Please enable JavaScript to use CodeHS

DE 2: 2-IC-20

CodeHS Lessons

Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.

1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.3 Cyberbullying
1.5 Privacy & Security
1.5 Privacy & Security
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
3.1 Intro to the Internet
3.1 Intro to the Internet
3.7 The Impact of the Internet
3.7 The Impact of the Internet
7.1 History of Computers
7.1 History of Computers
7.8 Future of Computing
7.8 Future of Computing
13.1 Project: The Effects of the Internet
12.1 Project: Public Service Announcement
13.1 Project: The Effects of the Internet
12.1 Project: Public Service Announcement
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
9.1 Intro to the Internet
9.1 Intro to the Internet
9.7 The Impact of the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
16.1 History of Computers
16.1 History of Computers
16.1 History of Computers
16.1 History of Computers
4.5 Future of Computing
4.5 Future of Computing
7.1 Intro to the Internet
7.1 Intro to the Internet
7.7 The Impact of the Internet
7.7 The Impact of the Internet
10.1 Digital Footprint and Reputation
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.2 Cyberbullying
10.3 Internet Safety
10.3 Internet Safety
10.4 Privacy & Security
10.4 Privacy & Security
10.5 Information Literacy
10.5 Information Literacy
10.6 Creative Credit & Copyright
10.6 Creative Credit & Copyright
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
14.1 Module Overview - Cybersecurity
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.1 Module Overview - Cybersecurity
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
1.1 History of Computers
1.1 History of Computers
1.5 Future of Computing
1.5 Future of Computing
1.7 Intro to the Internet
1.7 Intro to the Internet
1.8 The Impact of the Internet
1.8 The Impact of the Internet
2.1 Computer Model
2.1 Computer Model
3.1 Intro to the Internet
3.1 Intro to the Internet
3.7 The Impact of the Internet
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
3.8 Project: The Effects of the Internet
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
3.1 Computer Model
3.1 Computer Model
7.1 Intro to the Internet
7.1 Intro to the Internet
7.7 The Impact of the Internet
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
8.1 Project: The Effects of the Internet
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.2 Cyberbullying
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
9.5 Information Literacy
9.5 Information Literacy
9.6 Creative Credit & Copyright
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
5.1 History of Computers
5.1 History of Computers
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
2.6 Computer Model
2.6 Computer Model
4.1 History of Computers
4.1 History of Computers
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
4.5 Future of Computing
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
19.1 History of Computers
19.1 History of Computers
19.1 History of Computers
19.1 History of Computers
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.1 History of Computers
4.1 History of Computers
4.5 Future of Computing
4.5 Future of Computing
4.6 Computer Model
4.6 Computer Model
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.12 Project: Security Assessment Report
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.12 Project: Security Assessment Report
2.1 History of Computers
2.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
8.1 Module Overview - Cybersecurity
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.1 Module Overview - Cybersecurity
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.5 Cyberbullying
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.8 Information Literacy
1.8 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
21.1 History of Computers
2.5 Future of Computing
2.5 Future of Computing
2.6 Computer Model
2.6 Computer Model
2.1 Module Overview - Cybersecurity
2.1 Module Overview - Cybersecurity
2.2 What is Cybersecurity?
2.2 What is Cybersecurity?
2.3 Impact of Cybersecurity
2.3 Impact of Cybersecurity
3.1 Digital Footprint and Reputation
3.1 Digital Footprint and Reputation
3.2 Cyberbullying
3.2 Cyberbullying
3.3 Internet Safety
3.3 Internet Safety
3.4 Privacy & Security
3.4 Privacy & Security
3.5 Information Literacy
3.5 Information Literacy
3.6 Creative Credit & Copyright
3.6 Creative Credit & Copyright
3.7 Hacking Ethics
3.7 Hacking Ethics
3.8 Project: Public Service Announcement
3.8 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
4.10 Project: Classic Cipher Newscast
4.10 Project: Classic Cipher Newscast
6.9 Common Security Problems
10.1 Project: Security Assessment Report
7.8 Impact of the Internet
7.11 Project: Secure the Company's Network
6.9 Common Security Problems
10.1 Project: Security Assessment Report
7.8 Impact of the Internet
7.11 Project: Secure the Company's Network
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.9 Common Security Problems
6.9 Common Security Problems
7.8 Impact of the Internet
7.8 Impact of the Internet
8.1 Project: Secure the Company's Network
8.1 Project: Secure the Company's Network
11.1 Project: Security Assessment Report
11.1 Project: Security Assessment Report
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.2 Module Overview - Cybersecurity
1.2 Module Overview - Cybersecurity
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.4 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
8.6 Common Security Problems
8.6 Common Security Problems
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.10 Impact of the Internet
10.10 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.10 Common Security Problems
5.10 Common Security Problems
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
9.10 Impact of the Internet
9.10 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
9.9 Common Security Problems
9.9 Common Security Problems
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.5 Information Literacy
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.5 Information Literacy
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
7.4 Common Security Problems
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
9.11 Impact of the Internet
9.11 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
8.9 Common Security Problems
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.11 Impact of the Internet
10.11 Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Information Literacy
1.4 Information Literacy
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
1.8 Hacking Ethics
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.7 Impact of the Internet
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.3 Hacking Ethics
4.5 Privacy & Security
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.6 Cryptography, Cryptology, Cryptanalysis
4.8 Cyberbullying
4.8 Cyberbullying
4.9 Creative Credit & Copyright
4.9 Creative Credit & Copyright
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Information Literacy
4.5 Information Literacy
4.7 Creative Credit & Copyright
4.7 Creative Credit & Copyright
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
5.7 Privacy & Security
5.7 Privacy & Security
5.8 Creative Credit & Copyright
5.8 Creative Credit & Copyright
13.10 Creative Credit & Copyright
13.10 Creative Credit & Copyright
8.12 Creative Credit & Copyright
8.12 Creative Credit & Copyright
2.10 Creative Credit & Copyright
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
2.11 Impact of the Internet
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright