator 1 Connection
21.4.4 Using the SHA256 Hash Generator 5 Free Response
21.5 Proof of Work Lesson
21.5.1 Proof of Work 1 Video
21.5.2 Proof of Work 3 Check for Understanding
21.5.3 Mining the Block 1 Video
21.5.4 Mining the Block 3 Check for Understanding
21.5.5 PoW vs. Proof of Stake 1 Connection
21.5.6 PoW vs. PoS 5 Free Response
21.5.7 Checking Proof of Work 1 Resource
21.6 Advanced Blockchain Lesson
21.6.1 Advanced Blockchain (part 1) 1 Video
21.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
21.6.3 Blockchain Buzz 1 Connection
21.6.4 Blockchain Buzz 5 Free Response
21.6.5 Advanced Blockchain (part 2) 1 Video
21.6.6 Advanced Blockchain (part 2) 5 Free Response
21.6.7 Make a Blockchain 1 Resource
21.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
21.7 Cryptocurrencies Lesson
21.7.1 Cryptocurrencies 1 Video
21.7.2 Cryptocurrencies 3 Check for Understanding
21.7.3 Shiny Toy Phenomenon 5 Free Response
21.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
21.7.5 Walmart Use of Blockchain 5 Free Response
21.8 Bitcoin Lesson
21.8.1 Bitcoin 1 Video
21.8.2 Bitcoin 3 Check for Understanding
21.8.3 51% Attack Explained 1 Connection
21.8.4 51% Attack 5 Free Response
21.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
21.8.6 Bitcoin Bust 5 Free Response
21.8.7 Explore the Bitcoin Blockchain 1 Resource
21.9 Pros, Cons, and Future of Cryptocurrencies Lesson
21.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
21.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
21.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
21.9.4 Cryptocurrency Pros and Cons 1 Connection
21.9.5 Crypto Pros and Cons 5 Free Response
21.9.6 What is HODL? 1 Connection
21.9.7 What is HODL? 5 Free Response
21.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
21.10 Project: Cryptocurrency Expert Panel Talk Lesson
21.10.1 Overview 5 Free Response
21.10.2 Preview Sample Expert Panels 5 Free Response
21.10.3 Investigate a Cryptocurrency Topic 5 Free Response
21.10.4 Write an Outline and Rehearse 5 Free Response
21.10.5 Expert Panel Talk (Presentation) 5 Free Response
21.11 Cryptocurrency Quiz Lesson
21.11.1 Cryptocurrency Quiz 10 Unit Quiz
21.11.2 Cryptocurrency Badge 0 Badge
SQL Part II: The SQL
22.1 More Filtering Practice Lesson
22.1.1 Initials 5 Exercise
22.1.2 Compound Queries with BETWEEN 5 Exercise
22.1.3 Gryffindors With G Names 5 Exercise
22.1.4 R First Names 5 Exercise
22.1.5 FF Houses 5 Exercise
22.2 Ordering Results Lesson
22.2.1 The ORDER BY Keyword 1 Video
22.2.2 ORDER BY 1 Notes
22.2.3 ORDER BY First Name 1 Example
22.2.4 Reverse Order 1 Example
22.2.5 Order By Multiple Fields 1 Example
22.2.6 House Ordering 5 Exercise
22.2.7 Sort the P Names 5 Exercise
22.3 Renaming Fields Lesson
22.3.1 Renaming Fields with AS 1 Notes
22.3.2 Renaming in the House Table 1 Example
22.3.3 Changing Column Names 5 Exercise
22.4 Joining Tables Lesson
22.4.1 The JOIN command 1 Video
22.4.2 Basic Joining 1 Notes
22.4.3 Letters and Numbers 1 Example
22.4.4 Person and House 1 Example
22.4.5 Person and House (Correct) 1 Example
22.4.6 Person and House (with namespacing) 1 Example
22.4.7 List All Gryffindors 5 Exercise
22.4.8 JOIN With Yourself 1 Video
22.4.9 Renaming Tables 1 Notes
22.4.10 Quidditch Matchups 1 Example
22.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
22.5 More Joining Tables Lesson
22.5.1 The Course Table 1 Example
22.5.2 Courses and Professors 5 Exercise
22.5.3 Courses, Professors, and Houses 5 Exercise
22.5.4 Courses Taught By Gryffindors 5 Exercise
22.5.5 The Enrollment Table 1 Example
22.5.6 Students Taking Potions 5 Exercise
22.5.7 Non-Slytherins Taking Potions 5 Exercise
22.5.8 Defense Students by House 5 Exercise
22.5.9 Neville's Courses 5 Exercise
Web Development
23.1 Introduction to HTML Lesson
23.1.1 Introduction to HTML 1 Video
23.1.2 Introduction to HTML Quiz 1 Check for Understanding
23.1.3 Our First HTML Page 1 Example
23.1.4 Say Hello! 5 Exercise
23.2 Structure of an HTML Page Lesson
23.2.1 Structure of an HTML Page 1 Video
23.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
23.2.3 HTML Template 1 Example
23.2.4 Hello World Page 1 Example
23.2.5 The <title> Tag 5 Exercise
23.2.6 Your First HTML Page 5 Exercise
23.2.7 Structure Badge 1 Badge
23.3 Formatting Text Lesson
23.3.1 Formatting Text 1 Video
23.3.2 Formatting Text Quiz 1 Check for Understanding
23.3.3 Dictionary 1 Example
23.3.4 That's Bold 5 Exercise
23.3.5 Artificial Intelligence 5 Exercise
23.3.6 State Capitals 5 Exercise
23.4 Links Lesson
23.4.1 Links 1 Video
23.4.2 Links Quiz 1 Check for Understanding
23.4.3 The <a> Tag 1 Example
23.4.4 Simple Link 5 Exercise
23.4.5 My Favorite Websites 5 Exercise
23.5 Images Lesson
23.5.1 Images 1 Video
23.5.2 Images Quiz 1 Check for Understanding
23.5.3 The <img> Tag 1 Example
23.5.4 Building the CodeHS Homepage 1 Example
23.5.5 Collage on a Theme 5 Exercise
23.5.6 Linking an Image 5 Exercise
23.5.7 Personal Library 5 Exercise
23.5.8 Images Badge 1 Badge
23.6 HTML Lists Lesson
23.6.1 HTML Lists 1 Video
23.6.2 HTML Lists Quiz 1 Check for Understanding
23.6.3 Grocery Shopping 1 Example
23.6.4 Favorite Things 5 Exercise
23.6.5 To-Do List 5 Exercise
23.6.6 List Article 5 Exercise
23.7 HTML Tables Lesson
23.7.1 HTML Tables 1 Video
23.7.2 HTML Tables Quiz 3 Check for Understanding
23.7.3 Address Book 1 Example
23.7.4 Favorite Songs 5 Exercise
23.7.5 Calendar 5 Exercise
23.8 HTML Styling Lesson
23.8.1 HTML Styling 1 Video
23.8.2 HTML Styling Quiz 1 Check for Understanding
23.8.3 Stylish Address Book 1 Example
23.8.4 Background Colors 5 Exercise
23.8.5 Style Your To-Do List 5 Exercise
23.9 Introduction to CSS Lesson
23.9.1 Introduction to CSS 1 Video
23.9.2 Introduction to CSS Quiz 2 Check for Understanding
23.9.3 Styling Your H1s 1 Example
23.9.4 First Style with CSS 5 Exercise
23.9.5 List Styling 5 Exercise
23.10 CSS Select by Tag Lesson
23.10.1 CSS Select by Tag 1 Video
23.10.2 CSS Select by Tag Quiz 1 Check for Understanding
23.10.3 Rainbow 1 Example
23.10.4 Dog Styling 1 Example
23.10.5 Restaurant Menu 5 Exercise
23.10.6 Put Karel Together 5 Exercise
23.11 CSS Select by Class Lesson
23.11.1 CSS Select by Class 1 Video
23.11.2 CSS Select by Class Quiz 1 Check for Understanding
23.11.3 Simple Checkerboard 1 Example
23.11.4 Tic Tac Toe 5 Exercise
23.11.5 Music Library 5 Exercise
23.12 CSS Select by ID Lesson
23.12.1 CSS Select by ID 1 Video
23.12.2 CSS Select by ID Quiz 1 Check for Understanding
23.12.3 Logo 1 Example
23.12.4 Favorite Dog 5 Exercise
23.12.5 Bingo 5 Exercise
23.12.6 CSS Badge 1 Badge
23.13 Viewing Websites Lesson
23.13.1 Viewing Websites 1 Video
23.13.2 Viewing Websites Quiz 5 Check for Understanding
23.13.3 Explaining a URL 5 Free Response
23.14 Web Development Quiz Lesson
23.14.1 Web Development Quiz 15 Unit Quiz
23.15 Your First Website Lesson
23.15.1 Set Up Your codehs.me Website 10 Challenge
23.15.2 Practice PT: Your First Website 10 Challenge
23.15.3 Website Badge 1 Badge
Midterm
24.1 Midterm Lesson
24.1.1 Midterm 15 Midterm
Final Course Project
25.1 Final Course Project Lesson
25.1.1 Choose Your Own Adventure 1 Notes
25.1.2 Choose Your Adventure 5 Free Response
25.1.3 Research 5 Free Response
25.1.4 Choose Your Target Audience 5 Free Response
25.1.5 Draft Your Presentation 5 Free Response
25.1.6 Draft Your Flyer 5 Free Response
25.1.7 Make Your Presentation with Handout! 5 Free Response
Extra
26.1 Lesson 1 Lesson
26.1.1 Compound Queries 5 Example
Cybersecurity Level 1 Certification Practice
27.1 Practice #1: Programming and Software Security Lesson
27.1.1 Quiz: Programming and Software Security 14 Quiz
27.1.2 Practice #1 Reflection 5 Notes
27.2 Practice #2: IT Infrastructure + Networks Lesson
27.2.1 Quiz: IT Infrastructure and Networks 15 Quiz
27.2.2 Practice #2 Reflection 5 Notes
27.3 Practice #3: Digital Citizenship + Cybersecurity Lesson
27.3.1 Quiz: Digital Citizenship + Cybersecurity 8 Quiz
27.3.2 Practice #3 Reflection 5 Notes
27.4 Practice #4: System Admin and Cryptography Lesson
27.4.1 Quiz: System Admin and Cryptography 15 Quiz
27.4.2 Practice #4 Reflection 5 Notes
27.5 Mixed Practice Test Lesson
27.5.1 Important Note 5 Notes
27.5.2 Mixed Practice 30 Quiz
27.5.3 Mixed Practice Reflection 5 Notes