Please enable JavaScript to use CodeHS

PA 3A: 3A-IC-24

CodeHS Lessons

Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.

1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Information Literacy
1.4 Information Literacy
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
1.8 Hacking Ethics
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
5.8 The Impact of the Internet
5.8 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.8 The Impact of the Internet
8.8 The Impact of the Internet
21.2 History of Cryptography
21.3 Why encrypt?
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.12 Project: Security Assessment Report
21.2 History of Cryptography
21.3 Why encrypt?
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.12 Project: Security Assessment Report
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
5.7 The Impact of the Internet
5.7 The Impact of the Internet
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.12 The Impact of the Internet
4.12 The Impact of the Internet
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.5 Cyberbullying
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.8 Information Literacy
1.8 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
5.7 The Impact of the Internet
5.7 The Impact of the Internet
2.1 Module Overview - Cybersecurity
2.1 Module Overview - Cybersecurity
2.2 What is Cybersecurity?
2.2 What is Cybersecurity?
2.3 Impact of Cybersecurity
2.3 Impact of Cybersecurity
2.4 The CIA Triad
2.4 The CIA Triad
3.1 Digital Footprint and Reputation
3.1 Digital Footprint and Reputation
3.2 Cyberbullying
3.2 Cyberbullying
3.3 Internet Safety
3.3 Internet Safety
3.4 Privacy & Security
3.4 Privacy & Security
3.5 Information Literacy
3.5 Information Literacy
3.6 Creative Credit & Copyright
3.6 Creative Credit & Copyright
3.7 Hacking Ethics
3.7 Hacking Ethics
3.8 Project: Public Service Announcement
3.8 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
4.3 Why encrypt?
4.3 Why encrypt?
4.8 Hash Functions
4.8 Hash Functions
4.10 Project: Classic Cipher Newscast
4.10 Project: Classic Cipher Newscast
6.9 Common Security Problems
10.1 Project: Security Assessment Report
7.1 Introduction to the Internet
7.7 Viewing a Webpage
7.8 Impact of the Internet
7.11 Project: Secure the Company's Network
6.9 Common Security Problems
10.1 Project: Security Assessment Report
7.1 Introduction to the Internet
7.7 Viewing a Webpage
7.8 Impact of the Internet
7.11 Project: Secure the Company's Network
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
4.8 Hash Functions
4.8 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.9 Common Security Problems
6.9 Common Security Problems
7.1 Introduction to the Internet
7.1 Introduction to the Internet
7.7 Viewing a Webpage
7.7 Viewing a Webpage
7.8 Impact of the Internet
7.8 Impact of the Internet
8.1 Project: Secure the Company's Network
8.1 Project: Secure the Company's Network
11.1 Project: Security Assessment Report
11.1 Project: Security Assessment Report
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.2 Cyberbullying
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
9.5 Information Literacy
9.5 Information Literacy
9.6 Creative Credit & Copyright
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
10.1 Digital Footprint and Reputation
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.2 Cyberbullying
10.3 Internet Safety
10.3 Internet Safety
10.4 Privacy & Security
10.4 Privacy & Security
10.5 Information Literacy
10.5 Information Literacy
10.6 Creative Credit & Copyright
10.6 Creative Credit & Copyright
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
14.1 Module Overview - Cybersecurity
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.4 The CIA Triad
14.1 Module Overview - Cybersecurity
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.1 Module Overview - Cybersecurity
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
8.1 Module Overview - Cybersecurity
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
1.2 Module Overview - Cybersecurity
1.2 Module Overview - Cybersecurity
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.4 Impact of Cybersecurity
1.5 The CIA Triad
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.4 Hash Functions
5.4 Hash Functions
8.6 Common Security Problems
8.6 Common Security Problems
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.1 Introduction to the Internet
10.1 Introduction to the Internet
10.9 Viewing a Webpage
10.9 Viewing a Webpage
10.10 Impact of the Internet
10.10 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.10 Common Security Problems
5.10 Common Security Problems
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.2 History of Cryptography
8.2 History of Cryptography
9.1 Introduction to the Internet
9.1 Introduction to the Internet
9.9 Viewing a Webpage
9.9 Viewing a Webpage
9.10 Impact of the Internet
9.10 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
4.4 Hash Functions
9.9 Common Security Problems
9.9 Common Security Problems
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.5 Information Literacy
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.1 Introduction to the Internet
24.9 Viewing a Webpage
24.10 Impact of the Internet
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.5 Information Literacy
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.1 Introduction to the Internet
24.9 Viewing a Webpage
24.10 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
7.4 Common Security Problems
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
9.1 Introduction to the Internet
9.1 Introduction to the Internet
9.9 Viewing a Webpage
9.9 Viewing a Webpage
9.11 Impact of the Internet
9.11 Impact of the Internet
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
8.9 Common Security Problems
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.1 Introduction to the Internet
10.1 Introduction to the Internet
10.9 Viewing a Webpage
10.9 Viewing a Webpage
10.11 Impact of the Internet
10.11 Impact of the Internet
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
2.1 Introduction to the Internet
2.1 Introduction to the Internet
2.7 Impact of the Internet
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.3 Hacking Ethics
4.4 The CIA Triad
4.4 The CIA Triad
4.5 Privacy & Security
4.5 Privacy & Security
4.7 Hash Functions
4.7 Hash Functions
4.8 Cyberbullying
4.8 Cyberbullying
4.9 Creative Credit & Copyright
4.9 Creative Credit & Copyright
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.3 Cyberbullying
1.5 Privacy & Security
1.5 Privacy & Security
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
5.18 Optimizing Web Information
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Information Literacy
4.5 Information Literacy
4.7 Creative Credit & Copyright
4.7 Creative Credit & Copyright
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.1 Introduction to the Internet
5.1 Introduction to the Internet
5.7 Viewing a Webpage
5.7 Viewing a Webpage
5.8 Impact of the Internet
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
5.7 Privacy & Security
5.7 Privacy & Security
5.8 Creative Credit & Copyright
5.8 Creative Credit & Copyright
13.9 The Impact of the Internet
13.10 Creative Credit & Copyright
13.10 Creative Credit & Copyright
18.1 The Impacts of Computing
32.1 The Effects of the Internet
8.10 Cybersecurity
8.11 The Impact of the Internet
8.12 Creative Credit & Copyright
8.12 Creative Credit & Copyright
2.1 Introduction to the Internet
2.1 Introduction to the Internet
2.9 Viewing a Webpage
2.9 Viewing a Webpage
2.10 Creative Credit & Copyright
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
2.11 Impact of the Internet
6.18 Ethical and Social Implications of Computing
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
15.1 The Impacts of Computing
1.4 Hash Functions
1.4 Hash Functions
4.1 Collecting and Storing Data
6.5 Optimizing Web Information
6.13 Optimizing Web Information
5.6 Cybersecurity
5.8 The Impact of the Internet
11.10 Ethical and Social Implications of Computing
5.6 Cybersecurity
5.8 The Impact of the Internet
11.10 Ethical and Social Implications of Computing
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
15.1 The Impacts of Computing
5.10 Ethical and Social Implications of Computing