Please enable JavaScript to use CodeHS

Virginia Cybersecurity Fundamentals - Outline

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Video 1.1.1 Welcome to Cybersecurity
    3. Check for Understanding 1.1.2 Welcome to Cybersecurity
    4. Example 1.1.3 Intruder Alert!
    5. Free Response 1.1.4 Cybersecurity and You
    6. Free Response 1.1.5 Course Goals
    7. 1.2 What is Cybersecurity?

    8. Video 1.2.1 What is Cybersecurity?
    9. Check for Understanding 1.2.2 What is Cybersecurity?
    10. Connection 1.2.3 City Services Ransomware
    11. Free Response 1.2.4 Ransomware Reflection
    12. Example 1.2.5 Ransomware Simulator
    13. Connection 1.2.6 Internet of Things
    14. Connection 1.2.7 Hackers vs. Smart Homes
    15. Free Response 1.2.8 Internet of Things Reflection
    16. 1.3 Impact of Cybersecurity

    17. Video 1.3.1 Impact of Cybersecurity
    18. Check for Understanding 1.3.2 Impact of Cybersecurity
    19. Example 1.3.3 Phishing Simulator
    20. Connection 1.3.4 Phishing for Your Info
    21. Free Response 1.3.5 Phishing Reflection
    22. Connection 1.3.6 Cyber Game
    23. Free Response 1.3.7 Cyber Game Reflection
    24. Connection 1.3.8 Cyber Crime Time
    25. Free Response 1.3.9 Cyber Crime Time Reflection
    26. 1.4 The CIA Triad

    27. Video 1.4.1 CIA Triad
    28. Check for Understanding 1.4.2 CIA Triad
    29. Free Response 1.4.3 Which part of the CIA Triad?
    30. Free Response 1.4.4 Which part of the CIA Triad?
    31. Free Response 1.4.5 Breach of Confidentiality
    32. Free Response 1.4.6 Breach of Availability
    33. Free Response 1.4.7 CIA Connections
    34. 1.5 What is Cybersecurity? Quiz

    35. Unit Quiz 1.5.1 What is Cybersecurity? Quiz
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Example 2.1.3 Social Media Clean-up
    5. Free Response 2.1.4 Building a Positive Digital Footprint
    6. Connection 2.1.5 Right to be Forgotten?
    7. Free Response 2.1.6 Right to be Forgotten
    8. Free Response 2.1.7 What is your Digital Footprint?
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Free Response 2.2.5 Stopping Cyberbullying
    15. 2.3 Internet Safety

    16. Video 2.3.1 Internet Safety
    17. Check for Understanding 2.3.2 Internet Safety
    18. Free Response 2.3.3 Scenario: School Stranger
    19. Free Response 2.3.4 Scenario: Vacation Pals
    20. Free Response 2.3.5 Staying Safe
    21. 2.4 Privacy & Security

    22. Video 2.4.1 What is Data Privacy & Security?
    23. Check for Understanding 2.4.2 Privacy & Security Quiz
    24. Connection 2.4.3 Google Privacy Policy Search
    25. Free Response 2.4.4 Google Privacy Policy Search
    26. Example 2.4.5 Guess: Password List
    27. Example 2.4.6 Guess: Using an Algorithm
    28. Example 2.4.7 Guess: Brute Force
    29. Connection 2.4.8 How Strong is your Password?
    30. Free Response 2.4.9 How Strong is your password?
    31. Example 2.4.10 You Can Be Tracked!
    32. 2.5 Information Literacy

    33. Video 2.5.1 Information Literacy
    34. Check for Understanding 2.5.2 Information Literacy
    35. Free Response 2.5.3 Effective Internet Searches
    36. Connection 2.5.4 Evaluate the Source 1
    37. Free Response 2.5.5 Respond: Evaluate the Source 1
    38. Notes 2.5.6 Evaluate the Source 2
    39. Free Response 2.5.7 Respond: Evaluate the Source 2
    40. Connection 2.5.8 Hero Pig?
    41. Free Response 2.5.9 Respond: Hero Pig?
    42. 2.6 Creative Credit & Copyright

    43. Video 2.6.1 Creative Credit and Copyright
    44. Check for Understanding 2.6.2 Creative Credit and Copyright
    45. Free Response 2.6.3 Cite!
    46. Connection 2.6.4 Exploring Creative Commons
    47. Free Response 2.6.5 Respond: Creative Commons
    48. Free Response 2.6.6 Task: Finding Images
    49. Free Response 2.6.7 Reflection: Why is Copyright Important?
    50. 2.7 Hacking Ethics

    51. Video 2.7.1 Hacking Ethics & Legality
    52. Check for Understanding 2.7.2 Hacking Ethics & Legality
    53. Connection 2.7.3 Penetration Testing
    54. Free Response 2.7.4 Reflection: Penetration Testing
    55. Connection 2.7.5 Hack the Pentagon?
    56. Free Response 2.7.6 Reflection: Hack the Pentagon
    57. Check for Understanding 2.7.7 Ethical Hacker Agreement
    58. 2.8 Digital Citizenship and Cybersecurity Quiz

    59. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. System Administration

    1. 4.1 Operating Systems

    2. Video 4.1.1 Operating Systems
    3. Check for Understanding 4.1.2 Operating Systems Quiz
    4. Example 4.1.3 Detect My OS
    5. Example 4.1.4 Windows OS Installation Simulation
    6. Connection 4.1.5 Upgrading a Mac OS
    7. Free Response 4.1.6 Installing an OS
    8. Connection 4.1.7 What is Virtualization?
    9. Free Response 4.1.8 Virtualization Response
    10. 4.2 Comparing Operating Systems

    11. Video 4.2.1 Comparing Operating Systems
    12. Check for Understanding 4.2.2 Comparing Operating Systems Quiz
    13. Example 4.2.3 Windows Simulation
    14. Example 4.2.4 MacOS Simulation
    15. Connection 4.2.5 Choose a Linux Distro!
    16. Free Response 4.2.6 Which would you choose?
    17. 4.3 Compatibility

    18. Video 4.3.1 Compatibility
    19. Check for Understanding 4.3.2 Compatibility Quiz
    20. Example 4.3.3 What Processor? Windows
    21. Example 4.3.4 What Processor? Mac
    22. Free Response 4.3.5 What Processor are you running?
    23. 4.4 Software and Applications

    24. Video 4.4.1 Software and Applications
    25. Check for Understanding 4.4.2 Software and Applications Quiz
    26. Example 4.4.3 Spreadsheet Simulation
    27. Example 4.4.4 Messaging Simulation
    28. Example 4.4.5 Kanban Board Simulation
    29. Free Response 4.4.6 Software Simulations
    30. 4.5 Software Licenses

    31. Video 4.5.1 Software Licenses
    32. Check for Understanding 4.5.2 Software Licenses Quiz
    33. Free Response 4.5.3 Do I need a Software License?
    34. Free Response 4.5.4 Is This Original?
    35. 4.6 Application Security

    36. Video 4.6.1 Application Security
    37. Check for Understanding 4.6.2 Application Security
    38. Example 4.6.3 Windows Updates
    39. Connection 4.6.4 Windows Defender Antivirus
    40. Free Response 4.6.5 Windows Defender Antivirus
    41. Free Response 4.6.6 CodeHS System Restore
    42. 4.7 Browser Configuration

    43. Video 4.7.1 Browser Configuration
    44. Check for Understanding 4.7.2 Browser Configuration
    45. Connection 4.7.3 Cached CodeHS
    46. Free Response 4.7.4 Cached CodeHS
    47. Example 4.7.5 Is Your Popup Blocker On?
    48. Free Response 4.7.6 Browser Extensions Lab
    49. 4.8 System Administration

    50. Video 4.8.1 User Accounts
    51. Check for Understanding 4.8.2 User Accounts Quiz
    52. Free Response 4.8.3 User Accounts
    53. Free Response 4.8.4 Shared Folders and Files
    54. Video 4.8.5 Host Security
    55. Check for Understanding 4.8.6 Host Security Quiz
    56. Free Response 4.8.7 Security Baseline
    57. 4.9 Command Line Interface

    58. Notes 4.9.1 Linux/MacOS vs. Windows
    59. Video 4.9.2 Command Line Interface
    60. Check for Understanding 4.9.3 Command Line Interface Quiz
    61. Resource 4.9.4 Command Equivalents
    62. Video 4.9.5 Windows Command Prompt
    63. Free Response 4.9.6 Windows Command Prompt
    64. Free Response 4.9.7 Directory Directions
    65. Connection 4.9.8 Neural Interface?
    66. Free Response 4.9.9 Neural Interface?
    67. 4.10 Mobile Devices

    68. Video 4.10.1 Mobile Devices
    69. Check for Understanding 4.10.2 Mobile Devices Quiz
    70. Connection 4.10.3 How Apple FaceID Works
    71. Free Response 4.10.4 How Apple FaceID Works Response
    72. Free Response 4.10.5 Biometric Data Debate
    73. Connection 4.10.6 BYOD and MDM Concept Map
    74. Free Response 4.10.7 BYOD and MDM Conclusions
    75. 4.11 System Administration Quiz

    76. Survey 4.11.1 Mindsets
    77. Unit Quiz 4.11.2 System Administration Quiz
  5. Software Security

    1. 5.1 Programming Concepts

    2. Video 5.1.1 Programming Concepts
    3. Check for Understanding 5.1.2 Programming Concepts Quiz
    4. Connection 5.1.3 Compilers vs. Interpreters
    5. Free Response 5.1.4 Compilers vs. Interpreters
    6. Example 5.1.5 Variables in Action
    7. Example 5.1.6 Data Types using Typeof
    8. Example 5.1.7 Basic Variables
    9. Exercise 5.1.8 Daily Activities
    10. 5.2 Inside Web Apps

    11. Video 5.2.1 Inside Web Apps
    12. Check for Understanding 5.2.2 Inside Web Apps
    13. Free Response 5.2.3 Using View Page Source
    14. Example 5.2.4 Recreate a Webpage?
    15. Connection 5.2.5 Getting Started with OWASP
    16. Free Response 5.2.6 Getting Started with OWASP
    17. 5.3 Developer Tools

    18. Video 5.3.1 Developer Tools
    19. Check for Understanding 5.3.2 Developer Tools
    20. Free Response 5.3.3 Using the Developer Tools
    21. Exercise 5.3.4 Console Secrets
    22. Example 5.3.5 Local Storage
    23. Connection 5.3.6 The Top Cybersecurity Blogs and Websites
    24. Free Response 5.3.7 Selecting a Site to Follow
    25. 5.4 The Value of Data

    26. Video 5.4.1 The Value of Data
    27. Check for Understanding 5.4.2 The Value of Data Quiz
    28. Notes 5.4.3 Exploring Data Visualizations
    29. Connection 5.4.4 US Recorded Music Revenue
    30. Connection 5.4.5 National Parks
    31. Connection 5.4.6 March Madness
    32. Connection 5.4.7 Captain Marvel
    33. Free Response 5.4.8 Respond: Visualizations
    34. Free Response 5.4.9 Free Response: Choosing a Visualization
    35. Free Response 5.4.10 Reflection: Design a Survey
    36. 5.5 Databases

    37. Video 5.5.1 Databases
    38. Check for Understanding 5.5.2 Databases
    39. Connection 5.5.3 Database Administrator Career
    40. Free Response 5.5.4 Database Administrator Career
    41. Video 5.5.5 Parts of a Database
    42. Check for Understanding 5.5.6 Parts of a Database
    43. Connection 5.5.7 SQL Database Diagram
    44. Free Response 5.5.8 SQL Database Diagram
    45. Free Response 5.5.9 Schema Brainstorm
    46. 5.6 Clients and Servers

    47. Video 5.6.1 Clients and Servers
    48. Check for Understanding 5.6.2 Clients and Servers
    49. Connection 5.6.3 Inside a Google Data Center
    50. Free Response 5.6.4 Inside a Google Data Center
    51. Connection 5.6.5 Cloud Vulnerabilities
    52. Free Response 5.6.6 Cloud Vulnerabilities Response
    53. Video 5.6.7 Client-Server Model
    54. Check for Understanding 5.6.8 Client-Server Model
    55. Connection 5.6.9 The Future of User Privacy
    56. Free Response 5.6.10 The Future of User Privacy
    57. 5.7 What is SQL?

    58. Notes 5.7.1 What is SQL Overview
    59. Video 5.7.2 Intro to SQL
    60. Check for Understanding 5.7.3 Quiz: What is SQL?
    61. Video 5.7.4 How to Structure Data in SQL
    62. Check for Understanding 5.7.5 How to Structure Data in SQL
    63. Example 5.7.6 SQL Tables
    64. Free Response 5.7.7 SQL Tables Response
    65. 5.8 Basic Querying in SQL

    66. Video 5.8.1 The SELECT Statement
    67. Check for Understanding 5.8.2 Basic Querying in SQL
    68. Example 5.8.3 Our First SELECT Statement
    69. Exercise 5.8.4 Your First SELECT Statement
    70. Video 5.8.5 More SELECT Statement
    71. Check for Understanding 5.8.6 More SELECT Statement
    72. Example 5.8.7 Selecting Specific Columns
    73. Exercise 5.8.8 Harry Potter Names
    74. 5.9 Filtering Queries in SQL

    75. Video 5.9.1 The WHERE Clause
    76. Check for Understanding 5.9.2 Condition Operators
    77. Example 5.9.3 Ravenclaw House
    78. Example 5.9.4 People in Gryffindor
    79. Example 5.9.5 Filter By ID
    80. Exercise 5.9.6 The Weasleys
    81. Exercise 5.9.7 The Potters
    82. 5.10 Common Security Problems

    83. Video 5.10.1 Common Security Problems
    84. Check for Understanding 5.10.2 Common Security Problems
    85. Connection 5.10.3 Meet Security Engineers at Google
    86. Free Response 5.10.4 Security Engineering Reflection
    87. Video 5.10.5 Living in a Digital World
    88. Free Response 5.10.6 Living in a Digital World
    89. 5.11 SQL Injection Overview

    90. Video 5.11.1 SQL Injection Overview
    91. Check for Understanding 5.11.2 SQL Injection Overview
    92. Connection 5.11.3 Equifax Security Breach
    93. Connection 5.11.4 Equifax Exposed Millions
    94. Free Response 5.11.5 Equifax SQL Injection Attack
    95. Example 5.11.6 SQLi
    96. 5.12 Types of SQLi and Prevention

    97. Video 5.12.1 Types of SQLi
    98. Check for Understanding 5.12.2 Types of SQLi
    99. Video 5.12.3 Preventing SQLi
    100. Check for Understanding 5.12.4 Preventing SQLi
    101. Connection 5.12.5 Mitigating SQL Injection
    102. Free Response 5.12.6 Reflection: Mitigating SQL Injection
    103. Connection 5.12.7 SQL Injection Practice
    104. 5.13 Software Security Quiz

    105. Unit Quiz 5.13.1 Software Security Quiz
  6. Project: Security Assessment Report

    1. 6.1 Project: Security Assessment Report

    2. Notes 6.1.1 Project Requirements
    3. Connection 6.1.2 Supercar Showdown Website
    4. Free Response 6.1.3 SQL Injection Testing
    5. Resource 6.1.4 SQLi Testing Handout
    6. Free Response 6.1.5 Security Assessment Report
    7. Free Response 6.1.6 Project Reflection
  7. Project: Put it in Writing!

    1. 7.1 Level 1: Entry Event

    2. Free Response 7.1.1 Company Development
    3. Free Response 7.1.2 Level 1: Attack!
    4. Video 7.1.3 Level 1: Project Overview
    5. Connection 7.1.4 Put It In Writing! Rubric
    6. 7.2 Level 2: User Training

    7. Free Response 7.2.1 User Training Policy Development
    8. Free Response 7.2.2 Challenge: Employee Negligence 1
    9. Free Response 7.2.3 Challenge: Employee Negligence 2
    10. Free Response 7.2.4 Level 2 Debrief
    11. 7.3 Level 3: Incident Response

    12. Connection 7.3.1 Incident Response Plan Template
    13. Free Response 7.3.2 Incident Response Plan Link
    14. Free Response 7.3.3 Challenge: Cyber Attack!
    15. Free Response 7.3.4 Level 3 Debrief
    16. 7.4 Level 4: Data and Licenses

    17. Video 7.4.1 Data and Licenses
    18. Connection 7.4.2 FTC Data Security Guide
    19. Connection 7.4.3 Data Policy Template
    20. Free Response 7.4.4 Data Policy Link
    21. Free Response 7.4.5 Challenge: Data Breach 1
    22. Free Response 7.4.6 Challenge: Data Breach 2
    23. Free Response 7.4.7 Challenge: Data Breach 3
    24. Free Response 7.4.8 Level 4 Debrief
    25. 7.5 Level 5: Change Management

    26. Video 7.5.1 Change Management
    27. Connection 7.5.2 Change Management Plan
    28. Free Response 7.5.3 Change Management Plan Link
  8. The ABCs of Cryptography

    1. 8.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 8.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 8.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Example 8.1.3 Cryptogram Game!
    5. Video 8.1.4 Why encrypt?
    6. Check for Understanding 8.1.5 Why encrypt?
    7. Example 8.1.6 Encrypt/Decrypt
    8. 8.2 History of Cryptography

    9. Video 8.2.1 Cryptography: A Brief History
    10. Check for Understanding 8.2.2 Cryptography History Quiz
    11. Connection 8.2.3 How the Enigma Worked
    12. Free Response 8.2.4 How the Enigma Worked
    13. Connection 8.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 8.2.6 The Future of Cybersecurity
    15. 8.3 Basic Crypto Systems: Caesar Cipher

    16. Video 8.3.1 Caesar Cipher
    17. Check for Understanding 8.3.2 Caesar Cipher
    18. Example 8.3.3 Caesar Cipher Encryption
    19. Example 8.3.4 Decrypt Caesar's Cipher!
    20. 8.4 Basic Crypto Systems: Cracking Caesar

    21. Video 8.4.1 Cracking Caesar Cipher
    22. Check for Understanding 8.4.2 Cracking Caesar Cipher
    23. Example 8.4.3 Cracking Caesar with Brute Force
    24. Example 8.4.4 Letter Frequency and Caesar
    25. Free Response 8.4.5 Examining Caesar Cipher
    26. 8.5 Basic Crypto Systems: Vigenere Cipher

    27. Video 8.5.1 Vigenere Cipher
    28. Check for Understanding 8.5.2 Vigenere Cipher
    29. Example 8.5.3 Vigenere Cipher Example
    30. Example 8.5.4 Letter Frequency and Vigenere Cipher
    31. Free Response 8.5.5 Examining Vigenere Cipher
    32. Example 8.5.6 Improving Vigenere
    33. 8.6 The ABCs of Cryptography Quiz

    34. Unit Quiz 8.6.1 The ABCs of Cryptography Quiz
  9. Networking Fundamentals

    1. 9.1 Introduction to the Internet

    2. Video 9.1.1 Welcome to the Internet
    3. Check for Understanding 9.1.2 Intro to the Internet
    4. Connection 9.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 9.1.4 Connectivity Lab Reflection
    6. 9.2 Notational Systems

    7. Video 9.2.1 Number Systems
    8. Check for Understanding 9.2.2 Number Systems Quiz
    9. Notes 9.2.3 Number Base Tool
    10. Video 9.2.4 Decimal to Binary
    11. Check for Understanding 9.2.5 Decimal to Binary Quiz
    12. Exercise 9.2.6 Binary Game
    13. 9.3 Data Representation

    14. Video 9.3.1 Hexadecimal
    15. Check for Understanding 9.3.2 Hexadecimal Quiz
    16. Exercise 9.3.3 Binary to Hex Game
    17. Video 9.3.4 Encoding Text with Binary
    18. Check for Understanding 9.3.5 Encoding Text with Binary Quiz
    19. Example 9.3.6 Custom Encoding
    20. Example 9.3.7 Bits to ASCII
    21. Exercise 9.3.8 Hello World in Bits
    22. 9.4 Internet Hardware and Sending Information

    23. Video 9.4.1 Internet Hardware
    24. Check for Understanding 9.4.2 Internet Hardware
    25. Video 9.4.3 Sending Information
    26. Check for Understanding 9.4.4 Sending Information
    27. Connection 9.4.5 The Internet is in the Ocean
    28. Free Response 9.4.6 Internet in the Ocean Reflection
    29. 9.5 Internet Addresses

    30. Video 9.5.1 Internet Addresses
    31. Check for Understanding 9.5.2 Internet Addresses
    32. Free Response 9.5.3 The Need for Addresses
    33. Connection 9.5.4 IPv4 vs. IPv6
    34. Free Response 9.5.5 Reflection: IPv4 vs IPv6
    35. 9.6 Domain Name System (DNS)

    36. Video 9.6.1 Domain Name System (DNS)
    37. Check for Understanding 9.6.2 Domain Name System
    38. Connection 9.6.3 How Does DNS Work?
    39. Free Response 9.6.4 How Does DNS Work?
    40. 9.7 Routing

    41. Video 9.7.1 Routing
    42. Check for Understanding 9.7.2 Routing
    43. Free Response 9.7.3 Redundancy
    44. 9.8 Packets & Protocols

    45. Video 9.8.1 Packets
    46. Check for Understanding 9.8.2 Packets
    47. Video 9.8.3 Protocols
    48. Check for Understanding 9.8.4 Protocols
    49. Connection 9.8.5 How the Internet Works
    50. Free Response 9.8.6 The Journey of an Image
    51. 9.9 Viewing a Webpage

    52. Video 9.9.1 Viewing a Webpage
    53. Check for Understanding 9.9.2 Viewing a Webpage
    54. Free Response 9.9.3 Explaining a URL
    55. Connection 9.9.4 Net Neutrality Explained
    56. Connection 9.9.5 FCCs Net Neutrality Rules Officially Repealed
    57. Free Response 9.9.6 Take a Side on Net Neutrality
    58. Connection 9.9.7 Net Neutrality and Cybersecurity
    59. Free Response 9.9.8 Net Neutrality and Cybersecurity Research
    60. 9.10 Impact of the Internet

    61. Video 9.10.1 Impact of the Internet
    62. Check for Understanding 9.10.2 Impact of the Internet
    63. Connection 9.10.3 What is the Digital Divide?
    64. Free Response 9.10.4 What is the Digital Divide?
    65. 9.11 Networking Fundamentals Quiz

    66. Survey 9.11.1 Mindsets
    67. Unit Quiz 9.11.2 Networking Fundamentals Quiz
  10. IT Infrastructure

    1. 10.1 Internal Components

    2. Video 10.1.1 Internal Components
    3. Check for Understanding 10.1.2 Internal Components
    4. Connection 10.1.3 Build a Computer
    5. Free Response 10.1.4 Build a Computer
    6. Example 10.1.5 Test Your Brain's RAM!
    7. Free Response 10.1.6 Test Your Brain's RAM! Reflection
    8. 10.2 Peripheral Devices

    9. Video 10.2.1 Peripheral Devices
    10. Check for Understanding 10.2.2 Peripheral Devices
    11. Free Response 10.2.3 Personalized Peripherals
    12. Free Response 10.2.4 IT Help
    13. Free Response 10.2.5 Your Ideal Computer Setup
    14. 10.3 Network Devices

    15. Video 10.3.1 Network Devices
    16. Check for Understanding 10.3.2 Network Devices
    17. Connection 10.3.3 Speed Test
    18. Free Response 10.3.4 Speed Test
    19. Connection 10.3.5 Fiber Optics Bend Light!
    20. Free Response 10.3.6 Fiber Optics Bend Light!
    21. Connection 10.3.7 Ethernet Standards
    22. Free Response 10.3.8 Ethernet Standards
    23. Free Response 10.3.9 Network Troubleshooting
    24. 10.4 Storage Options

    25. Video 10.4.1 Storage Options
    26. Check for Understanding 10.4.2 Storage Options Quiz
    27. Connection 10.4.3 Security of Cloud Storage
    28. Free Response 10.4.4 Security of Cloud Storage
    29. Free Response 10.4.5 Storage Suggestions
    30. 10.5 Network Options

    31. Video 10.5.1 Network Options
    32. Check for Understanding 10.5.2 Network Options Quiz
    33. Connection 10.5.3 What is an SSID?
    34. Free Response 10.5.4 What is an SSID?
    35. Free Response 10.5.5 Wireless Network Setup
    36. 10.6 Network Communication

    37. Video 10.6.1 Network Communication
    38. Check for Understanding 10.6.2 Network Communication Quiz
    39. Example 10.6.3 Setting up a Firewall
    40. Free Response 10.6.4 iptables
    41. Notes 10.6.5 iptables simulation
    42. 10.7 Network Management

    43. Notes 10.7.1 Linux/MacOS vs. Windows
    44. Video 10.7.2 Network Management
    45. Check for Understanding 10.7.3 Network Management Quiz
    46. Example 10.7.4 MacOS Terminal Simulation
    47. Example 10.7.5 Windows Command Prompt Simulation
    48. Video 10.7.6 Windows Command Prompt Spy
    49. Free Response 10.7.7 Windows Command Prompt Spy
    50. Notes 10.7.8 SSH Logs
    51. Example 10.7.9 SSH Logs
    52. Free Response 10.7.10 SSH Logs Submission
    53. 10.8 IT Infrastructure Quiz

    54. Unit Quiz 10.8.1 IT Infrastructure Quiz
  11. Project: Troubleshooting

    1. 11.1 Methodology

    2. Notes 11.1.1 Troubleshooting Methodology
    3. Free Response 11.1.2 Identify the Problem
    4. Free Response 11.1.3 Research Solutions
    5. Free Response 11.1.4 Establish a Theory
    6. Free Response 11.1.5 Test the Theory
    7. Free Response 11.1.6 Fix the Problem!
    8. 11.2 Support Practice

    9. Exercise 11.2.1 Signal Strength
    10. Exercise 11.2.2 Interference
  12. Project: IT Professional

    1. 12.1 Communication is Key!

    2. Notes 12.1.1 IT Professional
    3. Free Response 12.1.2 Cybersecurity Careers
    4. Connection 12.1.3 Customer Service Skills
    5. Free Response 12.1.4 Customer Service Skills
    6. Free Response 12.1.5 Act it Out!
    7. 12.2 Building a Knowledge Base

    8. Connection 12.2.1 What is a Knowledge Base?
    9. Free Response 12.2.2 Draft a KB Article
    10. Free Response 12.2.3 Share your KB Article
    11. Free Response 12.2.4 Finalize your KB Article
    12. 12.3 Star in a Video!

    13. Connection 12.3.1 Instructional Videos
    14. Free Response 12.3.2 Instructional Video Plan
    15. Free Response 12.3.3 Write the Script
    16. Free Response 12.3.4 Create the Storyboard
    17. Free Response 12.3.5 Record Your Video
  13. Risk Management

    1. 13.1 Identifying Risks

    2. Video 13.1.1 Identifying Risks
    3. Check for Understanding 13.1.2 Identifying Risks Quiz
    4. Connection 13.1.3 What is a Honeypot?
    5. Connection 13.1.4 Honeypot Attacks
    6. Free Response 13.1.5 Honeypot Attacks
    7. Connection 13.1.6 Whois
    8. Free Response 13.1.7 Whois
    9. Connection 13.1.8 Packet Sniffing
    10. Free Response 13.1.9 Packet Sniffing Response
    11. Free Response 13.1.10 Breach Trends
    12. 13.2 Assessing Risks

    13. Notes 13.2.1 Assessing Risks
    14. Free Response 13.2.2 Malware Risk Assessment
    15. Free Response 13.2.3 Poor Password Assessment
    16. Free Response 13.2.4 Social Engineering Assessment
    17. Video 13.2.5 Assessing Risks
    18. Check for Understanding 13.2.6 Assessing Risks Quiz
    19. Connection 13.2.7 End-of-Life OS
    20. Free Response 13.2.8 End-of-Life Proposal
    21. Example 13.2.9 Input Handling
    22. Free Response 13.2.10 Input Handling Responses
    23. Example 13.2.11 Input Validation
    24. Free Response 13.2.12 Input Validation Responses
    25. Connection 13.2.13 The OSI Model and Network Attacks
    26. Free Response 13.2.14 The OSI Model and Network Attacks Response
    27. 13.3 Risk Response

    28. Video 13.3.1 Risk Response
    29. Check for Understanding 13.3.2 Risk Response
    30. Free Response 13.3.3 Defense in Depth Risk Mitigation
    31. Connection 13.3.4 Sample Risk Assessment Report
    32. Free Response 13.3.5 Sample Risk Assessment Reflection
    33. Connection 13.3.6 Delta Outage Video
    34. Free Response 13.3.7 Delta Outage Reflection
    35. Connection 13.3.8 What Happens When Your Servers Go Down
    36. Free Response 13.3.9 What Happens When Your Servers Go Down Reflection
    37. Free Response 13.3.10 Server Upgrade Memo
    38. 13.4 Penetration Testing

    39. Video 13.4.1 Penetration Testing
    40. Check for Understanding 13.4.2 Penetration Testing
    41. Connection 13.4.3 Penetration Test Report
    42. Free Response 13.4.4 Penetration Test Report
    43. Notes 13.4.5 Chaos Engineering
    44. Free Response 13.4.6 Chaos Engineering Reflection
    45. Resource 13.4.7 Pen Test Simulation Handout
    46. Exercise 13.4.8 Pen Test Simulation: Active Recon
    47. Exercise 13.4.9 Pen Test Simulation: Exploit Vulnerabilities
    48. 13.5 Risk Management Quiz

    49. Unit Quiz 13.5.1 Risk Management Quiz
  14. Final Exam

    1. 14.1 Final Exam

    2. Final 14.1.1 Final Exam
  15. Introduction to Cybersecurity Pretest

    1. 15.1 Introduction to Cybersecurity Pretest

    2. Notes 15.1.1 About the Pretest
    3. Survey 15.1.2 Mindsets
    4. Quiz 15.1.3 Introduction to Cybersecurity Knowledge & Skills
  16. Introduction to Cybersecurity Posttest

    1. 16.1 Introduction to Cybersecurity Posttest

    2. Notes 16.1.1 About the Posttest
    3. Survey 16.1.2 Mindsets
    4. Quiz 16.1.3 Introduction to Cybersecurity Knowledge & Skills
  17. Project: Digital Forensics

    1. 17.1 Digital Forensics

    2. Video 17.1.1 Digital Forensics
    3. Connection 17.1.2 Student Success Story
    4. Free Response 17.1.3 Student Success Story Response
    5. 17.2 Forensic Case 1: Logs

    6. Notes 17.2.1 Network Logs
    7. Example 17.2.2 Network Log Evidence
    8. Free Response 17.2.3 Network Logs Conclusion
    9. 17.3 Forensic Case 2: File Metadata

    10. Notes 17.3.1 File Metadata
    11. Example 17.3.2 File Metadata Evidence
    12. Free Response 17.3.3 File Metadata Conclusion
    13. 17.4 Forensic Case 3: Exif Data

    14. Notes 17.4.1 Photo Exif
    15. Connection 17.4.2 Exif Using Inspector
    16. Example 17.4.3 Exif Using the CLI
    17. Free Response 17.4.4 Photo Exif Conclusion
  18. Cryptocurrency

    1. 18.1 What is Currency?

    2. Video 18.1.1 What is Currency?
    3. Check for Understanding 18.1.2 What is Currency?
    4. Connection 18.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 18.1.4 What Gives Money Its Value
    6. Resource 18.1.5 Money: What is it Good For?
    7. 18.2 What is Cryptocurrency?

    8. Video 18.2.1 Cryptocurrency Basics
    9. Check for Understanding 18.2.2 Cryptocurrency Basics
    10. Video 18.2.3 Cryptocurrency Module Overview
    11. Connection 18.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 18.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 18.2.6 Show Me the Money
    14. Free Response 18.2.7 American Currency Exhibit
    15. 18.3 Intro to Blockchain

    16. Video 18.3.1 Intro to Blockchain
    17. Check for Understanding 18.3.2 Intro to Blockchain
    18. Connection 18.3.3 CryptoKitties
    19. Free Response 18.3.4 CryptoKitties
    20. 18.4 Hashing

    21. Video 18.4.1 Hashing
    22. Check for Understanding 18.4.2 Hashing
    23. Connection 18.4.3 SHA256 Hash Generator
    24. Free Response 18.4.4 Using the SHA256 Hash Generator
    25. 18.5 Proof of Work

    26. Video 18.5.1 Proof of Work
    27. Check for Understanding 18.5.2 Proof of Work
    28. Video 18.5.3 Mining the Block
    29. Check for Understanding 18.5.4 Mining the Block
    30. Connection 18.5.5 PoW vs. Proof of Stake
    31. Free Response 18.5.6 PoW vs. PoS
    32. Resource 18.5.7 Checking Proof of Work
    33. 18.6 Advanced Blockchain

    34. Video 18.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 18.6.2 Advanced Blockchain (part 1)
    36. Connection 18.6.3 Blockchain Buzz
    37. Free Response 18.6.4 Blockchain Buzz
    38. Video 18.6.5 Advanced Blockchain (part 2)
    39. Free Response 18.6.6 Advanced Blockchain (part 2)
    40. Resource 18.6.7 Make a Blockchain
    41. Connection 18.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 18.7 Cryptocurrencies

    43. Video 18.7.1 Cryptocurrencies
    44. Check for Understanding 18.7.2 Cryptocurrencies
    45. Free Response 18.7.3 Shiny Toy Phenomenon
    46. Connection 18.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 18.7.5 Walmart Use of Blockchain
    48. 18.8 Bitcoin

    49. Video 18.8.1 Bitcoin
    50. Check for Understanding 18.8.2 Bitcoin
    51. Connection 18.8.3 51% Attack Explained
    52. Free Response 18.8.4 51% Attack
    53. Connection 18.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 18.8.6 Bitcoin Bust
    55. Resource 18.8.7 Explore the Bitcoin Blockchain
    56. 18.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 18.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 18.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 18.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 18.9.4 Cryptocurrency Pros and Cons
    61. Free Response 18.9.5 Crypto Pros and Cons
    62. Connection 18.9.6 What is HODL?
    63. Free Response 18.9.7 What is HODL?
    64. Free Response 18.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 18.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 18.10.1 Overview
    67. Free Response 18.10.2 Preview Sample Expert Panels
    68. Free Response 18.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 18.10.4 Write an Outline and Rehearse
    70. Free Response 18.10.5 Expert Panel Talk (Presentation)
    71. 18.11 Cryptocurrency Quiz

    72. Unit Quiz 18.11.1 Cryptocurrency Quiz
    73. Badge 18.11.2 Cryptocurrency Badge
  19. Final Course Project

    1. 19.1 Final Course Project

    2. Notes 19.1.1 Choose Your Own Adventure
    3. Free Response 19.1.2 Choose Your Adventure
    4. Free Response 19.1.3 Research
    5. Free Response 19.1.4 Choose Your Target Audience
    6. Free Response 19.1.5 Draft Your Presentation
    7. Free Response 19.1.6 Draft Your Flyer
    8. Free Response 19.1.7 Make Your Presentation with Handout!
  20. SQL Part II: The SQL

    1. 20.1 More Filtering Practice

    2. Exercise 20.1.1 Initials
    3. Exercise 20.1.2 Compound Queries with BETWEEN
    4. Exercise 20.1.3 Gryffindors With G Names
    5. Exercise 20.1.4 R First Names
    6. Exercise 20.1.5 FF Houses
    7. 20.2 Ordering Results

    8. Video 20.2.1 The ORDER BY Keyword
    9. Notes 20.2.2 ORDER BY
    10. Example 20.2.3 ORDER BY First Name
    11. Example 20.2.4 Reverse Order
    12. Example 20.2.5 Order By Multiple Fields
    13. Exercise 20.2.6 House Ordering
    14. Exercise 20.2.7 Sort the P Names
    15. 20.3 Renaming Fields

    16. Notes 20.3.1 Renaming Fields with AS
    17. Example 20.3.2 Renaming in the House Table
    18. Exercise 20.3.3 Changing Column Names
    19. 20.4 Joining Tables

    20. Video 20.4.1 The JOIN command
    21. Notes 20.4.2 Basic Joining
    22. Example 20.4.3 Letters and Numbers
    23. Example 20.4.4 Person and House
    24. Example 20.4.5 Person and House (Correct)
    25. Example 20.4.6 Person and House (with namespacing)
    26. Exercise 20.4.7 List All Gryffindors
    27. Video 20.4.8 JOIN With Yourself
    28. Notes 20.4.9 Renaming Tables
    29. Example 20.4.10 Quidditch Matchups
    30. Exercise 20.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 20.5 More Joining Tables

    32. Example 20.5.1 The Course Table
    33. Exercise 20.5.2 Courses and Professors
    34. Exercise 20.5.3 Courses, Professors, and Houses
    35. Exercise 20.5.4 Courses Taught By Gryffindors
    36. Example 20.5.5 The Enrollment Table
    37. Exercise 20.5.6 Students Taking Potions
    38. Exercise 20.5.7 Non-Slytherins Taking Potions
    39. Exercise 20.5.8 Defense Students by House
    40. Exercise 20.5.9 Neville's Courses
  21. Web Development

    1. 21.1 Introduction to HTML

    2. Video 21.1.1 Introduction to HTML
    3. Check for Understanding 21.1.2 Introduction to HTML Quiz
    4. Example 21.1.3 Our First HTML Page
    5. Exercise 21.1.4 Say Hello!
    6. 21.2 Structure of an HTML Page

    7. Video 21.2.1 Structure of an HTML Page
    8. Check for Understanding 21.2.2 Structure of an HTML Page Quiz
    9. Example 21.2.3 HTML Template
    10. Example 21.2.4 Hello World Page
    11. Exercise 21.2.5 The <title> Tag
    12. Exercise 21.2.6 Your First HTML Page
    13. Badge 21.2.7 Structure Badge
    14. 21.3 Formatting Text

    15. Video 21.3.1 Formatting Text
    16. Check for Understanding 21.3.2 Formatting Text Quiz
    17. Example 21.3.3 Dictionary
    18. Exercise 21.3.4 That's Bold
    19. Exercise 21.3.5 Artificial Intelligence
    20. Exercise 21.3.6 State Capitals
    21. 21.4 Links

    22. Video 21.4.1 Links
    23. Check for Understanding 21.4.2 Links Quiz
    24. Example 21.4.3 The <a> Tag
    25. Exercise 21.4.4 Simple Link
    26. Exercise 21.4.5 My Favorite Websites
    27. 21.5 Images

    28. Video 21.5.1 Images
    29. Check for Understanding 21.5.2 Images Quiz
    30. Example 21.5.3 The <img> Tag
    31. Example 21.5.4 Building the CodeHS Homepage
    32. Exercise 21.5.5 Collage on a Theme
    33. Exercise 21.5.6 Linking an Image
    34. Exercise 21.5.7 Personal Library
    35. Badge 21.5.8 Images Badge
    36. 21.6 HTML Lists

    37. Video 21.6.1 HTML Lists
    38. Check for Understanding 21.6.2 HTML Lists Quiz
    39. Example 21.6.3 Grocery Shopping
    40. Exercise 21.6.4 Favorite Things
    41. Exercise 21.6.5 To-Do List
    42. Exercise 21.6.6 List Article
    43. 21.7 HTML Tables

    44. Video 21.7.1 HTML Tables
    45. Check for Understanding 21.7.2 HTML Tables Quiz
    46. Example 21.7.3 Address Book
    47. Exercise 21.7.4 Favorite Songs
    48. Exercise 21.7.5 Calendar
    49. 21.8 HTML Styling

    50. Video 21.8.1 HTML Styling
    51. Check for Understanding 21.8.2 HTML Styling Quiz
    52. Example 21.8.3 Stylish Address Book
    53. Exercise 21.8.4 Background Colors
    54. Exercise 21.8.5 Style Your To-Do List
    55. 21.9 Introduction to CSS

    56. Video 21.9.1 Introduction to CSS
    57. Check for Understanding 21.9.2 Introduction to CSS Quiz
    58. Example 21.9.3 Styling Your H1s
    59. Exercise 21.9.4 First Style with CSS
    60. Exercise 21.9.5 List Styling
    61. 21.10 CSS Select by Tag

    62. Video 21.10.1 CSS Select by Tag
    63. Check for Understanding 21.10.2 CSS Select by Tag Quiz
    64. Example 21.10.3 Rainbow
    65. Example 21.10.4 Dog Styling
    66. Exercise 21.10.5 Restaurant Menu
    67. Exercise 21.10.6 Put Karel Together
    68. 21.11 CSS Select by Class

    69. Video 21.11.1 CSS Select by Class
    70. Check for Understanding 21.11.2 CSS Select by Class Quiz
    71. Example 21.11.3 Simple Checkerboard
    72. Exercise 21.11.4 Tic Tac Toe
    73. Exercise 21.11.5 Music Library
    74. 21.12 CSS Select by ID

    75. Video 21.12.1 CSS Select by ID
    76. Check for Understanding 21.12.2 CSS Select by ID Quiz
    77. Example 21.12.3 Logo
    78. Exercise 21.12.4 Favorite Dog
    79. Exercise 21.12.5 Bingo
    80. Badge 21.12.6 CSS Badge
    81. 21.13 Viewing Websites

    82. Video 21.13.1 Viewing Websites
    83. Check for Understanding 21.13.2 Viewing Websites Quiz
    84. Free Response 21.13.3 Explaining a URL
    85. 21.14 Web Development Quiz

    86. Unit Quiz 21.14.1 Web Development Quiz
    87. 21.15 Your First Website

    88. Challenge 21.15.1 Set Up Your codehs.me Website
    89. Challenge 21.15.2 Practice PT: Your First Website
    90. Badge 21.15.3 Website Badge
  22. Midterm

    1. 22.1 Midterm

    2. Midterm 22.1.1 Midterm
  23. Extra

    1. 23.1 Lesson 1

    2. Example 23.1.1 Compound Queries
  24. Cybersecurity Level 1 Certification Practice

    1. 24.1 Practice #1: Programming and Software Security

    2. Quiz 24.1.1 Quiz: Programming and Software Security
    3. Notes 24.1.2 Practice #1 Reflection
    4. 24.2 Practice #2: IT Infrastructure + Networks

    5. Quiz 24.2.1 Quiz: IT Infrastructure and Networks
    6. Notes 24.2.2 Practice #2 Reflection
    7. 24.3 Practice #3: Digital Citizenship + Cybersecurity

    8. Quiz 24.3.1 Quiz: Digital Citizenship + Cybersecurity
    9. Notes 24.3.2 Practice #3 Reflection
    10. 24.4 Practice #4: System Admin and Cryptography

    11. Quiz 24.4.1 Quiz: System Admin and Cryptography
    12. Notes 24.4.2 Practice #4 Reflection
    13. 24.5 Mixed Practice Test

    14. Notes 24.5.1 Important Note
    15. Quiz 24.5.2 Mixed Practice
    16. Notes 24.5.3 Mixed Practice Reflection