Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
What is Cybersecurity?
1.1 Module Overview - Cybersecurity Lesson
1.1.1 Welcome to Cybersecurity 1 Video
1.1.2 Welcome to Cybersecurity 2 Check for Understanding
1.1.3 Intruder Alert! 1 Example
1.1.4 Cybersecurity and You 5 Free Response
1.1.5 Course Goals 5 Free Response
1.2 What is Cybersecurity? Lesson
1.2.1 What is Cybersecurity? 1 Video
1.2.2 What is Cybersecurity? 3 Check for Understanding
1.2.3 City Services Ransomware 1 Connection
1.2.4 Ransomware Reflection 5 Free Response
1.2.5 Ransomware Simulator 1 Example
1.2.6 Internet of Things 1 Connection
1.2.7 Hackers vs. Smart Homes 1 Connection
1.2.8 Internet of Things Reflection 5 Free Response
1.3 Impact of Cybersecurity Lesson
1.3.1 Impact of Cybersecurity 1 Video
1.3.2 Impact of Cybersecurity 2 Check for Understanding
1.3.3 Phishing Simulator 1 Example
1.3.4 Phishing for Your Info 1 Connection
1.3.5 Phishing Reflection 5 Free Response
1.3.6 Cyber Game 1 Connection
1.3.7 Cyber Game Reflection 5 Free Response
1.3.8 Cyber Crime Time 1 Connection
1.3.9 Cyber Crime Time Reflection 5 Free Response
1.4 The CIA Triad Lesson
1.4.1 CIA Triad 1 Video
1.4.2 CIA Triad 2 Check for Understanding
1.4.3 Which part of the CIA Triad? 5 Free Response
1.4.4 Which part of the CIA Triad? 5 Free Response
1.4.5 Breach of Confidentiality 5 Free Response
1.4.6 Breach of Availability 5 Free Response
1.4.7 CIA Connections 5 Free Response
1.5 What is Cybersecurity? Quiz Lesson
1.5.1 What is Cybersecurity? Quiz 15 Unit Quiz
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation Lesson
2.1.1 Digital Footprint and Reputation 1 Video
2.1.2 Digital Footprint and Reputation 3 Check for Understanding
2.1.3 Social Media Clean-up 1 Example
2.1.4 Building a Positive Digital Footprint 5 Free Response
2.1.5 Right to be Forgotten? 1 Connection
2.1.6 Right to be Forgotten 5 Free Response
2.1.7 What is your Digital Footprint? 5 Free Response
2.2 Cyberbullying Lesson
2.2.1 Cyberbullying 1 Video
2.2.2 Cyberbullying 3 Check for Understanding
2.2.3 Scenario: Student Ranking 5 Free Response
2.2.4 Scenario: Singled Out 5 Free Response
2.2.5 Stopping Cyberbullying 5 Free Response
2.3 Internet Safety Lesson
2.3.1 Internet Safety 1 Video
2.3.2 Internet Safety 2 Check for Understanding
2.3.3 Scenario: School Stranger 5 Free Response
2.3.4 Scenario: Vacation Pals 5 Free Response
2.3.5 Staying Safe 5 Free Response
2.4 Privacy & Security Lesson
2.4.1 What is Data Privacy & Security? 1 Video
2.4.2 Privacy & Security Quiz 2 Check for Understanding
2.4.3 Google Privacy Policy Search 1 Connection
2.4.4 Google Privacy Policy Search 5 Free Response
2.4.5 Guess: Password List 1 Example
2.4.6 Guess: Using an Algorithm 1 Example
2.4.7 Guess: Brute Force 1 Example
2.4.8 How Strong is your Password? 1 Connection
2.4.9 How Strong is your password? 5 Free Response
2.4.10 You Can Be Tracked! 1 Example
2.5 Information Literacy Lesson
2.5.1 Information Literacy 1 Video
2.5.2 Information Literacy 2 Check for Understanding
2.5.3 Effective Internet Searches 5 Free Response
2.5.4 Evaluate the Source 1 1 Connection
2.5.5 Respond: Evaluate the Source 1 5 Free Response
2.5.6 Evaluate the Source 2 1 Notes
2.5.7 Respond: Evaluate the Source 2 5 Free Response
2.5.8 Hero Pig? 1 Connection
2.5.9 Respond: Hero Pig? 5 Free Response
2.6 Creative Credit & Copyright Lesson
2.6.1 Creative Credit and Copyright 1 Video
2.6.2 Creative Credit and Copyright 2 Check for Understanding
2.6.3 Cite! 5 Free Response
2.6.4 Exploring Creative Commons 1 Connection
2.6.5 Respond: Creative Commons 5 Free Response
2.6.6 Task: Finding Images 5 Free Response
2.6.7 Reflection: Why is Copyright Important? 5 Free Response
2.7 Hacking Ethics Lesson
2.7.1 Hacking Ethics & Legality 1 Video
2.7.2 Hacking Ethics & Legality 3 Check for Understanding
2.7.3 Penetration Testing 1 Connection
2.7.4 Reflection: Penetration Testing 5 Free Response
2.7.5 Hack the Pentagon? 1 Connection
2.7.6 Reflection: Hack the Pentagon 5 Free Response
2.7.7 Ethical Hacker Agreement 1 Check for Understanding
2.8 Digital Citizenship and Cybersecurity Quiz Lesson
2.8.1 Digital Citizenship and Cyber Hygiene Quiz 20 Unit Quiz
Project: Public Service Announcement
3.1 Project: Public Service Announcement Lesson
3.1.1 Pick a Topic 5 Free Response
3.1.2 Research 5 Free Response
3.1.3 Choose Your Audience 5 Free Response
3.1.4 What kind of PSA? 5 Free Response
3.1.5 Draft your PSA 5 Free Response
3.1.6 Finalize your PSA! 15 Free Response
System Administration
4.1 Operating Systems Lesson
4.1.1 Operating Systems 1 Video
4.1.2 Operating Systems Quiz 5 Check for Understanding
4.1.3 Detect My OS 1 Example
4.1.4 Windows OS Installation Simulation 1 Example
4.1.5 Upgrading a Mac OS 1 Connection
4.1.6 Installing an OS 5 Free Response
4.1.7 What is Virtualization? 1 Connection
4.1.8 Virtualization Response 5 Free Response
4.2 Comparing Operating Systems Lesson
4.2.1 Comparing Operating Systems 1 Video
4.2.2 Comparing Operating Systems Quiz 5 Check for Understanding
4.2.3 Windows Simulation 1 Example
4.2.4 MacOS Simulation 1 Example
4.2.5 Choose a Linux Distro! 1 Connection
4.2.6 Which would you choose? 5 Free Response
4.3 Compatibility Lesson
4.3.1 Compatibility 1 Video
4.3.2 Compatibility Quiz 3 Check for Understanding
4.3.3 What Processor? Windows 1 Example
4.3.4 What Processor? Mac 1 Example
4.3.5 What Processor are you running? 5 Free Response
4.4 Software and Applications Lesson
4.4.1 Software and Applications 1 Video
4.4.2 Software and Applications Quiz 2 Check for Understanding
4.4.3 Spreadsheet Simulation 1 Example
4.4.4 Messaging Simulation 1 Example
4.4.5 Kanban Board Simulation 1 Example
4.4.6 Software Simulations 5 Free Response
4.5 Software Licenses Lesson
4.5.1 Software Licenses 1 Video
4.5.2 Software Licenses Quiz 3 Check for Understanding
4.5.3 Do I need a Software License? 5 Free Response
4.5.4 Is This Original? 5 Free Response
4.6 Application Security Lesson
4.6.1 Application Security 1 Video
4.6.2 Application Security 5 Check for Understanding
4.6.3 Windows Updates 1 Example
4.6.4 Windows Defender Antivirus 1 Connection
4.6.5 Windows Defender Antivirus 5 Free Response
4.6.6 CodeHS System Restore 5 Free Response
4.7 Browser Configuration Lesson
4.7.1 Browser Configuration 1 Video
4.7.2 Browser Configuration 5 Check for Understanding
4.7.3 Cached CodeHS 1 Connection
4.7.4 Cached CodeHS 5 Free Response
4.7.5 Is Your Popup Blocker On? 1 Example
4.7.6 Browser Extensions Lab 5 Free Response
4.8 System Administration Lesson
4.8.1 User Accounts 1 Video
4.8.2 User Accounts Quiz 2 Check for Understanding
4.8.3 User Accounts 5 Free Response
4.8.4 Shared Folders and Files 5 Free Response
4.8.5 Host Security 1 Video
4.8.6 Host Security Quiz 3 Check for Understanding
4.8.7 Security Baseline 5 Free Response
4.9 Command Line Interface Lesson
4.9.1 Linux/MacOS vs. Windows 1 Notes
4.9.2 Command Line Interface 1 Video
4.9.3 Command Line Interface Quiz 5 Check for Understanding
4.9.4 Command Equivalents 1 Resource
4.9.5 Windows Command Prompt 1 Video
4.9.6 Windows Command Prompt 5 Free Response
4.9.7 Directory Directions 5 Free Response
4.9.8 Neural Interface? 1 Connection
4.9.9 Neural Interface? 5 Free Response
4.10 Mobile Devices Lesson
4.10.1 Mobile Devices 1 Video
4.10.2 Mobile Devices Quiz 5 Check for Understanding
4.10.3 How Apple FaceID Works 1 Connection
4.10.4 How Apple FaceID Works Response 5 Free Response
4.10.5 Biometric Data Debate 5 Free Response
4.10.6 BYOD and MDM Concept Map 1 Connection
4.10.7 BYOD and MDM Conclusions 5 Free Response
4.11 System Administration Quiz Lesson
4.11.1 Mindsets 1 Survey
4.11.2 System Administration Quiz 20 Unit Quiz
Software Security
5.1 Programming Concepts Lesson
5.1.1 Programming Concepts 1 Video
5.1.2 Programming Concepts Quiz 5 Check for Understanding
5.1.3 Compilers vs. Interpreters 1 Connection
5.1.4 Compilers vs. Interpreters 5 Free Response
5.1.5 Variables in Action 1 Example
5.1.6 Data Types using Typeof 1 Example
5.1.7 Basic Variables 1 Example
5.1.8 Daily Activities 5 Exercise
5.2 Inside Web Apps Lesson
5.2.1 Inside Web Apps 1 Video
5.2.2 Inside Web Apps 2 Check for Understanding
5.2.3 Using View Page Source 5 Free Response
5.2.4 Recreate a Webpage? 1 Example
5.2.5 Getting Started with OWASP 1 Connection
5.2.6 Getting Started with OWASP 5 Free Response
5.3 Developer Tools Lesson
5.3.1 Developer Tools 1 Video
5.3.2 Developer Tools 3 Check for Understanding
5.3.3 Using the Developer Tools 5 Free Response
5.3.4 Console Secrets 5 Exercise
5.3.5 Local Storage 1 Example
5.3.6 The Top Cybersecurity Blogs and Websites 1 Connection
5.3.7 Selecting a Site to Follow 5 Free Response
5.4 The Value of Data Lesson
5.4.1 The Value of Data 1 Video
5.4.2 The Value of Data Quiz 5 Check for Understanding
5.4.3 Exploring Data Visualizations 1 Notes
5.4.4 US Recorded Music Revenue 1 Connection
5.4.5 National Parks 1 Connection
5.4.6 March Madness 1 Connection
5.4.7 Captain Marvel 1 Connection
5.4.8 Respond: Visualizations 5 Free Response
5.4.9 Free Response: Choosing a Visualization 5 Free Response
5.4.10 Reflection: Design a Survey 5 Free Response
5.5 Databases Lesson
5.5.1 Databases 1 Video
5.5.2 Databases 1 Check for Understanding
5.5.3 Database Administrator Career 1 Connection
5.5.4 Database Administrator Career 5 Free Response
5.5.5 Parts of a Database 1 Video
5.5.6 Parts of a Database 1 Check for Understanding
5.5.7 SQL Database Diagram 1 Connection
5.5.8 SQL Database Diagram 5 Free Response
5.5.9 Schema Brainstorm 5 Free Response
5.6 Clients and Servers Lesson
5.6.1 Clients and Servers 1 Video
5.6.2 Clients and Servers 2 Check for Understanding
5.6.3 Inside a Google Data Center 1 Connection
5.6.4 Inside a Google Data Center 5 Free Response
5.6.5 Cloud Vulnerabilities 1 Connection
5.6.6 Cloud Vulnerabilities Response 5 Free Response
5.6.7 Client-Server Model 1 Video
5.6.8 Client-Server Model 2 Check for Understanding
5.6.9 The Future of User Privacy 1 Connection
5.6.10 The Future of User Privacy 5 Free Response
5.7 What is SQL? Lesson
5.7.1 What is SQL Overview 1 Notes
5.7.2 Intro to SQL 1 Video
5.7.3 Quiz: What is SQL? 1 Check for Understanding
5.7.4 How to Structure Data in SQL 1 Video
5.7.5 How to Structure Data in SQL 3 Check for Understanding
5.7.6 SQL Tables 1 Example
5.7.7 SQL Tables Response 5 Free Response
5.8 Basic Querying in SQL Lesson
5.8.1 The SELECT Statement 1 Video
5.8.2 Basic Querying in SQL 1 Check for Understanding
5.8.3 Our First SELECT Statement 1 Example
5.8.4 Your First SELECT Statement 5 Exercise
5.8.5 More SELECT Statement 1 Video
5.8.6 More SELECT Statement 1 Check for Understanding
5.8.7 Selecting Specific Columns 1 Example
5.8.8 Harry Potter Names 5 Exercise
5.9 Filtering Queries in SQL Lesson
5.9.1 The WHERE Clause 1 Video
5.9.2 Condition Operators 1 Check for Understanding
5.9.3 Ravenclaw House 1 Example
5.9.4 People in Gryffindor 1 Example
5.9.5 Filter By ID 1 Example
5.9.6 The Weasleys 5 Exercise
5.9.7 The Potters 5 Exercise
5.10 Common Security Problems Lesson
5.10.1 Common Security Problems 1 Video
5.10.2 Common Security Problems 1 Check for Understanding
5.10.3 Meet Security Engineers at Google 1 Connection
5.10.4 Security Engineering Reflection 5 Free Response
5.10.5 Living in a Digital World 1 Video
5.10.6 Living in a Digital World 5 Free Response
5.11 SQL Injection Overview Lesson
5.11.1 SQL Injection Overview 1 Video
5.11.2 SQL Injection Overview 2 Check for Understanding
5.11.3 Equifax Security Breach 1 Connection
5.11.4 Equifax Exposed Millions 1 Connection
5.11.5 Equifax SQL Injection Attack 5 Free Response
5.11.6 SQLi 1 Example
5.12 Types of SQLi and Prevention Lesson
5.12.1 Types of SQLi 1 Video
5.12.2 Types of SQLi 3 Check for Understanding
5.12.3 Preventing SQLi 1 Video
5.12.4 Preventing SQLi 2 Check for Understanding
5.12.5 Mitigating SQL Injection 1 Connection
5.12.6 Reflection: Mitigating SQL Injection 5 Free Response
5.12.7 SQL Injection Practice 1 Connection
5.13 Software Security Quiz Lesson
5.13.1 Software Security Quiz 15 Unit Quiz
Project: Security Assessment Report
6.1 Project: Security Assessment Report Lesson
6.1.1 Project Requirements 1 Notes
6.1.2 Supercar Showdown Website 1 Connection
6.1.3 SQL Injection Testing 5 Free Response
6.1.4 SQLi Testing Handout 1 Resource
6.1.5 Security Assessment Report 15 Free Response
6.1.6 Project Reflection 5 Free Response
Project: Put it in Writing!
7.1 Level 1: Entry Event Lesson
7.1.1 Company Development 5 Free Response
7.1.2 Level 1: Attack! 5 Free Response
7.1.3 Level 1: Project Overview 1 Video
7.1.4 Put It In Writing! Rubric 5 Connection
7.2 Level 2: User Training Lesson
7.2.1 User Training Policy Development 5 Free Response
7.2.2 Challenge: Employee Negligence 1 5 Free Response
7.2.3 Challenge: Employee Negligence 2 5 Free Response
7.2.4 Level 2 Debrief 5 Free Response
7.3 Level 3: Incident Response Lesson
7.3.1 Incident Response Plan Template 5 Connection
7.3.2 Incident Response Plan Link 5 Free Response
7.3.3 Challenge: Cyber Attack! 5 Free Response
7.3.4 Level 3 Debrief 5 Free Response
7.4 Level 4: Data and Licenses Lesson
7.4.1 Data and Licenses 5 Video
7.4.2 FTC Data Security Guide 5 Connection
7.4.3 Data Policy Template 5 Connection
7.4.4 Data Policy Link 5 Free Response
7.4.5 Challenge: Data Breach 1 5 Free Response
7.4.6 Challenge: Data Breach 2 5 Free Response
7.4.7 Challenge: Data Breach 3 5 Free Response
7.4.8 Level 4 Debrief 5 Free Response
7.5 Level 5: Change Management Lesson
7.5.1 Change Management 5 Video
7.5.2 Change Management Plan 5 Connection
7.5.3 Change Management Plan Link 5 Free Response
The ABCs of Cryptography
8.1 Cryptography, Cryptology, Cryptanalysis Lesson
8.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
8.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
8.1.3 Cryptogram Game! 1 Example
8.1.4 Why encrypt? 1 Video
8.1.5 Why encrypt? 2 Check for Understanding
8.1.6 Encrypt/Decrypt 1 Example
8.2 History of Cryptography Lesson
8.2.1 Cryptography: A Brief History 1 Video
8.2.2 Cryptography History Quiz 2 Check for Understanding
8.2.3 How the Enigma Worked 1 Connection
8.2.4 How the Enigma Worked 5 Free Response
8.2.5 Unknown Languages and the Future of Cryptography 1 Connection
8.2.6 The Future of Cybersecurity 5 Free Response
8.3 Basic Crypto Systems: Caesar Cipher Lesson
8.3.1 Caesar Cipher 1 Video
8.3.2 Caesar Cipher 2 Check for Understanding
8.3.3 Caesar Cipher Encryption 1 Example
8.3.4 Decrypt Caesar's Cipher! 1 Example
8.4 Basic Crypto Systems: Cracking Caesar Lesson
8.4.1 Cracking Caesar Cipher 1 Video
8.4.2 Cracking Caesar Cipher 2 Check for Understanding
8.4.3 Cracking Caesar with Brute Force 1 Example
8.4.4 Letter Frequency and Caesar 1 Example
8.4.5 Examining Caesar Cipher 5 Free Response
8.5 Basic Crypto Systems: Vigenere Cipher Lesson
8.5.1 Vigenere Cipher 1 Video
8.5.2 Vigenere Cipher 1 Check for Understanding
8.5.3 Vigenere Cipher Example 1 Example
8.5.4 Letter Frequency and Vigenere Cipher 1 Example
8.5.5 Examining Vigenere Cipher 5 Free Response
8.5.6 Improving Vigenere 1 Example
8.6 The ABCs of Cryptography Quiz Lesson
8.6.1 The ABCs of Cryptography Quiz 15 Unit Quiz
Networking Fundamentals
9.1 Introduction to the Internet Lesson
9.1.1 Welcome to the Internet 1 Video
9.1.2 Intro to the Internet 3 Check for Understanding
9.1.3 Inside Facebook's Connectivity Lab 1 Connection
9.1.4 Connectivity Lab Reflection 5 Free Response
9.2 Notational Systems Lesson
9.2.1 Number Systems 1 Video
9.2.2 Number Systems Quiz 2 Check for Understanding
9.2.3 Number Base Tool 1 Notes
9.2.4 Decimal to Binary 1 Video
9.2.5 Decimal to Binary Quiz 3 Check for Understanding
9.2.6 Binary Game 5 Exercise
9.3 Data Representation Lesson
9.3.1 Hexadecimal 1 Video
9.3.2 Hexadecimal Quiz 2 Check for Understanding
9.3.3 Binary to Hex Game 5 Exercise
9.3.4 Encoding Text with Binary 1 Video
9.3.5 Encoding Text with Binary Quiz 2 Check for Understanding
9.3.6 Custom Encoding 1 Example
9.3.7 Bits to ASCII 1 Example
9.3.8 Hello World in Bits 5 Exercise
9.4 Internet Hardware and Sending Information Lesson
9.4.1 Internet Hardware 1 Video
9.4.2 Internet Hardware 2 Check for Understanding
9.4.3 Sending Information 1 Video
9.4.4 Sending Information 3 Check for Understanding
9.4.5 The Internet is in the Ocean 1 Connection
9.4.6 Internet in the Ocean Reflection 5 Free Response
9.5 Internet Addresses Lesson
9.5.1 Internet Addresses 1 Video
9.5.2 Internet Addresses 2 Check for Understanding
9.5.3 The Need for Addresses 5 Free Response
9.5.4 IPv4 vs. IPv6 1 Connection
9.5.5 Reflection: IPv4 vs IPv6 5 Free Response
9.6 Domain Name System (DNS) Lesson
9.6.1 Domain Name System (DNS) 1 Video
9.6.2 Domain Name System 2 Check for Understanding
9.6.3 How Does DNS Work? 1 Connection
9.6.4 How Does DNS Work? 5 Free Response
9.7 Routing Lesson
9.7.1 Routing 1 Video
9.7.2 Routing 3 Check for Understanding
9.7.3 Redundancy 5 Free Response
9.8 Packets & Protocols Lesson
9.8.1 Packets 1 Video
9.8.2 Packets 2 Check for Understanding
9.8.3 Protocols 1 Video
9.8.4 Protocols 3 Check for Understanding
9.8.5 How the Internet Works 1 Connection
9.8.6 The Journey of an Image 5 Free Response
9.9 Viewing a Webpage Lesson
9.9.1 Viewing a Webpage 1 Video
9.9.2 Viewing a Webpage 2 Check for Understanding
9.9.3 Explaining a URL 5 Free Response
9.9.4 Net Neutrality Explained 1 Connection
9.9.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
9.9.6 Take a Side on Net Neutrality 5 Free Response
9.9.7 Net Neutrality and Cybersecurity 1 Connection
9.9.8 Net Neutrality and Cybersecurity Research 5 Free Response
9.10 Impact of the Internet Lesson
9.10.1 Impact of the Internet 1 Video
9.10.2 Impact of the Internet 3 Check for Understanding
9.10.3 What is the Digital Divide? 1 Connection
9.10.4 What is the Digital Divide? 5 Free Response
9.11 Networking Fundamentals Quiz Lesson
9.11.1 Mindsets 1 Survey
9.11.2 Networking Fundamentals Quiz 15 Unit Quiz
IT Infrastructure
10.1 Internal Components Lesson
10.1.1 Internal Components 1 Video
10.1.2 Internal Components 5 Check for Understanding
10.1.3 Build a Computer 1 Connection
10.1.4 Build a Computer 5 Free Response
10.1.5 Test Your Brain's RAM! 1 Example
10.1.6 Test Your Brain's RAM! Reflection 5 Free Response
10.2 Peripheral Devices Lesson
10.2.1 Peripheral Devices 1 Video
10.2.2 Peripheral Devices 5 Check for Understanding
10.2.3 Personalized Peripherals 5 Free Response
10.2.4 IT Help 5 Free Response
10.2.5 Your Ideal Computer Setup 5 Free Response
10.3 Network Devices Lesson
10.3.1 Network Devices 1 Video
10.3.2 Network Devices 5 Check for Understanding
10.3.3 Speed Test 1 Connection
10.3.4 Speed Test 5 Free Response
10.3.5 Fiber Optics Bend Light! 1 Connection
10.3.6 Fiber Optics Bend Light! 5 Free Response
10.3.7 Ethernet Standards 1 Connection
10.3.8 Ethernet Standards 5 Free Response
10.3.9 Network Troubleshooting 5 Free Response
10.4 Storage Options Lesson
10.4.1 Storage Options 1 Video
10.4.2 Storage Options Quiz 5 Check for Understanding
10.4.3 Security of Cloud Storage 1 Connection
10.4.4 Security of Cloud Storage 5 Free Response
10.4.5 Storage Suggestions 5 Free Response
10.5 Network Options Lesson
10.5.1 Network Options 1 Video
10.5.2 Network Options Quiz 5 Check for Understanding
10.5.3 What is an SSID? 1 Connection
10.5.4 What is an SSID? 5 Free Response
10.5.5 Wireless Network Setup 5 Free Response
10.6 Network Communication Lesson
10.6.1 Network Communication 1 Video
10.6.2 Network Communication Quiz 2 Check for Understanding
10.6.3 Setting up a Firewall 1 Example
10.6.4 iptables 5 Free Response
10.6.5 iptables simulation 1 Notes
10.7 Network Management Lesson
10.7.1 Linux/MacOS vs. Windows 1 Notes
10.7.2 Network Management 1 Video
10.7.3 Network Management Quiz 3 Check for Understanding
10.7.4 MacOS Terminal Simulation 1 Example
10.7.5 Windows Command Prompt Simulation 1 Example
10.7.6 Windows Command Prompt Spy 5 Video
10.7.7 Windows Command Prompt Spy 5 Free Response
10.7.8 SSH Logs 1 Notes
10.7.9 SSH Logs 1 Example
10.7.10 SSH Logs Submission 5 Free Response
10.8 IT Infrastructure Quiz Lesson
10.8.1 IT Infrastructure Quiz 20 Unit Quiz
Project: Troubleshooting
11.1 Methodology Lesson
11.1.1 Troubleshooting Methodology 1 Notes
11.1.2 Identify the Problem 5 Free Response
11.1.3 Research Solutions 5 Free Response
11.1.4 Establish a Theory 5 Free Response
11.1.5 Test the Theory 5 Free Response
11.1.6 Fix the Problem! 5 Free Response
11.2 Support Practice Lesson
11.2.1 Signal Strength 10 Exercise
11.2.2 Interference 10 Exercise
Project: IT Professional
12.1 Communication is Key! Lesson
12.1.1 IT Professional 5 Notes
12.1.2 Cybersecurity Careers 5 Free Response
12.1.3 Customer Service Skills 1 Connection
12.1.4 Customer Service Skills 5 Free Response
12.1.5 Act it Out! 15 Free Response
12.2 Building a Knowledge Base Lesson
12.2.1 What is a Knowledge Base? 1 Connection
12.2.2 Draft a KB Article 5 Free Response
12.2.3 Share your KB Article 5 Free Response
12.2.4 Finalize your KB Article 15 Free Response
12.3 Star in a Video! Lesson
12.3.1 Instructional Videos 1 Connection
12.3.2 Instructional Video Plan 5 Free Response
12.3.3 Write the Script 5 Free Response
12.3.4 Create the Storyboard 5 Free Response
12.3.5 Record Your Video 5 Free Response
Risk Management
13.1 Identifying Risks Lesson
13.1.1 Identifying Risks 1 Video
13.1.2 Identifying Risks Quiz 5 Check for Understanding
13.1.3 What is a Honeypot? 1 Connection
13.1.4 Honeypot Attacks 1 Connection
13.1.5 Honeypot Attacks 5 Free Response
13.1.6 Whois 1 Connection
13.1.7 Whois 5 Free Response
13.1.8 Packet Sniffing 1 Connection
13.1.9 Packet Sniffing Response 5 Free Response
13.1.10 Breach Trends 5 Free Response
13.2 Assessing Risks Lesson
13.2.1 Assessing Risks 1 Notes
13.2.2 Malware Risk Assessment 5 Free Response
13.2.3 Poor Password Assessment 5 Free Response
13.2.4 Social Engineering Assessment 5 Free Response
13.2.5 Assessing Risks 1 Video
13.2.6 Assessing Risks Quiz 5 Check for Understanding
13.2.7 End-of-Life OS 1 Connection
13.2.8 End-of-Life Proposal 5 Free Response
13.2.9 Input Handling 1 Example
13.2.10 Input Handling Responses 5 Free Response
13.2.11 Input Validation 1 Example
13.2.12 Input Validation Responses 5 Free Response
13.2.13 The OSI Model and Network Attacks 1 Connection
13.2.14 The OSI Model and Network Attacks Response 5 Free Response
13.3 Risk Response Lesson
13.3.1 Risk Response 1 Video
13.3.2 Risk Response 5 Check for Understanding
13.3.3 Defense in Depth Risk Mitigation 5 Free Response
13.3.4 Sample Risk Assessment Report 5 Connection
13.3.5 Sample Risk Assessment Reflection 5 Free Response
13.3.6 Delta Outage Video 5 Connection
13.3.7 Delta Outage Reflection 5 Free Response
13.3.8 What Happens When Your Servers Go Down 5 Connection
13.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
13.3.10 Server Upgrade Memo 5 Free Response
13.4 Penetration Testing Lesson
13.4.1 Penetration Testing 1 Video
13.4.2 Penetration Testing 5 Check for Understanding
13.4.3 Penetration Test Report 5 Connection
13.4.4 Penetration Test Report 5 Free Response
13.4.5 Chaos Engineering 5 Notes
13.4.6 Chaos Engineering Reflection 5 Free Response
13.4.7 Pen Test Simulation Handout 5 Resource
13.4.8 Pen Test Simulation: Active Recon 5 Exercise
13.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
13.5 Risk Management Quiz Lesson
13.5.1 Risk Management Quiz 20 Unit Quiz
Final Exam
14.1 Final Exam Lesson
14.1.1 Final Exam 25 Final
Introduction to Cybersecurity Pretest
15.1 Introduction to Cybersecurity Pretest Lesson
15.1.1 About the Pretest 1 Notes
15.1.2 Mindsets 1 Survey
15.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Introduction to Cybersecurity Posttest
16.1 Introduction to Cybersecurity Posttest Lesson
16.1.1 About the Posttest 1 Notes
16.1.2 Mindsets 1 Survey
16.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Project: Digital Forensics
17.1 Digital Forensics Lesson
17.1.1 Digital Forensics 1 Video
17.1.2 Student Success Story 1 Connection
17.1.3 Student Success Story Response 5 Free Response
17.2 Forensic Case 1: Logs Lesson
17.2.1 Network Logs 1 Notes
17.2.2 Network Log Evidence 1 Example
17.2.3 Network Logs Conclusion 5 Free Response
17.3 Forensic Case 2: File Metadata Lesson
17.3.1 File Metadata 1 Notes
17.3.2 File Metadata Evidence 1 Example
17.3.3 File Metadata Conclusion 5 Free Response
17.4 Forensic Case 3: Exif Data Lesson
17.4.1 Photo Exif 1 Notes
17.4.2 Exif Using Inspector 1 Connection
17.4.3 Exif Using the CLI 1 Example
17.4.4 Photo Exif Conclusion 5 Free Response
Cryptocurrency
18.1 What is Currency? Lesson
18.1.1 What is Currency? 1 Video
18.1.2 What is Currency? 2 Check for Understanding
18.1.3 What Gives Paper Money Its Actual Value 1 Connection
18.1.4 What Gives Money Its Value 5 Free Response
18.1.5 Money: What is it Good For? 1 Resource
18.2 What is Cryptocurrency? Lesson
18.2.1 Cryptocurrency Basics 1 Video
18.2.2 Cryptocurrency Basics 5 Check for Understanding
18.2.3 Cryptocurrency Module Overview 1 Video
18.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
18.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
18.2.6 Show Me the Money 1 Resource
18.2.7 American Currency Exhibit 5 Free Response
18.3 Intro to Blockchain Lesson
18.3.1 Intro to Blockchain 1 Video
18.3.2 Intro to Blockchain 3 Check for Understanding
18.3.3 CryptoKitties 1 Connection
18.3.4 CryptoKitties 5 Free Response
18.4 Hashing Lesson
18.4.1 Hashing 1 Video
18.4.2 Hashing 3 Check for Understanding
18.4.3 SHA256 Hash Generator 1 Connection
18.4.4 Using the SHA256 Hash Generator 5 Free Response
18.5 Proof of Work Lesson
18.5.1 Proof of Work 1 Video
18.5.2 Proof of Work 3 Check for Understanding
18.5.3 Mining the Block 1 Video
18.5.4 Mining the Block 3 Check for Understanding
18.5.5 PoW vs. Proof of Stake 1 Connection
18.5.6 PoW vs. PoS 5 Free Response
18.5.7 Checking Proof of Work 1 Resource
18.6 Advanced Blockchain Lesson
18.6.1 Advanced Blockchain (part 1) 1 Video
18.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
18.6.3 Blockchain Buzz 1 Connection
18.6.4 Blockchain Buzz 5 Free Response
18.6.5 Advanced Blockchain (part 2) 1 Video
18.6.6 Advanced Blockchain (part 2) 5 Free Response
18.6.7 Make a Blockchain 1 Resource
18.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
18.7 Cryptocurrencies Lesson
18.7.1 Cryptocurrencies 1 Video
18.7.2 Cryptocurrencies 3 Check for Understanding
18.7.3 Shiny Toy Phenomenon 5 Free Response
18.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
18.7.5 Walmart Use of Blockchain 5 Free Response
18.8 Bitcoin Lesson
18.8.1 Bitcoin 1 Video
18.8.2 Bitcoin 3 Check for Understanding
18.8.3 51% Attack Explained 1 Connection
18.8.4 51% Attack 5 Free Response
18.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
18.8.6 Bitcoin Bust 5 Free Response
18.8.7 Explore the Bitcoin Blockchain 1 Resource
18.9 Pros, Cons, and Future of Cryptocurrencies Lesson
18.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
18.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
18.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
18.9.4 Cryptocurrency Pros and Cons 1 Connection
18.9.5 Crypto Pros and Cons 5 Free Response
18.9.6 What is HODL? 1 Connection
18.9.7 What is HODL? 5 Free Response
18.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
18.10 Project: Cryptocurrency Expert Panel Talk Lesson
18.10.1 Overview 5 Free Response
18.10.2 Preview Sample Expert Panels 5 Free Response
18.10.3 Investigate a Cryptocurrency Topic 5 Free Response
18.10.4 Write an Outline and Rehearse 5 Free Response
18.10.5 Expert Panel Talk (Presentation) 5 Free Response
18.11 Cryptocurrency Quiz Lesson
18.11.1 Cryptocurrency Quiz 10 Unit Quiz
18.11.2 Cryptocurrency Badge 0 Badge
Final Course Project
19.1 Final Course Project Lesson
19.1.1 Choose Your Own Adventure 1 Notes
19.1.2 Choose Your Adventure 5 Free Response
19.1.3 Research 5 Free Response
19.1.4 Choose Your Target Audience 5 Free Response
19.1.5 Draft Your Presentation 5 Free Response
19.1.6 Draft Your Flyer 5 Free Response
19.1.7 Make Your Presentation with Handout! 5 Free Response
SQL Part II: The SQL
20.1 More Filtering Practice Lesson
20.1.1 Initials 5 Exercise
20.1.2 Compound Queries with BETWEEN 5 Exercise
20.1.3 Gryffindors With G Names 5 Exercise
20.1.4 R First Names 5 Exercise
20.1.5 FF Houses 5 Exercise
20.2 Ordering Results Lesson
20.2.1 The ORDER BY Keyword 1 Video
20.2.2 ORDER BY 1 Notes
20.2.3 ORDER BY First Name 1 Example
20.2.4 Reverse Order 1 Example
20.2.5 Order By Multiple Fields 1 Example
20.2.6 House Ordering 5 Exercise
20.2.7 Sort the P Names 5 Exercise
20.3 Renaming Fields Lesson
20.3.1 Renaming Fields with AS 1 Notes
20.3.2 Renaming in the House Table 1 Example
20.3.3 Changing Column Names 5 Exercise
20.4 Joining Tables Lesson
20.4.1 The JOIN command 1 Video
20.4.2 Basic Joining 1 Notes
20.4.3 Letters and Numbers 1 Example
20.4.4 Person and House 1 Example
20.4.5 Person and House (Correct) 1 Example
20.4.6 Person and House (with namespacing) 1 Example
20.4.7 List All Gryffindors 5 Exercise
20.4.8 JOIN With Yourself 1 Video
20.4.9 Renaming Tables 1 Notes
20.4.10 Quidditch Matchups 1 Example
20.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
20.5 More Joining Tables Lesson
20.5.1 The Course Table 1 Example
20.5.2 Courses and Professors 5 Exercise
20.5.3 Courses, Professors, and Houses 5 Exercise
20.5.4 Courses Taught By Gryffindors 5 Exercise
20.5.5 The Enrollment Table 1 Example
20.5.6 Students Taking Potions 5 Exercise
20.5.7 Non-Slytherins Taking Potions 5 Exercise
20.5.8 Defense Students by House 5 Exercise
20.5.9 Neville's Courses 5 Exercise
Web Development
21.1 Introduction to HTML Lesson
21.1.1 Introduction to HTML 1 Video
21.1.2 Introduction to HTML Quiz 1 Check for Understanding
21.1.3 Our First HTML Page 1 Example
21.1.4 Say Hello! 5 Exercise
21.2 Structure of an HTML Page Lesson
21.2.1 Structure of an HTML Page 1 Video
21.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
21.2.3 HTML Template 1 Example
21.2.4 Hello World Page 1 Example
21.2.5 The <title> Tag 5 Exercise
21.2.6 Your First HTML Page 5 Exercise
21.2.7 Structure Badge 1 Badge
21.3 Formatting Text Lesson
21.3.1 Formatting Text 1 Video
21.3.2 Formatting Text Quiz 1 Check for Understanding
21.3.3 Dictionary 1 Example
21.3.4 That's Bold 5 Exercise
21.3.5 Artificial Intelligence 5 Exercise
21.3.6 State Capitals 5 Exercise
21.4 Links Lesson
21.4.1 Links 1 Video
21.4.2 Links Quiz 1 Check for Understanding
21.4.3 The <a> Tag 1 Example
21.4.4 Simple Link 5 Exercise
21.4.5 My Favorite Websites 5 Exercise
21.5 Images Lesson
21.5.1 Images 1 Video
21.5.2 Images Quiz 1 Check for Understanding
21.5.3 The <img> Tag 1 Example
21.5.4 Building the CodeHS Homepage 1 Example
21.5.5 Collage on a Theme 5 Exercise
21.5.6 Linking an Image 5 Exercise
21.5.7 Personal Library 5 Exercise
21.5.8 Images Badge 1 Badge
21.6 HTML Lists Lesson
21.6.1 HTML Lists 1 Video
21.6.2 HTML Lists Quiz 1 Check for Understanding
21.6.3 Grocery Shopping 1 Example
21.6.4 Favorite Things 5 Exercise
21.6.5 To-Do List 5 Exercise
21.6.6 List Article 5 Exercise
21.7 HTML Tables Lesson
21.7.1 HTML Tables 1 Video
21.7.2 HTML Tables Quiz 3 Check for Understanding
21.7.3 Address Book 1 Example
21.7.4 Favorite Songs 5 Exercise
21.7.5 Calendar 5 Exercise
21.8 HTML Styling Lesson
21.8.1 HTML Styling 1 Video
21.8.2 HTML Styling Quiz 1 Check for Understanding
21.8.3 Stylish Address Book 1 Example
21.8.4 Background Colors 5 Exercise
21.8.5 Style Your To-Do List 5 Exercise
21.9 Introduction to CSS Lesson
21.9.1 Introduction to CSS 1 Video
21.9.2 Introduction to CSS Quiz 2 Check for Understanding
21.9.3 Styling Your H1s 1 Example
21.9.4 First Style with CSS 5 Exercise
21.9.5 List Styling 5 Exercise
21.10 CSS Select by Tag Lesson
21.10.1 CSS Select by Tag 1 Video
21.10.2 CSS Select by Tag Quiz 1 Check for Understanding
21.10.3 Rainbow 1 Example
21.10.4 Dog Styling 1 Example
21.10.5 Restaurant Menu 5 Exercise
21.10.6 Put Karel Together 5 Exercise
21.11 CSS Select by Class Lesson
21.11.1 CSS Select by Class 1 Video
21.11.2 CSS Select by Class Quiz 1 Check for Understanding
21.11.3 Simple Checkerboard 1 Example
21.11.4 Tic Tac Toe 5 Exercise
21.11.5 Music Library 5 Exercise
21.12 CSS Select by ID Lesson
21.12.1 CSS Select by ID 1 Video
21.12.2 CSS Select by ID Quiz 1 Check for Understanding
21.12.3 Logo 1 Example
21.12.4 Favorite Dog 5 Exercise
21.12.5 Bingo 5 Exercise
21.12.6 CSS Badge 1 Badge
21.13 Viewing Websites Lesson
21.13.1 Viewing Websites 1 Video
21.13.2 Viewing Websites Quiz 5 Check for Understanding
21.13.3 Explaining a URL 5 Free Response
21.14 Web Development Quiz Lesson
21.14.1 Web Development Quiz 15 Unit Quiz
21.15 Your First Website Lesson
21.15.1 Set Up Your codehs.me Website 10 Challenge
21.15.2 Practice PT: Your First Website 10 Challenge
21.15.3 Website Badge 1 Badge
Midterm
22.1 Midterm Lesson
22.1.1 Midterm 15 Midterm
Extra
23.1 Lesson 1 Lesson
23.1.1 Compound Queries 5 Example
Cybersecurity Level 1 Certification Practice
24.1 Practice #1: Programming and Software Security Lesson
24.1.1 Quiz: Programming and Software Security 8 Quiz
24.1.2 Practice #1 Reflection 5 Notes
24.2 Practice #2: IT Infrastructure + Networks Lesson
24.2.1 Quiz: IT Infrastructure and Networks 15 Quiz
24.2.2 Practice #2 Reflection 5 Notes
24.3 Practice #3: Digital Citizenship + Cybersecurity Lesson
24.3.1 Quiz: Digital Citizenship + Cybersecurity 8 Quiz
24.3.2 Practice #3 Reflection 5 Notes
24.4 Practice #4: System Admin and Cryptography Lesson
24.4.1 Quiz: System Admin and Cryptography 15 Quiz
24.4.2 Practice #4 Reflection 5 Notes
24.5 Mixed Practice Test Lesson
24.5.1 Important Note 5 Notes
24.5.2 Mixed Practice 30 Quiz
24.5.3 Mixed Practice Reflection 5 Notes