Please enable JavaScript to use CodeHS


Virginia Cybersecurity Fundamentals

Lessons

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Description

      In this lesson, students learn that since the Internet is used to send, receive, and store valuable personal information, users are put at risk of having this information stolen through cyber attacks. Cybersecurity is a field that involves several disciplines of computer science. It is valuable to build basic computer science literacy no matter what field you eventually enter.

    3. Objective

      Students will be able to:

      • Set individual learning goals for themselves in the cybersecurity course
      • Explain why it is important to learn computer science, regardless of their goals in college and career
    4. 1.2 What is Cybersecurity?

    5. Description

      In this lesson, students will learn what is meant by cybersecurity and explore a few news worthy cyber attacks. They will also discuss the Internet of Things and the increase in connected devices.

      Cybersecurity is the protection of computer systems, networks, and data from digital attacks. Increased connectivity via the Internet of Things and reliance on computer devices to send and store data makes users more vulnerable to cyber attacks.

    6. Objective

      Students will be able to:

      • Define cybersecurity
      • Describe how the Internet of Things makes people more vulnerable to cyber attacks
      • Reflect on recent cyber attacks and identify the financial and societal impact of the attack
    7. 1.3 Impact of Cybersecurity

    8. Description

      In this lesson, students will learn and examine recent cyber attacks. Cyber attacks result in financial loss, lowered trust, disruption of important services, and more. There is a growing need for cybersecurity experts, and careers in the field are lucrative with high-impact.

    9. Objective

      Students will be able to:

      • Evaluate recent cyber attacks and understand the negative consequences of these attacks
      • Understand career opportunities in the field of cybersecurity
    10. 1.4 The CIA Triad

    11. Description

      In this lesson, students will learn about The CIA Triad. The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

      • Confidentiality is the protection of information from people who are not authorized to view it.
      • Integrity aims at ensuring that information is protected from unauthorized or unintentional alteration.
      • Availability is the assurance that systems and data are accessible by authorized users when and where needed.
    12. Objective

      Students will be able to:

      • Identify what the CIA triad is and how it relates to cybersecurity
      • Identify which part of the CIA triad has been broken in a given scenario
    13. 1.5 What is Cybersecurity? Quiz

    14. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    15. Objective

      Students will be able to:

      • Prove their knowledge of basic cybersecurity concepts and its impacts through a multiple choice quiz
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Description

      In this lesson, students understand how they can control and protect their footprint. As students use the Internet, they are building their digital footprint. This includes social media posts, emails, picture and video uploads amongst other online activities.

    3. Objective

      Students will be able to:

      • Understand how their online activity contributes to a permanent and public digital footprint
      • Articulate their own social media guidelines to protect their digital footprint
    4. 2.2 Cyberbullying

    5. Description

      In this lesson, students will learn about and discuss cyberbullying. Cyberbullying is the use of electronic communication to harass or target someone. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.

    6. Objective

      Students will be able to:

      • Understand the impact of cyberbullying, and identify unacceptable bullying behavior
      • Identify proper actions to take if they are victims of cyberbullying or if they observe someone being cyberbullied
    7. 2.3 Internet Safety

    8. Description

      In this lesson, students will learn to recognize online predatory behavior and strategies on how to avoid and respond to it. The Internet is a great place to socialize, but it is important to be aware of risks. Common sense and following safety guidelines can help students stay safe online.

    9. Objective

      Students will be able to:

      • Identify predatory behavior and how to respond to it online
    10. 2.4 Privacy & Security

    11. Description

      In this lesson, students will discuss and examine policies regarding privacy and security. Using best practices like setting strong passwords, reading privacy policies, and using https can help in staying safe online.

    12. Objective

      Students will be able to:

      • Use best practices in personal privacy and security, including strong passwords, using https, and reading privacy policies
    13. 2.5 Information Literacy

    14. Description

      In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

    15. Objective

      Students will be able to:

      • Effectively search for and evaluate resources
    16. 2.6 Creative Credit & Copyright

    17. Description

      In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

    18. Objective

      Students will be able to:

      • Explain what copyright laws are and why they are important
      • Find images they are legally allowed to use in their projects
      • Accurately attribute images they find and want to use
    19. 2.7 Hacking Ethics

    20. Description

      In this lesson, students will explore and discuss the ethics and legality around hacking. A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network. There are white hat hackers, who help companies find and protect exploits in their systems, and black hat hackers who hack maliciously.

    21. Objective

      Students will be able to:

      • Identify the difference between white hat hacking and black hat hacking
      • Explain career opportunities in cybersecurity
    22. 2.8 Digital Citizenship and Cybersecurity Quiz

    23. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    24. Objective

      Students will be able to:

      • Prove their knowledge of digital citizenship and cyber hygiene concepts through a multiple choice quiz
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Description

      Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!

    3. Objective

      Students will be able to:

      • Create a public service announcement for members of their community about a topic in digital citizenship or cyber hygiene
      • Use google sheets to store and analyze data, and create a data visualization.
  4. System Administration

    1. 4.1 Operating Systems

    2. Description

      In this lesson, students will learn about the basic functions and types of operating systems. Students will also explore the process for upgrading and installing Windows and Mac operating systems.

    3. Objective

      Students will be able to:

      • Explain the purpose of operating systems
      • Identify the main types of operating systems
      • Analyze the upgrade and installation process for operating systems
    4. 4.2 Comparing Operating Systems

    5. Description

      In this lesson, students delve deeper into the differences between the three main operating systems. They learn how operating systems store and manage files and the differences and similarities in each system’s interface.

    6. Objective

      Students will be able to:

      • Compare and contrast the interface of Mac, Windows, and Linux operating systems
      • Explain how operating systems use file systems to manage data
    7. 4.3 Compatibility

    8. Description

      In this lesson, students continue to compare and contrast different operating systems. Students learn how operating systems use file extensions to determine how to view different data types and how some extensions are only compatible with specific operating systems. Additionally, students learn about processors and the difference between a 32-bit processor and a 64-bit processor.

    9. Objective

      Students will be able to:

      • Compare and contrast file systems of different operating systems
      • Explain the role of the processor in a computer system
      • Explain the difference between a 32-bit and 64-bit processor and the impact it has on the operating system
    10. 4.4 Software and Applications

    11. Description

      In this lesson, students learn about the different types of software. Through interactive exercises, students explore how different software can be used in the workplace and our every day lives. Students also learn about single and cross-platform software.

    12. Objective

      Students will be able to:

      • Explain the different types of software (productivity, collaboration, business) and the purpose of each.
      • Explain the benefits and challenges of single and cross-platform software.
    13. 4.5 Software Licenses

    14. Description

      In this lesson, students learn about the different types of software licenses as well as the different methods of installing software based on the application’s architecture.

    15. Objective

      Students will be able to:

      • Explain the different types of software licenses
      • Explain the different delivery methods and architecture models of installing software
    16. 4.6 Application Security

    17. Description

      In this lesson, students will learn about the importance of application security and what they can do to protect applications once they have been installed on a device.

    18. Objective

      Students will be able to:

      • Explain the importance of application security
      • Explain the multiple methods for protecting software
    19. 4.7 Browser Configuration

    20. Description

      In this lesson, students will learn about browser security features and ways to configure their browsers to enhance security.

    21. Objective

      Students will be able to:

      • Configure their browser to enhance security and privacy
      • Explain how the following features impact their browser security: cache, client-side scripting, browser extensions, private browsing, proxy settings, certificates, and popup blockers
      • Describe appropriate browser security configurations
    22. 4.8 System Administration

    23. Description

      In this lesson, students learn how to use user accounts and permissions to secure a device. Students also learn about system hardening and how to strengthen the security of a network by setting up and implementing host security.

    24. Objective

      Students will be able to:

      • Describe how creating user accounts and permissions enhances security
      • Define system hardening explain the importance of establishing baseline security, including deciding rules around authentication and authorization
      • Explain the importance of performing security audits
    25. 4.9 Command Line Interface

    26. Description

      In this lesson, students learn how to use the command line interface to interact with files and folders, and access information about computer processes.

    27. Objective

      Students will be able to:

      • Understand the connection between a command line (CLI) interface and a graphical line interface (GUI)
      • Use the appropriate command line tool for different tasks
    28. 4.10 Mobile Devices

    29. Description

      In this lesson, students will extend their understanding of securing a network to include securing mobile devices. Students will learn about best practices for mobile device security as well as how BYOD (bring your own device) policies have impacted a company’s network security.

    30. Objective

      Students will be able to:

      • Explain methods for securing mobile devices
      • Define BYOD policy and MDM tools and evaluate their effectiveness
      • Evaluate the use of biometric authentication to unlock phones through the lens of privacy
    31. 4.11 System Administration Quiz

    32. Description

      In this lesson, students complete a summative assessment of the module’s learning objectives.

    33. Objective

      Students will be able to:

      • Prove their knowledge of system administration concepts and its impacts through a multiple choice quiz
  5. Software Security

    1. 5.1 Programming Concepts

    2. Description

      In this lesson, students will learn the basics of what a programming language does and the differences between compilers and interpreters. Students will also learn about data types and how to initialize and assign values to variables.

    3. Objective

      Students will be able to:

      • Explain the difference between the different types of programming languages
      • Initialize and assign values to variables
      • Differentiate between the different data types
    4. 5.2 Inside Web Apps

    5. Description

      In this lesson, students will look under the hood of web sites and web applications by using “view page source” in a browser. This will enable them to see HTML markup for images, navigation, and page layouts, CSS styling, and even JavaScript source code or links to JS files. Students will also view code that has been minified and understand what that means. Lastly, students will also take a first look at OWASP (Open Web Application Security Project) which is an important organization in cybersecurity.

    6. Objective

      Students will be able to:

      • Identify major sections of code within the view source of a web page/app
      • Understand the importance of OWASP and how it relates to the field of cybersecurity
    7. 5.3 Developer Tools

    8. Description

      In this lesson, students will learn about and use the developer tools in a browser. Web developers actually use these to help build and test websites. Cyber professionals need to be very familiar with the different ways of looking at how sites and apps function so they can use various tools to detect vulnerabilities or even detect attacks as they are starting.

    9. Objective

      Students will be able to:

      • Identify major developer tools within the inspect element
      • Explain the major difference between view page source and what is rendered in the inspect tools
      • Explain in general terms what each major tool in the inspect area can show a developer
      • Explain how the developer tools can help web developers build and maintain sites, and how understanding the tools can potentially help cyber professionals who are trying to keep sites and data secure
    10. 5.4 The Value of Data

    11. Description

      In this lesson, students will learn about the impact of visually representing data to make information easier to analyze and use.

    12. Objective

      Students will be able to:

      • Explain the importance of visually depicting data to make information easier to use and to understand trends and changes in information
    13. 5.5 Databases

    14. Description

      In this lesson, students will take a look at what databases are, how they are organized and used, the major parts of a database, and what a database schema is and generally looks like.

    15. Objective

      Students will be able to:

      • Explain the primary purposes of a database
      • Identify and explain the major parts of a database
      • Understand the implications of database storage on the protection of data within the field of cybersecurity
    16. 5.6 Clients and Servers

    17. Description

      In this lesson, students take a look at what client and server devices and applications are, the client-server model, and how databases are part of that client-server model. They will get a high-level view of how clients and servers work together to help exchange information and data over a network or the Internet.

    18. Objective

      Students will be able to:

      • Identify a client device and explain its purpose
      • Identify a server device and explain its purpose
      • Explain the client-server model
    19. 5.7 What is SQL?

    20. Description

      In this lesson, students will be introduced to SQL (structured query language). Students will also learn how a database is structured into tables and rows.

    21. Objective

      Students will be able to:

      • Explain what the SQL programming language does
      • Define the different parts of a database (table, column, row)
      • Define what a schema is in relation to a database
    22. 5.8 Basic Querying in SQL

    23. Description

      In this lesson, we learn about and use the SELECT statement in SQL. The SELECT statement is used to query the database and return a row or multiple rows from a table in the database.

    24. Objective

      Students will be able to:

      • Use a SELECT statement in SQL to query a database using * or the FROM statement
    25. 5.9 Filtering Queries in SQL

    26. Description

      In this lesson, students learn about the WHERE clause and basic filtering of queries in SQL.

    27. Objective

      Students will be able to:

      • Use a WHERE clause in a statement in SQL to filter queries
    28. 5.10 Common Security Problems

    29. Description

      In this lesson, students learn the overall concept of security: what it means to them personally and what it means to organizations in a digital world. They will reflect on what makes them feel secure.

    30. Objective

      Students will be able to:

      • Explain what security means on a personal and organizational level
    31. 5.11 SQL Injection Overview

    32. Description

      This lesson provides an overview of what SQL injection is, the impact, how it works, and how hackers use SQL to attack a site. The lesson also has connections on the Equifax cyber attack that was a very large scale SQL injection.

    33. Objective

      Students will be able to:

      • Understand and explain what a SQL injection attack is and the ongoing, pervasive impact of SQLi cyber attacks
    34. 5.12 Types of SQLi and Prevention

    35. Description

      In this lesson, students will learn and discuss types of SQLi and ways to prevent or at least mitigate an attack.

    36. Objective

      Students will be able to:

      • Explain the 3 types of SQLi and the vulnerability associated with each
      • Understand the fundamentals of how SQL injections are prevented or at least mitigated
    37. 5.13 Software Security Quiz

    38. Description
    39. Objective
  6. Project: Security Assessment Report

    1. 6.1 Project: Security Assessment Report

    2. Description

      In this project, students will get to test a site for vulnerabilities and write a security assessment report about their findings and recommendations.

    3. Objective

      Students will be able to:

      • Perform basic SQLi testing to determine vulnerabilities on a site.
      • Write a security assessment report for the CTO of a fictitious company (see description and outline in the project description).
  7. Project: Put it in Writing!

    1. 7.1 Level 1: Entry Event

    2. Description

      In this portion of the project, students will come up with a fictitious company and feel the impact of reacting to a security breach without any pre-developed policy in place. Students will then learn about some of the common policies companies put in place and set forth on the task of developing strong policies for their company.

    3. Objective

      Students will be able to:

      • Reflect on why policy documentation is important for security
      • Identify examples of policy documentation
    4. 7.2 Level 2: User Training

    5. Description

      Incident response plans are essential to ensure that companies are prepared to effectively respond to any breach in security. In this portion of the project, students will develop a set of policies regarding strong passwords and employee training. They will test their policies against a series of employee negligence scenarios and reflect on what would need to be added to strengthen their policy.

    6. Objective

      Students will be able to:

      • Develop a set of policies regarding strong passwords and employee training
      • Reflect on the strength of policy documentation
    7. 7.3 Level 3: Incident Response

    8. Description

      In this portion of the project, students will create an abbreviated Incident Response plan. They will respond to a cyber attack using their IR plan and reflect on how they were able to handle this attack as well as how to strengthen their policy.

    9. Objective

      Students will be able to:

      • Develop an incident response plan
      • Reflect on the strength of policy documentation
    10. 7.4 Level 4: Data and Licenses

    11. Description

      Data can be one of a company’s most valuable resources, not to mention most regulated. Developing a strong plan for keeping data secure is essential, especially as more and more companies turn to the cloud to keep track of the massive amounts of data that are being collected every day. In this portion of the project, students will review an example privacy policy and then complete their own abbreviated policy. They will test their data policies against a data breach and reflect on what would need to be added to strengthen their policy.

    12. Objective

      Students will be able to:

      • Develop a data privacy policy
      • Reflect on the strength of policy documentation
    13. 7.5 Level 5: Change Management

    14. Description

      Change management is the approach to preparing and supporting individuals and/or teams to successfully adopt organizational change. When implementing changes within a company, it is essential to consider how you will present the change to employees and support them in adopting and implementing the change. In this portion of the project, students will synthesize the changes that need to be made to strengthen their policies. They will develop a change management plan to implement new policies effectively.

    15. Objective

      Students will be able to:

      • Develop a change management plan
  8. The ABCs of Cryptography

    1. 8.1 Cryptography, Cryptology, Cryptanalysis

    2. Description

      In this lesson, students will learn how basic encryption and decryption works. There is a need for secrecy when sending and receiving personal information. Encryption and decryption are used to protect personal information.

    3. Objective

      Students will be able to:

      • Define cryptography, cryptology, and cryptanalysis
      • Explain the need for encryption and how basic encryption and decryption works
      • Relate encryption with how it affects the CIA Triad
    4. 8.2 History of Cryptography

    5. Description

      In this lesson, students will learn the history of cryptography. Humans have always had reasons to hide information, and throughout history they have used crypto systems of varying complexity to keep information safe.

    6. Objective

      Students will be able to:

      • Explain the purpose of cryptography and how different crypto systems have been used throughout history
    7. 8.3 Basic Crypto Systems: Caesar Cipher

    8. Description

      In this lesson, students will learn and practice using the Caesar Cipher. The Caesar Cipher is an encryption method that predates computers in which each letter of the message is shifted by a certain amount, called the key.

    9. Objective

      Students will be able to:

      • Encrypt and decrypt messages using the Caesar Cipher
    10. 8.4 Basic Crypto Systems: Cracking Caesar

    11. Description

      In this lesson, students will practice using brute force and letter frequency to crack the Caesar Cipher. The Caesar Cipher is an encryption method in which each letter of the message is shifted by a certain amount, called the key. Cracking the Caesar Cipher with brute force (trying every combination) is a trivial matter for modern computers.

    12. Objective

      Students will be able to:

      • Explain why the Caesar Cipher is so easy for a computer to crack
      • Use basic letter distribution analysis to decrypt a simple message
    13. 8.5 Basic Crypto Systems: Vigenere Cipher

    14. Description

      In this lesson, students will learn and use the Vigenère Cipher. The Vigenère Cipher consists of several Caesar ciphers in sequence with different shift values based on a keyword, so brute force and letter frequency analysis do not work.

    15. Objective

      Students will be able to:

      • Explain how the Vigenère Cipher works and why it is not as easy to crack as the Caesar Cipher
    16. 8.6 The ABCs of Cryptography Quiz

    17. Description
    18. Objective
  9. Networking Fundamentals

    1. 9.1 Introduction to the Internet

    2. Description

      In this lesson, students will explore at a high-level what the internet is and how the internet works.

    3. Objective

      Students will be able to:

      • Understand what the internet is
      • Understand how the internet works
    4. 9.2 Notational Systems

    5. Description

      In this lesson, students will learn what a number system is, the difference between the decimal number system and the binary number system, and how to convert between decimal and binary.

    6. Objective

      Students will be able to:

      • Represent numbers in different number systems
      • Understand how to convert between the decimal and binary system
    7. 9.3 Data Representation

    8. Description

      In this lesson, students will learn about the hexadecimal number system, and how it is useful in storing digital information. They will also learn how to convert numbers from the hexadecimal system to binary and vice versa.

    9. Objective

      Students will be able to:

      • Understand how to convert between the hexadecimal and binary system
      • Encode various types of information using binary
    10. 9.4 Internet Hardware and Sending Information

    11. Description

      In this lesson, students will explore the hardware that makes up the internet and the characteristics of that hardware that define our experience on the internet.

    12. Objective

      Students will be able to:

      • Discuss and answer questions about the hardware that powers the internet
    13. 9.5 Internet Addresses

    14. Description

      In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol.

    15. Objective

      Students will be able to:

      • Discuss the necessity of internet protocols
      • Recognize the hierarchy of elements in an IP address
    16. 9.6 Domain Name System (DNS)

    17. Description

      In this lesson, students will explore the DNS system and how it maps human readable domain names into actual accessible IP addresses.

    18. Objective

      Students will be able to:

      • Understand the DNS system and how it works
      • Recognize the DNS system as an abstraction
    19. 9.7 Routing

    20. Description

      In this lesson, students explore how messages get from one address on the internet to another.

    21. Objective

      Students will be able to:

      • Explain how computers communicate using routers
      • Explain what considerations are made when choosing a route
      • Discuss how routers are fault-tolerant because of redundancy
    22. 9.8 Packets & Protocols

    23. Description

      In this lesson, students learn about the last piece of the puzzle for how the Internet works: Packets and Protocols. All information sent over the internet is broken down into small groups of bits called packets. The format for creating and reading packets is defined by open protocols so that all devices can read packets from all other devices.

    24. Objective

      Students will be able to:

      • Explain the packet process and how protocols (TCP/IP and HTTP) are vital to the exchange of information on the Internet
      • Explain the Hyper Text Transfer Protocol
    25. 9.9 Viewing a Webpage

    26. Description

      In this lesson, students learn how all of the pieces of the puzzle (IP addresses, the DNS system, routing, and packets and protocols) fit together to send information over the internet. Students will extend these new concepts to consider net neutrality and its ramifications on cybersecurity.

    27. Objective

      Students will be able to:

      • Describe the process that occurs when typing in a URL, from sending a request and response over the Internet to viewing a webpage
      • Explain what net neutrality is and any implications for cybersecurity
    28. 9.10 Impact of the Internet

    29. Description

      In this lesson, students are presented with different ways that the Internet impacts their lives. The Internet affects the way that people communicate (emails, social media, video chat) and collaborate to solve problems. It has revolutionized the way that people can learn and even buy things. Because the Internet is present in almost every facet of people’s lives, there are severe ethical and legal concerns that derive from the Internet.

    30. Objective

      Students will be able to:

      • Analyze the different ways that the Internet impacts their lives by learning about how the Internet contributes to collaboration, communication, etc
      • Evaluate whether the Internet has a more positive or negative effect on their community by citing examples from the lesson
      • Explain what the digital divide is and articulate their own opinions related to it
    31. 9.11 Networking Fundamentals Quiz

    32. Description
    33. Objective
  10. IT Infrastructure

    1. 10.1 Internal Components

    2. Description

      In this lesson, students will learn about the essential internal components that make up a computer. Component categories include the motherboard (system board), firmware (BIOS), CPU (processor), GPU (graphics processor), storage, cooling, and NIC (network adapter).

    3. Objective

      Students will be able to:

      • Explain the purpose of common internal computing components such as motherboards, BIOS, RAM, and more.
    4. 10.2 Peripheral Devices

    5. Description

      In this lesson, students will learn and explain the purposes and use of various peripheral types. They will classify the peripherals as input or output devices and explore different ways of installing them on a laptop or PC.

    6. Objective

      Students will be able to:

      • Explain the purposes and uses of various peripheral types
      • Classify common types of input/output device interfaces.
      • Explain how to install common peripheral devices to a laptop/PC
    7. 10.3 Network Devices

    8. Description

      In this lesson, students will learn about different networking devices that allow devices to connect to other devices as well as the Internet. They will also learn different networking connection methods such as using dialup, DSL, coax cables, and fiber optic cables.

    9. Objective

      Students will be able to:

      • Compare and contrast common Internet service types
      • Compare and contrast common networking hardware devices
      • Explain basic cable types, features, and their purposes
    10. 10.4 Storage Options

    11. Description

      In this lesson, students will learn about the different storage options including local storage, network storage, and cloud storage.

    12. Objective

      Students will be able to:

      • Compare and contrast storage types
      • Examine and discuss the security of cloud storage
      • Select suitable storage devices for given situations
    13. 10.5 Network Options

    14. Description

      In this lesson, students will learn about the different network types and options that are available. This will include wireless networking standards and protocols.

    15. Objective

      Students will be able to:

      • Compare and contrast the different wireless network standards
      • Compare and contrast Internet connection types, network types, and their features
    16. 10.6 Network Communication

    17. Description

      In this lesson, students will learn about different ports and protocols and how they can be protected using a firewall. They will explore port scans and how to set firewall rules.

    18. Objective

      Students will be able to:

      • Compare and contrast different ports, protocols and their purposes
      • Explain the purpose of a firewall and how it protects against unwanted traffic
    19. 10.7 Network Management

    20. Description

      In this lesson, students will learn about different CLI commands and tools that will provide network information. Students will also take a look at network connection logs to determine the legitimacy of specific login attempts.

    21. Objective

      Students will be able to:

      • Explain and use appropriate network command line tools
      • Read and understand the basics of log reports
    22. 10.8 IT Infrastructure Quiz

    23. Description

      In this lesson, students complete a summative assessment of the module’s learning objectives.

    24. Objective
  11. Project: Troubleshooting

    1. 11.1 Methodology

    2. Description
    3. Objective
    4. 11.2 Support Practice

    5. Description
    6. Objective
  12. Project: IT Professional

    1. 12.1 Communication is Key!

    2. Description

      In this lesson, students explore what it means to be a cybersecurity professional. Students learn about a wide variety of cybersecurity careers, what each job entails, and what skills sets are needed to be successful. Students learn about the importance of communication and practice responding to a customer support call.

    3. Objective

      Students will be able to:

      • Explore skill sets and duties of multiple cybersecurity careers
      • Describe the skills involved in successful customer support
      • Utilize customer support and communication skills in a mock customer support call
    4. 12.2 Building a Knowledge Base

    5. Description

      In this lesson, students continue to develop their customer service skills by writing a knowledge base article. Students will research a common network issue and create an article that effectively details the steps to resolve it. Students will also go through a peer review process as a way to practice giving and receiving feedback.

    6. Objective

      Students will be able to:

      • Explain the purpose of a knowledge base and describe the characteristics of an effective knowledge base article
      • Effectively provide instructions for how to troubleshoot a common network issue
    7. 12.3 Star in a Video!

    8. Description

      In this lesson, students learn about the planning and recording process of making an instructional video. Students will create their own video by first planning the topic and audience as well as writing a script and storyboard. Students will then learn how to record and edit their video.

    9. Objective

      Students will be able to:

      • Explain the role videos play in supporting customers and clients
      • Describe the characteristics of an effective instructional video
      • Develop a plan for an instructional video, including identifying the topic and audience, writing a script, and developing a storyboard
      • Record and edit an instructional video
  13. Risk Management

    1. 13.1 Identifying Risks

    2. Description

      In this lesson, students are introduced to the concept of risk assessment, and students learn about the role of vulnerability scans in detecting weaknesses. Students also learn about honeypots and packet sniffing and explore how these tools can be used to detect vulnerabilities and improve the security of a network.

    3. Objective

      Students will be able to:

      • Explain how vulnerability scans can improve network security
      • Define risk assessment and explain its role in network security
      • Explain how tools such as honeypots and packet sniffing can improve the security of a network
    4. 13.2 Assessing Risks

    5. Description

      In this lesson, students will identify, assess, and prioritize risks based on their potential impacts. Students will utilize prior knowledge to connect to the concept of prioritizing risks. They will learn new types of vulnerabilities such as input and error handling.

    6. Objective

      Students will be able to:

      • Identify risks such as race conditions, input and error handling, and buffer and integer overflow
      • Use a vulnerability scan and database to identify potential impacts and suggestedrisk mitigation
    7. 13.3 Risk Response

    8. Description

      In this lesson, students continue to deepen their understanding of risk assessment. Students learn how to prioritize and respond to different threats by calculating risk, both quantitatively and qualitatively.

    9. Objective

      Students will be able to:

      • Compare and contrast quantitative risk assessments and qualitative risk assessments as well as consider the challenges associated with each
      • Calculate risk using the formula SLE * ARO = ALE
      • Explain the different ways to respond to risk: avoidance, transfer, mitigation, and acceptance
    10. 13.4 Penetration Testing

    11. Description

      In this lesson, students learn about penetration testing and how pen tests extend vulnerability scans by attempting to exploit weaknesses in addition to finding them. Students have the opportunity to engage in a pen test simulation as well as learn about the next evolution of pen testing, chaos engineering.

    12. Objective

      Students will be able to:

      • Define penetration testing and describe the steps involved
    13. 13.5 Risk Management Quiz

    14. Description
    15. Objective
  14. Final Exam

    1. 14.1 Final Exam

    2. Description
    3. Objective
  15. Introduction to Cybersecurity Pretest

    1. 15.1 Introduction to Cybersecurity Pretest

    2. Description

      In this pre-test for the Introduction to Cybersecurity course students and teachers can determine their general skills and current knowledge base before starting the course.

    3. Objective

      SWBAT complete the assessment.

  16. Introduction to Cybersecurity Posttest

    1. 16.1 Introduction to Cybersecurity Posttest

    2. Description

      In this posttest for the Introduction to Cybersecurity course, students and teachers can determine students’ general skills and current knowledge after completing the course.

    3. Objective

      SWBAT complete the assessment.

  17. Project: Digital Forensics

    1. 17.1 Digital Forensics

    2. Description

      In this project, students will work through fictitious forensic cases to practice collecting, examining, analyzing and reporting on data that they have unveiled. In this portion of the project, students will learn what digital forensics is, what types of data can be used, and how the chain of custody must be kept throughout the whole process to protect the integrity of the data.

    3. Objective

      Students will be able to:

      • Explain the digital forensics process
      • Explain the importance of the chain of custody
    4. 17.2 Forensic Case 1: Logs

    5. Description

      In this portion of the project, students will examine and analyze event log data collected from a system firewall. They will report on their findings to either support or refute the claim given in the introduction activity.

    6. Objective

      Students will be able to:

      • Examine and analyze an event log
      • Report on their findings to support or refute a claim
    7. 17.3 Forensic Case 2: File Metadata

    8. Description

      In this portion of the project, students will examine and analyze file metadata collected from a word processing program. They will report on their findings to either support or refute the claim given in the introduction activity.

    9. Objective

      Students will be able to:

      • Examine and analyze file metadata
      • Report on their findings to support or refute a claim
    10. 17.4 Forensic Case 3: Exif Data

    11. Description

      In this portion of the project, students will examine and analyze exif data collected from the inspector tool of an image viewing program. They will also use a command line interface simulation to unveil even more exif data. They will report on their findings to either support or refute the claim given in the introduction activity.

    12. Objective

      Students will be able to:

      • Examine and analyze exif data
      • Report on their findings to support or refute a claim
  18. Cryptocurrency

    1. 18.1 What is Currency?

    2. Description
    3. Objective
    4. 18.2 What is Cryptocurrency?

    5. Description
    6. Objective
    7. 18.3 Intro to Blockchain

    8. Description
    9. Objective
    10. 18.4 Hashing

    11. Description
    12. Objective
    13. 18.5 Proof of Work

    14. Description
    15. Objective
    16. 18.6 Advanced Blockchain

    17. Description
    18. Objective
    19. 18.7 Cryptocurrencies

    20. Description
    21. Objective
    22. 18.8 Bitcoin

    23. Description
    24. Objective
    25. 18.9 Pros, Cons, and Future of Cryptocurrencies

    26. Description
    27. Objective
    28. 18.10 Project: Cryptocurrency Expert Panel Talk

    29. Description
    30. Objective
    31. 18.11 Cryptocurrency Quiz

    32. Description
    33. Objective
  19. Final Course Project

    1. 19.1 Final Course Project

    2. Description

      In this culminating course project, students will get to research and create a presentation with a handout/flyer around either user education or a cyber security career with the intended audience being the general public.

    3. Objective

      Students will be able to:

      • Research and create a presentation and handout around one of the two possible cybersecurity-related topics.
  20. SQL Part II: The SQL

    1. 20.1 More Filtering Practice

    2. Description
    3. Objective
    4. 20.2 Ordering Results

    5. Description
    6. Objective
    7. 20.3 Renaming Fields

    8. Description
    9. Objective
    10. 20.4 Joining Tables

    11. Description
    12. Objective
    13. 20.5 More Joining Tables

    14. Description
    15. Objective
  21. Web Development

    1. 21.1 Introduction to HTML

    2. Description

      In this lesson, students will be introduced to HTML: the language for building web pages. Students will discover why HTML is important and how it works in order to start building their own web pages.

    3. Objective

      Students will be able to:

      • Identify the purpose and applications of HTML
      • Create their first simple web page

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 3.2 Computing facilitates exploration and the discovery of connections in information. (LO 3.2.1)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    4. 21.2 Structure of an HTML Page

    5. Description

      In this lesson, students will level up from learning about simple tags to full HTML documents. Students will discover some new tags that allow information to be placed in different areas of the web page. Students will also learn about the nested tree structure of an HTML document.

    6. Objective

      Students will be able to:

      • Discern the various parts of an HTML page
      • Create fully formed HTML pages

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    7. 21.3 Formatting Text

    8. Description

      In this lesson, students learn about formatting tags that let them modify the appearance of text and make their web pages look clear and aesthetically pleasing.

    9. Objective

      Students will be able to:

      • Apply formatting tags in order to modify the appearance of text and make web pages look clear and aesthetically pleasing

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    10. 21.4 Links

    11. Description

      In this lesson, students learn how to add hyperlinks to their web pages using the <a> tag.

    12. Objective

      Students will be able to:

      • Add and utilize hyperlinks on their webpages

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 3.2 Computing facilitates exploration and the discovery of connections in information. (LO 3.2.1)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    13. 21.5 Images

    14. Description

      In this lesson, students learn how to add images to their own web pages using the <img> tag!

    15. Objective

      Students will be able to:

      • Embed an image in HTML

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    16. 21.6 HTML Lists

    17. Description

      In this lesson, students learn how to add lists to their web pages and practice making different kinds of lists.

    18. Objective

      Students will be able to:

      • Incorporate different kinds of lists to their web pages

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 3.2 Computing facilitates exploration and the discovery of connections in information. (LO 3.2.1)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    19. 21.7 HTML Tables

    20. Description

      In this lesson, students learn how to create and add tables to their web pages!

    21. Objective

      Students will be able to:

      • Create tables in their web pages
      • Explain the benefits of including tables on web pages
      • Compare various ways of displaying information and choose the appropriate format

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 3.2 Computing facilitates exploration and the discovery of connections in information. (LO 3.2.1)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    22. 21.8 HTML Styling

    23. Description

      In this lesson, students will use HTML styling to make their pages visually appealing and unique.

    24. Objective

      Students will be able to:

      • Apply HTML styling to make their web pages more visually appealing and unique

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    25. 21.9 Introduction to CSS

    26. Description

      In this lesson, students will begin using CSS to add styling to their HTML pages.

    27. Objective

      Students will be able to:

      • Describe how CSS adds styling to HTML pages

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    28. 21.10 CSS Select by Tag

    29. Description

      In this lesson, students use CSS tag selectors to select all elements of the same kind (<table>, or <h1> for example) and give them all the same style.

    30. Objective

      Students will be able to:

      • Use CSS tag selectors to select all elements of the same kind and give them all the same style

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    31. 21.11 CSS Select by Class

    32. Description

      In this lesson, students learn to use CSS class selectors to apply CSS styling to all HTML elements that share a specified class which allows students to be more specific when applying their styling.

    33. Objective

      Students will be able to:

      • Use CSS class selectors to apply CSS styling to all HTML units that share a specified class

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    34. 21.12 CSS Select by ID

    35. Description

      In this lesson, students will use CSS Selectors by ID to select a single element to format on a webpage.

    36. Objective

      Students will be able to:

      • Use CSS Selectors by ID to select a single element to format on a webpage

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
    37. 21.13 Viewing Websites

    38. Description

      In this lesson, students learn what a URL is and what happens when they visit a URL.

    39. Objective

      Students will be able to:

      • Describe the process that occurs when typing in a URL, from sending a request and response over the Internet to viewing a webpage

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 6.1 The Internet is a network of autonomous systems. (LO 6.1.1)
      • EU 7.1 Computing enhances communication, interaction, and cognition. (LO 7.1.1)
    40. 21.14 Web Development Quiz

    41. Description

      In this lesson, students complete a summative assessment of the unit’s learning objectives.

    42. Objective

      Students will be able to:

      • Prove their knowledge of HTML structure and CSS styling through a multiple choice quiz
    43. 21.15 Your First Website

    44. Description

      As part of the AP Test, students are required to complete two Performance Tasks (PTs). Performance tasks are meant to be project-based challenges that touch multiple concepts from the course that produce a digital artifact. In this Practice PT, students will be developing their first digital artifact: their very own website! This website will start off as their own personal homepage and as students progress through the course, they will keep adding links to their favorite projects. By the end of the course, this homepage will serve as their own personal portfolio website showcasing their work!

    45. Objective

      Students will be able to:

      • Create their own website from scratch, hosted at their own custom domain

      Enduring Understandings

      This lesson builds toward the following Enduring Understandings (EUs) and Learning Objectives (LOs). Students should understand that…

      • EU 1.1 Creative development can be an essential process for creating computational artifacts. (LO 1.1.1)
      • EU 1.2 Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem. (LOs 1.2.1, 1.2.3, 1.2.5)
      • EU 5.1 Programs can be developed for creative expression, to satisfy personal curiosity, to create new knowledge, or to solve problems (to help people, organizations, or society). (LOs 5.1.1, 5.1.2)
  22. Midterm

    1. 22.1 Midterm

    2. Description
    3. Objective
  23. Extra

    1. 23.1 Lesson 1

    2. Description
    3. Objective
  24. Cybersecurity Level 1 Certification Practice

    1. 24.1 Cybersecurity Essentials

    2. Description
    3. Objective
    4. 24.2 Cryptography

    5. Description
    6. Objective
    7. 24.3 System Administration

    8. Description
    9. Objective
    10. 24.4 IT Concepts

    11. Description
    12. Objective
    13. 24.5 IT Infrastructure

    14. Description
    15. Objective
    16. 24.6 Digital Safety and Data Security

    17. Description
    18. Objective
    19. 24.7 Mixed Practice Test

    20. Description
    21. Objective