Please enable JavaScript to use CodeHS

South Carolina Cybersecurity Fundamentals - Outline

  1. What is Cybersecurity?

    1. 1.1 Welcome to Cybersecurity Fundamentals

    2. Notes 1.1.1 Course Introduction
    3. Free Response 1.1.2 Course Goals
    4. 1.2 Module Overview - Cybersecurity

    5. Video 1.2.1 Welcome to Cybersecurity
    6. Check for Understanding 1.2.2 Welcome to Cybersecurity
    7. Example 1.2.3 Intruder Alert!
    8. Free Response 1.2.4 Cybersecurity and You
    9. Free Response 1.2.5 Course Goals
    10. 1.3 What is Cybersecurity?

    11. Video 1.3.1 What is Cybersecurity?
    12. Check for Understanding 1.3.2 What is Cybersecurity?
    13. Connection 1.3.3 City Services Ransomware
    14. Free Response 1.3.4 Ransomware Reflection
    15. Example 1.3.5 Ransomware Simulator
    16. Connection 1.3.6 Internet of Things
    17. Connection 1.3.7 Hackers vs. Smart Homes
    18. Free Response 1.3.8 Internet of Things Reflection
    19. 1.4 Impact of Cybersecurity

    20. Video 1.4.1 Impact of Cybersecurity
    21. Check for Understanding 1.4.2 Impact of Cybersecurity
    22. Example 1.4.3 Phishing Simulator
    23. Connection 1.4.4 Phishing for Your Info
    24. Free Response 1.4.5 Phishing Reflection
    25. Connection 1.4.6 Cyberterrorism
    26. Free Response 1.4.7 Cyberterrorism Response
    27. Connection 1.4.8 Cyber Game
    28. Free Response 1.4.9 Cyber Game Reflection
    29. 1.5 The CIA Triad

    30. Video 1.5.1 CIA Triad
    31. Check for Understanding 1.5.2 CIA Triad
    32. Free Response 1.5.3 Which part of the CIA Triad?
    33. Free Response 1.5.4 Which part of the CIA Triad?
    34. Free Response 1.5.5 Breach of Confidentiality
    35. Free Response 1.5.6 Breach of Availability
    36. Free Response 1.5.7 CIA Connections
    37. 1.6 What is Cybersecurity? Quiz

    38. Unit Quiz 1.6.1 What is Cybersecurity? Quiz
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Example 2.1.3 Social Media Clean-up
    5. Free Response 2.1.4 Building a Positive Digital Footprint
    6. Connection 2.1.5 Right to be Forgotten?
    7. Free Response 2.1.6 Right to be Forgotten
    8. Free Response 2.1.7 What is your Digital Footprint?
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Free Response 2.2.5 Stopping Cyberbullying
    15. 2.3 Internet Safety

    16. Video 2.3.1 Internet Safety
    17. Check for Understanding 2.3.2 Internet Safety
    18. Free Response 2.3.3 Scenario: School Stranger
    19. Free Response 2.3.4 Scenario: Vacation Pals
    20. Free Response 2.3.5 Staying Safe
    21. 2.4 Privacy & Security

    22. Video 2.4.1 What is Data Privacy & Security?
    23. Check for Understanding 2.4.2 Privacy & Security Quiz
    24. Connection 2.4.3 Google Privacy Policy Search
    25. Free Response 2.4.4 Google Privacy Policy Search
    26. Example 2.4.5 Guess: Password List
    27. Example 2.4.6 Guess: Using an Algorithm
    28. Example 2.4.7 Guess: Brute Force
    29. Connection 2.4.8 How Strong is your Password?
    30. Free Response 2.4.9 How Strong is your password?
    31. Example 2.4.10 You Can Be Tracked!
    32. 2.5 Information Literacy

    33. Video 2.5.1 Information Literacy
    34. Check for Understanding 2.5.2 Information Literacy
    35. Free Response 2.5.3 Effective Internet Searches
    36. Connection 2.5.4 Evaluate the Source 1
    37. Free Response 2.5.5 Respond: Evaluate the Source 1
    38. Notes 2.5.6 Evaluate the Source 2
    39. Free Response 2.5.7 Respond: Evaluate the Source 2
    40. Connection 2.5.8 Hero Pig?
    41. Free Response 2.5.9 Respond: Hero Pig?
    42. 2.6 Creative Credit & Copyright

    43. Video 2.6.1 Creative Credit and Copyright
    44. Check for Understanding 2.6.2 Creative Credit and Copyright
    45. Free Response 2.6.3 Cite!
    46. Connection 2.6.4 Exploring Creative Commons
    47. Free Response 2.6.5 Respond: Creative Commons
    48. Free Response 2.6.6 Task: Finding Images
    49. Free Response 2.6.7 Reflection: Why is Copyright Important?
    50. 2.7 Hacking Ethics

    51. Video 2.7.1 Hacking Ethics & Legality
    52. Check for Understanding 2.7.2 Hacking Ethics & Legality
    53. Connection 2.7.3 Penetration Testing
    54. Free Response 2.7.4 Reflection: Penetration Testing
    55. Connection 2.7.5 Hack the Pentagon?
    56. Free Response 2.7.6 Reflection: Hack the Pentagon
    57. Check for Understanding 2.7.7 Ethical Hacker Agreement
    58. 2.8 Digital Citizenship and Cybersecurity Quiz

    59. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Example 4.1.3 Cryptogram Game!
    5. Video 4.1.4 Why encrypt?
    6. Check for Understanding 4.1.5 Why encrypt?
    7. Example 4.1.6 Encrypt/Decrypt
    8. 4.2 History of Cryptography

    9. Video 4.2.1 Cryptography: A Brief History
    10. Check for Understanding 4.2.2 Cryptography History Quiz
    11. Connection 4.2.3 How the Enigma Worked
    12. Free Response 4.2.4 How the Enigma Worked
    13. Connection 4.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 4.2.6 The Future of Cybersecurity
    15. 4.3 Basic Crypto Systems: Caesar Cipher

    16. Video 4.3.1 Caesar Cipher
    17. Check for Understanding 4.3.2 Caesar Cipher
    18. Example 4.3.3 Caesar Cipher Encryption
    19. Example 4.3.4 Decrypt Caesar's Cipher!
    20. 4.4 Basic Crypto Systems: Cracking Caesar

    21. Video 4.4.1 Cracking Caesar Cipher
    22. Check for Understanding 4.4.2 Cracking Caesar Cipher
    23. Example 4.4.3 Cracking Caesar with Brute Force
    24. Example 4.4.4 Letter Frequency and Caesar
    25. Free Response 4.4.5 Examining Caesar Cipher
    26. 4.5 Basic Crypto Systems: Vigenere Cipher

    27. Video 4.5.1 Vigenere Cipher
    28. Check for Understanding 4.5.2 Vigenere Cipher
    29. Example 4.5.3 Vigenere Cipher Example
    30. Example 4.5.4 Letter Frequency and Vigenere Cipher
    31. Free Response 4.5.5 Examining Vigenere Cipher
    32. Example 4.5.6 Improving Vigenere
    33. 4.6 The ABCs of Cryptography Quiz

    34. Unit Quiz 4.6.1 The ABCs of Cryptography Quiz
  5. Advanced Cryptography

    1. 5.1 Welcome to Advanced Cybersecurity!

    2. Notes 5.1.1 Course Introduction
    3. Connection 5.1.2 Cybersecurity 101
    4. Free Response 5.1.3 Cyber Heat Map
    5. Free Response 5.1.4 Career Pathways
    6. Connection 5.1.5 Starting with Cryptography
    7. Free Response 5.1.6 Course Goals
    8. 5.2 Encryption Algorithms

    9. Video 5.2.1 Encryption Algorithms
    10. Check for Understanding 5.2.2 Ciphers Quiz
    11. Free Response 5.2.3 Enhanced Caesar Cipher
    12. Free Response 5.2.4 Mixed Alphabet Cipher
    13. Example 5.2.5 Pigpen Encoder
    14. Free Response 5.2.6 Pigpen Cipher
    15. Free Response 5.2.7 Rail Fence Cipher
    16. Video 5.2.8 Encryption Standards
    17. Check for Understanding 5.2.9 Encryption Standards Quiz
    18. 5.3 Advanced Cryptography

    19. Video 5.3.1 Advanced Cryptography
    20. Check for Understanding 5.3.2 Advanced Cryptography
    21. Connection 5.3.3 Public Key Cryptography for Non-Geeks
    22. Free Response 5.3.4 Examining Public Key Cryptography
    23. Connection 5.3.5 Public Key Cryptography
    24. Free Response 5.3.6 Public Key Cryptography
    25. 5.4 Hash Functions

    26. Video 5.4.1 Hash Functions
    27. Check for Understanding 5.4.2 Hash Functions
    28. Connection 5.4.3 Google Shattered Crypto Algorithm
    29. Free Response 5.4.4 Hash Functions in the News
    30. Connection 5.4.5 Using a Hash Generator
    31. Free Response 5.4.6 Hash Generator
    32. Connection 5.4.7 Password Salting
    33. Free Response 5.4.8 Password Salting
    34. 5.5 Hash Function Development

    35. Video 5.5.1 Hash Function Development
    36. Check for Understanding 5.5.2 Hash Function Development
    37. Example 5.5.3 Modulo Math Calculator
    38. Example 5.5.4 Understanding Modulo Math
    39. Example 5.5.5 Modulo Game!
    40. Exercise 5.5.6 Develop a Simple Hash Function
    41. 5.6 Asymmetric Encryption

    42. Video 5.6.1 Asymmetric Encryption
    43. Check for Understanding 5.6.2 Asymmetric Encryption Quiz
    44. Example 5.6.3 Diffie-Hellman Key Exchange
    45. Free Response 5.6.4 Affine Cipher
    46. Free Response 5.6.5 Trapdoor Functions
    47. Notes 5.6.6 RSA Encryption
    48. Free Response 5.6.7 RSA Reflection
    49. 5.7 Digital Certificates

    50. Video 5.7.1 Digital Certificates
    51. Check for Understanding 5.7.2 Digital Certificates
    52. Connection 5.7.3 SSL Explained
    53. Free Response 5.7.4 SSL Explained Response
    54. Free Response 5.7.5 Digital Certificate Connection
    55. Connection 5.7.6 In The News
    56. Free Response 5.7.7 In The News Response
    57. Free Response 5.7.8 Become a Certificate Authority!
    58. 5.8 Advanced Cryptography Quiz

    59. Unit Quiz 5.8.1 Advanced Cryptography Quiz
  6. Project: Steganography

    1. 6.1 Project: Steganography

    2. Video 6.1.1 What is Steganography?
    3. Connection 6.1.2 Government Surveillance and Reality Winner
    4. Free Response 6.1.3 Government Surveillance and Reality Winner
    5. Connection 6.1.4 Data Hiding and Extraction
    6. Free Response 6.1.5 Reflect: Data Hiding and Extraction
    7. Example 6.1.6 Hide Text
    8. Example 6.1.7 Hidden Message
    9. Free Response 6.1.8 Your turn: Encryption Algorithm
    10. Challenge 6.1.9 Your turn: Image Creation
    11. Free Response 6.1.10 Final Algorithm and Partner Decode
    12. Free Response 6.1.11 Final Reflection
  7. System Administration

    1. 7.1 Operating Systems

    2. Video 7.1.1 Operating Systems
    3. Check for Understanding 7.1.2 Operating Systems Quiz
    4. Example 7.1.3 Detect My OS
    5. Example 7.1.4 Windows OS Installation Simulation
    6. Free Response 7.1.5 Installing an OS
    7. Connection 7.1.6 Upgrading a Mac OS
    8. 7.2 Comparing Operating Systems

    9. Video 7.2.1 Comparing Operating Systems
    10. Check for Understanding 7.2.2 Comparing Operating Systems Quiz
    11. Example 7.2.3 Windows Simulation
    12. Example 7.2.4 MacOS Simulation
    13. Connection 7.2.5 Choose a Linux Distro!
    14. Free Response 7.2.6 Which would you choose?
    15. 7.3 Compatibility

    16. Video 7.3.1 Compatibility
    17. Check for Understanding 7.3.2 Compatibility Quiz
    18. Example 7.3.3 What Processor? Windows
    19. Example 7.3.4 What Processor? Mac
    20. Free Response 7.3.5 What Processor are you running?
    21. 7.4 Software and Applications

    22. Video 7.4.1 Software and Applications
    23. Check for Understanding 7.4.2 Software and Applications Quiz
    24. Example 7.4.3 Spreadsheet Simulation
    25. Example 7.4.4 Messaging Simulation
    26. Example 7.4.5 Kanban Board Simulation
    27. Free Response 7.4.6 Software Simulations
    28. 7.5 Software Licenses

    29. Video 7.5.1 Software Licenses
    30. Check for Understanding 7.5.2 Software Licenses Quiz
    31. Free Response 7.5.3 Do I need a Software License?
    32. Free Response 7.5.4 Is This Original?
    33. 7.6 Application Security

    34. Video 7.6.1 Application Security
    35. Check for Understanding 7.6.2 Application Security
    36. Example 7.6.3 Windows Updates
    37. Connection 7.6.4 Windows Defender Antivirus
    38. Free Response 7.6.5 Windows Defender Antivirus
    39. Free Response 7.6.6 CodeHS System Restore
    40. 7.7 Browser Configuration

    41. Video 7.7.1 Browser Configuration
    42. Check for Understanding 7.7.2 Browser Configuration
    43. Connection 7.7.3 Cached CodeHS
    44. Free Response 7.7.4 Cached CodeHS
    45. Example 7.7.5 Is Your Popup Blocker On?
    46. Free Response 7.7.6 Browser Extensions Lab
    47. 7.8 System Administration

    48. Video 7.8.1 User Accounts
    49. Check for Understanding 7.8.2 User Accounts Quiz
    50. Free Response 7.8.3 User Accounts
    51. Free Response 7.8.4 Shared Folders and Files
    52. Video 7.8.5 Host Security
    53. Check for Understanding 7.8.6 Host Security Quiz
    54. Free Response 7.8.7 Security Baseline
    55. 7.9 Access Control

    56. Video 7.9.1 Access Control
    57. Check for Understanding 7.9.2 Access Control
    58. Example 7.9.3 Multifactor Authentication
    59. Example 7.9.4 Two Factor Authentication
    60. Free Response 7.9.5 Two Factor Authentication Reflection
    61. Connection 7.9.6 RADIUS Overview with AAA Protocol
    62. Connection 7.9.7 RADIUS Server Access Control
    63. Free Response 7.9.8 RADIUS Reflection
    64. 7.10 Command Line Interface

    65. Notes 7.10.1 Linux/MacOS vs. Windows
    66. Video 7.10.2 Command Line Interface
    67. Check for Understanding 7.10.3 Command Line Interface Quiz
    68. Resource 7.10.4 Command Equivalents
    69. Video 7.10.5 Windows Command Prompt
    70. Free Response 7.10.6 Windows Command Prompt
    71. Free Response 7.10.7 Directory Directions
    72. Connection 7.10.8 Neural Interface?
    73. Free Response 7.10.9 Neural Interface?
    74. 7.11 System Administration Quiz

    75. Survey 7.11.1 Mindsets
    76. Unit Quiz 7.11.2 System Administration Quiz
  8. Cyber Defense

    1. 8.1 Network Attacks

    2. Video 8.1.1 Network Attacks Overview
    3. Check for Understanding 8.1.2 Network Attacks Quiz
    4. Notes 8.1.3 Check for Vulnerabilities
    5. Connection 8.1.4 Bug Bounty Hunting
    6. Free Response 8.1.5 Bug Bounty Hunting
    7. Connection 8.1.6 Common Port Targets
    8. Example 8.1.7 Port Scanner Simulation
    9. Free Response 8.1.8 Open Port Reflection
    10. 8.2 Malware Types and Prevention

    11. Video 8.2.1 Malware Types and Prevention
    12. Check for Understanding 8.2.2 Malware Types and Prevention
    13. Connection 8.2.3 How Anti-malware Works
    14. Free Response 8.2.4 How Anti-malware Works
    15. Free Response 8.2.5 OS Malware Security
    16. Free Response 8.2.6 Reverse Engineering Malware
    17. 8.3 What is SQL?

    18. Notes 8.3.1 What is SQL Overview
    19. Video 8.3.2 Intro to SQL
    20. Check for Understanding 8.3.3 Quiz: What is SQL?
    21. Video 8.3.4 How to Structure Data in SQL
    22. Check for Understanding 8.3.5 How to Structure Data in SQL
    23. Example 8.3.6 SQL Tables
    24. Free Response 8.3.7 SQL Tables Response
    25. 8.4 Basic Querying in SQL

    26. Video 8.4.1 The SELECT Statement
    27. Check for Understanding 8.4.2 Basic Querying in SQL
    28. Example 8.4.3 Our First SELECT Statement
    29. Exercise 8.4.4 Your First SELECT Statement
    30. Video 8.4.5 More SELECT Statement
    31. Check for Understanding 8.4.6 More SELECT Statement
    32. Example 8.4.7 Selecting Specific Columns
    33. Exercise 8.4.8 Harry Potter Names
    34. 8.5 Filtering Queries in SQL

    35. Video 8.5.1 The WHERE Clause
    36. Check for Understanding 8.5.2 Condition Operators
    37. Example 8.5.3 Ravenclaw House
    38. Example 8.5.4 People in Gryffindor
    39. Example 8.5.5 Filter By ID
    40. Exercise 8.5.6 The Weasleys
    41. Exercise 8.5.7 The Potters
    42. 8.6 Common Security Problems

    43. Video 8.6.1 Common Security Problems
    44. Check for Understanding 8.6.2 Common Security Problems
    45. Connection 8.6.3 Meet Security Engineers at Google
    46. Free Response 8.6.4 Security Engineering Reflection
    47. Video 8.6.5 Living in a Digital World
    48. Free Response 8.6.6 Living in a Digital World
    49. 8.7 SQL Injection Overview

    50. Video 8.7.1 SQL Injection Overview
    51. Check for Understanding 8.7.2 SQL Injection Overview
    52. Connection 8.7.3 Equifax Security Breach
    53. Connection 8.7.4 Equifax Exposed Millions
    54. Free Response 8.7.5 Equifax SQL Injection Attack
    55. Example 8.7.6 SQLi
    56. 8.8 Types of SQLi and Prevention

    57. Video 8.8.1 Types of SQLi
    58. Check for Understanding 8.8.2 Types of SQLi
    59. Video 8.8.3 Preventing SQLi
    60. Check for Understanding 8.8.4 Preventing SQLi
    61. Connection 8.8.5 Mitigating SQL Injection
    62. Free Response 8.8.6 Reflection: Mitigating SQL Injection
    63. Connection 8.8.7 SQL Injection Practice
    64. 8.9 Software Security Quiz

    65. Unit Quiz 8.9.1 Software Security Quiz
  9. Project: Security Assessment Report

    1. 9.1 Project: Security Assessment Report

    2. Notes 9.1.1 Project Requirements
    3. Connection 9.1.2 Supercar Showdown Website
    4. Free Response 9.1.3 SQL Injection Testing
    5. Resource 9.1.4 SQLi Testing Handout
    6. Free Response 9.1.5 Security Assessment Report
    7. Free Response 9.1.6 Project Reflection
  10. Networking Fundamentals

    1. 10.1 Introduction to the Internet

    2. Video 10.1.1 Welcome to the Internet
    3. Check for Understanding 10.1.2 Intro to the Internet
    4. Connection 10.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 10.1.4 Connectivity Lab Reflection
    6. 10.2 Notational Systems

    7. Video 10.2.1 Number Systems
    8. Check for Understanding 10.2.2 Number Systems Quiz
    9. Notes 10.2.3 Number Base Tool
    10. Video 10.2.4 Decimal to Binary
    11. Check for Understanding 10.2.5 Decimal to Binary Quiz
    12. Exercise 10.2.6 Binary Game
    13. 10.3 Data Representation

    14. Video 10.3.1 Hexadecimal
    15. Check for Understanding 10.3.2 Hexadecimal Quiz
    16. Exercise 10.3.3 Binary to Hex Game
    17. Video 10.3.4 Encoding Text with Binary
    18. Check for Understanding 10.3.5 Encoding Text with Binary Quiz
    19. Example 10.3.6 Custom Encoding
    20. Example 10.3.7 Bits to ASCII
    21. Exercise 10.3.8 Hello World in Bits
    22. 10.4 Internet Hardware and Sending Information

    23. Video 10.4.1 Internet Hardware
    24. Check for Understanding 10.4.2 Internet Hardware
    25. Video 10.4.3 Sending Information
    26. Check for Understanding 10.4.4 Sending Information
    27. Connection 10.4.5 The Internet is in the Ocean
    28. Free Response 10.4.6 Internet in the Ocean Reflection
    29. 10.5 Internet Addresses

    30. Video 10.5.1 Internet Addresses
    31. Check for Understanding 10.5.2 Internet Addresses
    32. Free Response 10.5.3 The Need for Addresses
    33. Connection 10.5.4 IPv4 vs. IPv6
    34. Free Response 10.5.5 Reflection: IPv4 vs IPv6
    35. 10.6 Domain Name System (DNS)

    36. Video 10.6.1 Domain Name System (DNS)
    37. Check for Understanding 10.6.2 Domain Name System
    38. Connection 10.6.3 How Does DNS Work?
    39. Free Response 10.6.4 How Does DNS Work?
    40. 10.7 Routing

    41. Video 10.7.1 Routing
    42. Check for Understanding 10.7.2 Routing
    43. Free Response 10.7.3 Redundancy
    44. 10.8 Packets & Protocols

    45. Video 10.8.1 Packets
    46. Check for Understanding 10.8.2 Packets
    47. Video 10.8.3 Protocols
    48. Check for Understanding 10.8.4 Protocols
    49. Connection 10.8.5 How the Internet Works
    50. Free Response 10.8.6 The Journey of an Image
    51. 10.9 Viewing a Webpage

    52. Video 10.9.1 Viewing a Webpage
    53. Check for Understanding 10.9.2 Viewing a Webpage
    54. Free Response 10.9.3 Explaining a URL
    55. Connection 10.9.4 Net Neutrality Explained
    56. Connection 10.9.5 FCCs Net Neutrality Rules Officially Repealed
    57. Free Response 10.9.6 Take a Side on Net Neutrality
    58. Connection 10.9.7 Net Neutrality and Cybersecurity
    59. Free Response 10.9.8 Net Neutrality and Cybersecurity Research
    60. 10.10 Impact of the Internet

    61. Video 10.10.1 Impact of the Internet
    62. Check for Understanding 10.10.2 Impact of the Internet
    63. Connection 10.10.3 What is the Digital Divide?
    64. Free Response 10.10.4 What is the Digital Divide?
    65. 10.11 Networking Fundamentals Quiz

    66. Survey 10.11.1 Mindsets
    67. Unit Quiz 10.11.2 Networking Fundamentals Quiz
  11. IT Infrastructure

    1. 11.1 Internal Components

    2. Video 11.1.1 Internal Components
    3. Check for Understanding 11.1.2 Internal Components
    4. Connection 11.1.3 Build a Computer
    5. Free Response 11.1.4 Build a Computer
    6. Example 11.1.5 Test Your Brain's RAM!
    7. Free Response 11.1.6 Test Your Brain's RAM! Reflection
    8. 11.2 Peripheral Devices

    9. Video 11.2.1 Peripheral Devices
    10. Check for Understanding 11.2.2 Peripheral Devices
    11. Free Response 11.2.3 Personalized Peripherals
    12. Free Response 11.2.4 IT Help
    13. Free Response 11.2.5 Your Ideal Computer Setup
    14. 11.3 Network Devices

    15. Video 11.3.1 Network Devices
    16. Check for Understanding 11.3.2 Network Devices
    17. Connection 11.3.3 Speed Test
    18. Free Response 11.3.4 Speed Test
    19. Connection 11.3.5 Fiber Optics Bend Light!
    20. Free Response 11.3.6 Fiber Optics Bend Light!
    21. Connection 11.3.7 Ethernet Standards
    22. Free Response 11.3.8 Ethernet Standards
    23. Free Response 11.3.9 Network Troubleshooting
    24. 11.4 Storage Options

    25. Video 11.4.1 Storage Options
    26. Check for Understanding 11.4.2 Storage Options Quiz
    27. Connection 11.4.3 Security of Cloud Storage
    28. Free Response 11.4.4 Security of Cloud Storage
    29. Free Response 11.4.5 Storage Suggestions
    30. 11.5 Network Options

    31. Video 11.5.1 Network Options
    32. Check for Understanding 11.5.2 Network Options Quiz
    33. Connection 11.5.3 What is an SSID?
    34. Free Response 11.5.4 What is an SSID?
    35. Free Response 11.5.5 Wireless Network Setup
    36. 11.6 Network Communication

    37. Video 11.6.1 Network Communication
    38. Check for Understanding 11.6.2 Network Communication Quiz
    39. Example 11.6.3 Setting up a Firewall
    40. Free Response 11.6.4 iptables
    41. Notes 11.6.5 iptables simulation
    42. Connection 11.6.6 What is Virtualization?
    43. Free Response 11.6.7 Virtualization Response
    44. 11.7 Network Management

    45. Notes 11.7.1 Linux/MacOS vs. Windows
    46. Video 11.7.2 Network Management
    47. Check for Understanding 11.7.3 Network Management Quiz
    48. Example 11.7.4 MacOS Terminal Simulation
    49. Example 11.7.5 Windows Command Prompt Simulation
    50. Video 11.7.6 Windows Command Prompt Spy
    51. Free Response 11.7.7 Windows Command Prompt Spy
    52. Notes 11.7.8 SSH Logs
    53. Example 11.7.9 SSH Logs
    54. Free Response 11.7.10 SSH Logs Submission
    55. 11.8 Private Networks

    56. Video 11.8.1 IP and MAC Addresses
    57. Check for Understanding 11.8.2 IP and MAC Addresses Quiz
    58. Example 11.8.3 Intranet Permissions
    59. Free Response 11.8.4 Coffee Shop: Design an Intranet
    60. Video 11.8.5 DMZs and VPNs
    61. Check for Understanding 11.8.6 DMZs and VPNs Quiz
    62. Connection 11.8.7 Protecting Privacy with VPNs
    63. Free Response 11.8.8 Protecting Privacy with VPNs
    64. Free Response 11.8.9 Coffee Shop: Network Plan
    65. Free Response 11.8.10 Coffee Shop: Network Diagram
    66. Video 11.8.11 SOHO Network
    67. Example 11.8.12 Network Topologies
    68. 11.9 IT Infrastructure Quiz

    69. Unit Quiz 11.9.1 IT Infrastructure Quiz
  12. Project: Troubleshooting

    1. 12.1 Methodology

    2. Notes 12.1.1 Troubleshooting Methodology
    3. Free Response 12.1.2 Identify the Problem
    4. Free Response 12.1.3 Research Solutions
    5. Free Response 12.1.4 Establish a Theory
    6. Free Response 12.1.5 Test the Theory
    7. Free Response 12.1.6 Fix the Problem!
    8. 12.2 Support Practice

    9. Exercise 12.2.1 Signal Strength
    10. Exercise 12.2.2 Interference
  13. Risk Management

    1. 13.1 Identifying Risks

    2. Video 13.1.1 Identifying Risks
    3. Check for Understanding 13.1.2 Identifying Risks Quiz
    4. Connection 13.1.3 What is a Honeypot?
    5. Connection 13.1.4 Honeypot Attacks
    6. Free Response 13.1.5 Honeypot Attacks
    7. Connection 13.1.6 Whois
    8. Free Response 13.1.7 Whois
    9. Connection 13.1.8 Packet Sniffing
    10. Free Response 13.1.9 Packet Sniffing Response
    11. Free Response 13.1.10 Breach Trends
    12. 13.2 Assessing Risks

    13. Notes 13.2.1 Assessing Risks
    14. Free Response 13.2.2 Malware Risk Assessment
    15. Free Response 13.2.3 Poor Password Assessment
    16. Free Response 13.2.4 Social Engineering Assessment
    17. Video 13.2.5 Assessing Risks
    18. Check for Understanding 13.2.6 Assessing Risks Quiz
    19. Connection 13.2.7 End-of-Life OS
    20. Free Response 13.2.8 End-of-Life Proposal
    21. Example 13.2.9 Input Handling
    22. Free Response 13.2.10 Input Handling Responses
    23. Example 13.2.11 Input Validation
    24. Free Response 13.2.12 Input Validation Responses
    25. 13.3 Risk Response

    26. Video 13.3.1 Risk Response
    27. Check for Understanding 13.3.2 Risk Response
    28. Free Response 13.3.3 Defense in Depth Risk Mitigation
    29. Connection 13.3.4 Sample Risk Assessment Report
    30. Free Response 13.3.5 Sample Risk Assessment Reflection
    31. Connection 13.3.6 Delta Outage Video
    32. Free Response 13.3.7 Delta Outage Reflection
    33. Connection 13.3.8 What Happens When Your Servers Go Down
    34. Free Response 13.3.9 What Happens When Your Servers Go Down Reflection
    35. Free Response 13.3.10 Server Upgrade Memo
    36. 13.4 Penetration Testing

    37. Video 13.4.1 Penetration Testing
    38. Check for Understanding 13.4.2 Penetration Testing
    39. Connection 13.4.3 Penetration Test Report
    40. Free Response 13.4.4 Penetration Test Report
    41. Notes 13.4.5 Chaos Engineering
    42. Free Response 13.4.6 Chaos Engineering Reflection
    43. Resource 13.4.7 Pen Test Simulation Handout
    44. Exercise 13.4.8 Pen Test Simulation: Active Recon
    45. Exercise 13.4.9 Pen Test Simulation: Exploit Vulnerabilities
    46. 13.5 Risk Management Quiz

    47. Unit Quiz 13.5.1 Risk Management Quiz
  14. Final Exam

    1. 14.1 Final Exam

    2. Final 14.1.1 Final Exam
  15. What's Next?

    1. 15.1 After Fundamentals of Cybersecurity

    2. Notes 15.1.1 Cybersecurity Pathways
    3. Connection 15.1.2 CodeHS Advanced Cybersecurity
    4. Notes 15.1.3 College Pathway
    5. Connection 15.1.4 Certification Pathway
    6. Connection 15.1.5 Career Spotlight
    7. Free Response 15.1.6 My Pathway
  16. Programming Fundamentals

    1. 16.1 Programming Concepts

    2. Video 16.1.1 Programming Concepts
    3. Check for Understanding 16.1.2 Programming Concepts Quiz
    4. Connection 16.1.3 Compilers vs. Interpreters
    5. Free Response 16.1.4 Compilers vs. Interpreters
    6. Example 16.1.5 Variables in Action
    7. Example 16.1.6 Data Types using Typeof
    8. Example 16.1.7 Basic Variables
    9. Exercise 16.1.8 Daily Activities
    10. 16.2 Programming with Karel

    11. Notes 16.2.1 Learning to Program
    12. Video 16.2.2 Programming With Karel
    13. Check for Understanding 16.2.3 Quiz: Karel Commands
    14. Example 16.2.4 Our First Karel Program
    15. Exercise 16.2.5 Your First Karel Program
    16. Video 16.2.6 Functions in Karel
    17. Check for Understanding 16.2.7 Functions in Karel Quiz
    18. Example 16.2.8 Turn Around
    19. Example 16.2.9 Digging Karel
    20. Exercise 16.2.10 Backflip
    21. 16.3 Looping

    22. Video 16.3.1 For Loops
    23. Check for Understanding 16.3.2 For Loops Quiz
    24. Example 16.3.3 Take 'em All
    25. Example 16.3.4 For Loop Square
    26. Exercise 16.3.5 Lots of Hurdles
    27. Video 16.3.6 While Loops in Karel
    28. Check for Understanding 16.3.7 While Loops in Karel Quiz
    29. Example 16.3.8 Move to Wall
    30. Example 16.3.9 Big Tower
    31. Exercise 16.3.10 Follow The Yellow Ball Road
    32. 16.4 Branching

    33. Video 16.4.1 If/Else Statements
    34. Check for Understanding 16.4.2 If/Else Statements Quiz
    35. Example 16.4.3 If/Else Statements
    36. Example 16.4.4 One Ball in Each Spot
    37. Exercise 16.4.5 Right Side Up
    38. Badge 16.4.6 Programming with Karel Badge
    39. 16.5 Arrays and Objects

    40. Notes 16.5.1 More JS Topics
    41. Video 16.5.2 Arrays and Objects
    42. Check for Understanding 16.5.3 Arrays and Objects
    43. Example 16.5.4 Making an Array
    44. Exercise 16.5.5 List of Places to Travel
    45. Exercise 16.5.6 List of Prime Numbers
    46. Example 16.5.7 Phonebook
    47. Exercise 16.5.8 Sidekicks
    48. 16.6 Organizational Techniques

    49. Video 16.6.1 Organizational Techniques
    50. Check for Understanding 16.6.2 Organizational Techniques Quiz
    51. Example 16.6.3 Hurdle Karel
    52. Exercise 16.6.4 One Ball in Each Spot
    53. Exercise 16.6.5 The Two Towers
    54. Example 16.6.6 Interactive Sequence Diagram
    55. 16.7 Programming Fundamentals Quiz

    56. Survey 16.7.1 Mindsets
    57. Unit Quiz 16.7.2 Programming Fundamentals Quiz
  17. Software Security

    1. 17.1 Inside Web Apps

    2. Video 17.1.1 Inside Web Apps
    3. Check for Understanding 17.1.2 Inside Web Apps
    4. Free Response 17.1.3 Using View Page Source
    5. Example 17.1.4 Recreate a Webpage?
    6. Connection 17.1.5 Getting Started with OWASP
    7. Free Response 17.1.6 Getting Started with OWASP
    8. 17.2 Developer Tools

    9. Video 17.2.1 Developer Tools
    10. Check for Understanding 17.2.2 Developer Tools
    11. Free Response 17.2.3 Using the Developer Tools
    12. Exercise 17.2.4 Console Secrets
    13. Example 17.2.5 Local Storage
    14. Connection 17.2.6 The Top Cybersecurity Blogs and Websites
    15. Free Response 17.2.7 Selecting a Site to Follow
    16. 17.3 The Value of Data

    17. Video 17.3.1 The Value of Data
    18. Check for Understanding 17.3.2 The Value of Data Quiz
    19. Notes 17.3.3 Exploring Data Visualizations
    20. Connection 17.3.4 US Recorded Music Revenue
    21. Connection 17.3.5 National Parks
    22. Connection 17.3.6 March Madness
    23. Connection 17.3.7 Captain Marvel
    24. Free Response 17.3.8 Respond: Visualizations
    25. Free Response 17.3.9 Free Response: Choosing a Visualization
    26. Free Response 17.3.10 Reflection: Design a Survey
    27. 17.4 Databases

    28. Video 17.4.1 Databases
    29. Check for Understanding 17.4.2 Databases
    30. Connection 17.4.3 Database Administrator Career
    31. Free Response 17.4.4 Database Administrator Career
    32. Video 17.4.5 Parts of a Database
    33. Check for Understanding 17.4.6 Parts of a Database
    34. Connection 17.4.7 SQL Database Diagram
    35. Free Response 17.4.8 SQL Database Diagram
    36. Free Response 17.4.9 Schema Brainstorm
    37. 17.5 Clients and Servers

    38. Video 17.5.1 Clients and Servers
    39. Check for Understanding 17.5.2 Clients and Servers
    40. Connection 17.5.3 Inside a Google Data Center
    41. Free Response 17.5.4 Inside a Google Data Center
    42. Connection 17.5.5 Cloud Vulnerabilities
    43. Free Response 17.5.6 Cloud Vulnerabilities Response
    44. Video 17.5.7 Client-Server Model
    45. Check for Understanding 17.5.8 Client-Server Model
    46. Connection 17.5.9 The Future of User Privacy
    47. Free Response 17.5.10 The Future of User Privacy
    48. 17.6 What is SQL?

    49. Notes 17.6.1 What is SQL Overview
    50. Video 17.6.2 Intro to SQL
    51. Check for Understanding 17.6.3 Quiz: What is SQL?
    52. Video 17.6.4 How to Structure Data in SQL
    53. Check for Understanding 17.6.5 How to Structure Data in SQL
    54. Example 17.6.6 SQL Tables
    55. Free Response 17.6.7 SQL Tables Response
    56. 17.7 Basic Querying in SQL

    57. Video 17.7.1 The SELECT Statement
    58. Check for Understanding 17.7.2 Basic Querying in SQL
    59. Example 17.7.3 Our First SELECT Statement
    60. Exercise 17.7.4 Your First SELECT Statement
    61. Video 17.7.5 More SELECT Statement
    62. Check for Understanding 17.7.6 More SELECT Statement
    63. Example 17.7.7 Selecting Specific Columns
    64. Exercise 17.7.8 Harry Potter Names
    65. 17.8 Filtering Queries in SQL

    66. Video 17.8.1 The WHERE Clause
    67. Check for Understanding 17.8.2 Condition Operators
    68. Example 17.8.3 Ravenclaw House
    69. Example 17.8.4 People in Gryffindor
    70. Example 17.8.5 Filter By ID
    71. Exercise 17.8.6 The Weasleys
    72. Exercise 17.8.7 The Potters
    73. 17.9 Common Security Problems

    74. Video 17.9.1 Common Security Problems
    75. Check for Understanding 17.9.2 Common Security Problems
    76. Connection 17.9.3 Meet Security Engineers at Google
    77. Free Response 17.9.4 Security Engineering Reflection
    78. Video 17.9.5 Living in a Digital World
    79. Free Response 17.9.6 Living in a Digital World
    80. 17.10 SQL Injection Overview

    81. Video 17.10.1 SQL Injection Overview
    82. Check for Understanding 17.10.2 SQL Injection Overview
    83. Connection 17.10.3 Equifax Security Breach
    84. Connection 17.10.4 Equifax Exposed Millions
    85. Free Response 17.10.5 Equifax SQL Injection Attack
    86. Example 17.10.6 SQLi
    87. 17.11 Types of SQLi and Prevention

    88. Video 17.11.1 Types of SQLi
    89. Check for Understanding 17.11.2 Types of SQLi
    90. Video 17.11.3 Preventing SQLi
    91. Check for Understanding 17.11.4 Preventing SQLi
    92. Connection 17.11.5 Mitigating SQL Injection
    93. Free Response 17.11.6 Reflection: Mitigating SQL Injection
    94. Connection 17.11.7 SQL Injection Practice
    95. 17.12 Software Security Quiz

    96. Unit Quiz 17.12.1 Software Security Quiz
  18. Advanced Networking

    1. 18.1 Network Administrator

    2. Video 18.1.1 Advanced Devices
    3. Check for Understanding 18.1.2 Advanced Devices Quiz
    4. Connection 18.1.3 Network Administrator Career
    5. Free Response 18.1.4 Network Administrator Career
    6. Free Response 18.1.5 Choosing the Best Devices
    7. Free Response 18.1.6 Network Diagram
    8. 18.2 Environmental Controls

    9. Video 18.2.1 Environmental Controls
    10. Check for Understanding 18.2.2 Environmental Controls Quiz
    11. Connection 18.2.3 Infographic
    12. Free Response 18.2.4 Infographic FR
    13. Free Response 18.2.5 Your Security Systems
    14. Free Response 18.2.6 Security Design
    15. 18.3 Protocols and Standards

    16. Video 18.3.1 Protocols
    17. Check for Understanding 18.3.2 Protocols Quiz
    18. Video 18.3.3 Standards
    19. Check for Understanding 18.3.4 Standards Quiz
    20. Connection 18.3.5 The New Wireless Standard
    21. Connection 18.3.6 801.11ax
    22. Free Response 18.3.7 801.11ax FR
    23. 18.4 Private Networks

    24. Video 18.4.1 IP and MAC Addresses
    25. Check for Understanding 18.4.2 IP and MAC Addresses Quiz
    26. Example 18.4.3 Intranet Permissions
    27. Free Response 18.4.4 Coffee Shop: Design an Intranet
    28. Video 18.4.5 DMZs and VPNs
    29. Check for Understanding 18.4.6 DMZs and VPNs Quiz
    30. Connection 18.4.7 Protecting Privacy with VPNs
    31. Free Response 18.4.8 Protecting Privacy with VPNs
    32. Free Response 18.4.9 Coffee Shop: Network Plan
    33. Free Response 18.4.10 Coffee Shop: Network Diagram
    34. Video 18.4.11 SOHO Network
    35. Example 18.4.12 Network Topologies
    36. 18.5 Mobile Devices

    37. Video 18.5.1 Mobile Devices
    38. Check for Understanding 18.5.2 Mobile Devices Quiz
    39. Connection 18.5.3 How Apple FaceID Works
    40. Free Response 18.5.4 How Apple FaceID Works Response
    41. Free Response 18.5.5 Biometric Data Debate
    42. Connection 18.5.6 BYOD and MDM Concept Map
    43. Free Response 18.5.7 BYOD and MDM Conclusions
    44. 18.6 Access Control

    45. Video 18.6.1 Access Control
    46. Check for Understanding 18.6.2 Access Control
    47. Example 18.6.3 Multifactor Authentication
    48. Example 18.6.4 Two Factor Authentication
    49. Free Response 18.6.5 Two Factor Authentication Reflection
    50. Connection 18.6.6 RADIUS Overview with AAA Protocol
    51. Connection 18.6.7 RADIUS Server Access Control
    52. Free Response 18.6.8 RADIUS Reflection
    53. 18.7 Advanced Networking Quiz

    54. Unit Quiz 18.7.1 Advanced Networking Quiz
  19. Project: Put it in Writing!

    1. 19.1 Level 1: Entry Event

    2. Free Response 19.1.1 Company Development
    3. Free Response 19.1.2 Level 1: Attack!
    4. Video 19.1.3 Level 1: Project Overview
    5. Connection 19.1.4 Put It In Writing! Rubric
    6. 19.2 Level 2: User Training

    7. Free Response 19.2.1 User Training Policy Development
    8. Free Response 19.2.2 Challenge: Employee Negligence 1
    9. Free Response 19.2.3 Challenge: Employee Negligence 2
    10. Free Response 19.2.4 Level 2 Debrief
    11. 19.3 Level 3: Incident Response

    12. Connection 19.3.1 Incident Response Plan Template
    13. Free Response 19.3.2 Incident Response Plan Link
    14. Free Response 19.3.3 Challenge: Cyber Attack!
    15. Free Response 19.3.4 Level 3 Debrief
    16. 19.4 Level 4: Data and Licenses

    17. Video 19.4.1 Data and Licenses
    18. Connection 19.4.2 FTC Data Security Guide
    19. Connection 19.4.3 Data Policy Template
    20. Free Response 19.4.4 Data Policy Link
    21. Free Response 19.4.5 Challenge: Data Breach 1
    22. Free Response 19.4.6 Challenge: Data Breach 2
    23. Free Response 19.4.7 Challenge: Data Breach 3
    24. Free Response 19.4.8 Level 4 Debrief
    25. 19.5 Level 5: Change Management

    26. Video 19.5.1 Change Management
    27. Connection 19.5.2 Change Management Plan
    28. Free Response 19.5.3 Change Management Plan Link
  20. Project: Digital Forensics

    1. 20.1 Digital Forensics

    2. Video 20.1.1 Digital Forensics
    3. Connection 20.1.2 Student Success Story
    4. Free Response 20.1.3 Student Success Story Response
    5. 20.2 Forensic Case 1: Logs

    6. Notes 20.2.1 Network Logs
    7. Example 20.2.2 Network Log Evidence
    8. Free Response 20.2.3 Network Logs Conclusion
    9. 20.3 Forensic Case 2: File Metadata

    10. Notes 20.3.1 File Metadata
    11. Example 20.3.2 File Metadata Evidence
    12. Free Response 20.3.3 File Metadata Conclusion
    13. 20.4 Forensic Case 3: Exif Data

    14. Notes 20.4.1 Photo Exif
    15. Connection 20.4.2 Exif Using Inspector
    16. Example 20.4.3 Exif Using the CLI
    17. Free Response 20.4.4 Photo Exif Conclusion
  21. Cryptocurrency

    1. 21.1 What is Currency?

    2. Video 21.1.1 What is Currency?
    3. Check for Understanding 21.1.2 What is Currency?
    4. Connection 21.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 21.1.4 What Gives Money Its Value
    6. Resource 21.1.5 Money: What is it Good For?
    7. 21.2 What is Cryptocurrency?

    8. Video 21.2.1 Cryptocurrency Basics
    9. Check for Understanding 21.2.2 Cryptocurrency Basics
    10. Video 21.2.3 Cryptocurrency Module Overview
    11. Connection 21.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 21.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 21.2.6 Show Me the Money
    14. Free Response 21.2.7 American Currency Exhibit
    15. 21.3 Intro to Blockchain

    16. Video 21.3.1 Intro to Blockchain
    17. Check for Understanding 21.3.2 Intro to Blockchain
    18. Connection 21.3.3 CryptoKitties
    19. Free Response 21.3.4 CryptoKitties
    20. 21.4 Hashing

    21. Video 21.4.1 Hashing
    22. Check for Understanding 21.4.2 Hashing
    23. Connection 21.4.3 SHA256 Hash Generator
    24. Free Response 21.4.4 Using the SHA256 Hash Generator
    25. 21.5 Proof of Work

    26. Video 21.5.1 Proof of Work
    27. Check for Understanding 21.5.2 Proof of Work
    28. Video 21.5.3 Mining the Block
    29. Check for Understanding 21.5.4 Mining the Block
    30. Connection 21.5.5 PoW vs. Proof of Stake
    31. Free Response 21.5.6 PoW vs. PoS
    32. Resource 21.5.7 Checking Proof of Work
    33. 21.6 Advanced Blockchain

    34. Video 21.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 21.6.2 Advanced Blockchain (part 1)
    36. Connection 21.6.3 Blockchain Buzz
    37. Free Response 21.6.4 Blockchain Buzz
    38. Video 21.6.5 Advanced Blockchain (part 2)
    39. Free Response 21.6.6 Advanced Blockchain (part 2)
    40. Resource 21.6.7 Make a Blockchain
    41. Connection 21.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 21.7 Cryptocurrencies

    43. Video 21.7.1 Cryptocurrencies
    44. Check for Understanding 21.7.2 Cryptocurrencies
    45. Free Response 21.7.3 Shiny Toy Phenomenon
    46. Connection 21.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 21.7.5 Walmart Use of Blockchain
    48. 21.8 Bitcoin

    49. Video 21.8.1 Bitcoin
    50. Check for Understanding 21.8.2 Bitcoin
    51. Connection 21.8.3 51% Attack Explained
    52. Free Response 21.8.4 51% Attack
    53. Connection 21.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 21.8.6 Bitcoin Bust
    55. Resource 21.8.7 Explore the Bitcoin Blockchain
    56. 21.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 21.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 21.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 21.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 21.9.4 Cryptocurrency Pros and Cons
    61. Free Response 21.9.5 Crypto Pros and Cons
    62. Connection 21.9.6 What is HODL?
    63. Free Response 21.9.7 What is HODL?
    64. Free Response 21.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 21.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 21.10.1 Overview
    67. Free Response 21.10.2 Preview Sample Expert Panels
    68. Free Response 21.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 21.10.4 Write an Outline and Rehearse
    70. Free Response 21.10.5 Expert Panel Talk (Presentation)
    71. 21.11 Cryptocurrency Quiz

    72. Unit Quiz 21.11.1 Cryptocurrency Quiz
    73. Badge 21.11.2 Cryptocurrency Badge
  22. SQL Part II: The SQL

    1. 22.1 More Filtering Practice

    2. Exercise 22.1.1 Initials
    3. Exercise 22.1.2 Compound Queries with BETWEEN
    4. Exercise 22.1.3 Gryffindors With G Names
    5. Exercise 22.1.4 R First Names
    6. Exercise 22.1.5 FF Houses
    7. 22.2 Ordering Results

    8. Video 22.2.1 The ORDER BY Keyword
    9. Notes 22.2.2 ORDER BY
    10. Example 22.2.3 ORDER BY First Name
    11. Example 22.2.4 Reverse Order
    12. Example 22.2.5 Order By Multiple Fields
    13. Exercise 22.2.6 House Ordering
    14. Exercise 22.2.7 Sort the P Names
    15. 22.3 Renaming Fields

    16. Notes 22.3.1 Renaming Fields with AS
    17. Example 22.3.2 Renaming in the House Table
    18. Exercise 22.3.3 Changing Column Names
    19. 22.4 Joining Tables

    20. Video 22.4.1 The JOIN command
    21. Notes 22.4.2 Basic Joining
    22. Example 22.4.3 Letters and Numbers
    23. Example 22.4.4 Person and House
    24. Example 22.4.5 Person and House (Correct)
    25. Example 22.4.6 Person and House (with namespacing)
    26. Exercise 22.4.7 List All Gryffindors
    27. Video 22.4.8 JOIN With Yourself
    28. Notes 22.4.9 Renaming Tables
    29. Example 22.4.10 Quidditch Matchups
    30. Exercise 22.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 22.5 More Joining Tables

    32. Example 22.5.1 The Course Table
    33. Exercise 22.5.2 Courses and Professors
    34. Exercise 22.5.3 Courses, Professors, and Houses
    35. Exercise 22.5.4 Courses Taught By Gryffindors
    36. Example 22.5.5 The Enrollment Table
    37. Exercise 22.5.6 Students Taking Potions
    38. Exercise 22.5.7 Non-Slytherins Taking Potions
    39. Exercise 22.5.8 Defense Students by House
    40. Exercise 22.5.9 Neville's Courses
  23. Web Development

    1. 23.1 Introduction to HTML

    2. Video 23.1.1 Introduction to HTML
    3. Check for Understanding 23.1.2 Introduction to HTML Quiz
    4. Example 23.1.3 Our First HTML Page
    5. Exercise 23.1.4 Say Hello!
    6. 23.2 Structure of an HTML Page

    7. Video 23.2.1 Structure of an HTML Page
    8. Check for Understanding 23.2.2 Structure of an HTML Page Quiz
    9. Example 23.2.3 HTML Template
    10. Example 23.2.4 Hello World Page
    11. Exercise 23.2.5 The <title> Tag
    12. Exercise 23.2.6 Your First HTML Page
    13. Badge 23.2.7 Structure Badge
    14. 23.3 Formatting Text

    15. Video 23.3.1 Formatting Text
    16. Check for Understanding 23.3.2 Formatting Text Quiz
    17. Example 23.3.3 Dictionary
    18. Exercise 23.3.4 That's Bold
    19. Exercise 23.3.5 Artificial Intelligence
    20. Exercise 23.3.6 State Capitals
    21. 23.4 Links

    22. Video 23.4.1 Links
    23. Check for Understanding 23.4.2 Links Quiz
    24. Example 23.4.3 The <a> Tag
    25. Exercise 23.4.4 Simple Link
    26. Exercise 23.4.5 My Favorite Websites
    27. 23.5 Images

    28. Video 23.5.1 Images
    29. Check for Understanding 23.5.2 Images Quiz
    30. Example 23.5.3 The <img> Tag
    31. Example 23.5.4 Building the CodeHS Homepage
    32. Exercise 23.5.5 Collage on a Theme
    33. Exercise 23.5.6 Linking an Image
    34. Exercise 23.5.7 Personal Library
    35. Badge 23.5.8 Images Badge
    36. 23.6 HTML Lists

    37. Video 23.6.1 HTML Lists
    38. Check for Understanding 23.6.2 HTML Lists Quiz
    39. Example 23.6.3 Grocery Shopping
    40. Exercise 23.6.4 Favorite Things
    41. Exercise 23.6.5 To-Do List
    42. Exercise 23.6.6 List Article
    43. 23.7 HTML Tables

    44. Video 23.7.1 HTML Tables
    45. Check for Understanding 23.7.2 HTML Tables Quiz
    46. Example 23.7.3 Address Book
    47. Exercise 23.7.4 Favorite Songs
    48. Exercise 23.7.5 Calendar
    49. 23.8 HTML Styling

    50. Video 23.8.1 HTML Styling
    51. Check for Understanding 23.8.2 HTML Styling Quiz
    52. Example 23.8.3 Stylish Address Book
    53. Exercise 23.8.4 Background Colors
    54. Exercise 23.8.5 Style Your To-Do List
    55. 23.9 Introduction to CSS

    56. Video 23.9.1 Introduction to CSS
    57. Check for Understanding 23.9.2 Introduction to CSS Quiz
    58. Example 23.9.3 Styling Your H1s
    59. Exercise 23.9.4 First Style with CSS
    60. Exercise 23.9.5 List Styling
    61. 23.10 CSS Select by Tag

    62. Video 23.10.1 CSS Select by Tag
    63. Check for Understanding 23.10.2 CSS Select by Tag Quiz
    64. Example 23.10.3 Rainbow
    65. Example 23.10.4 Dog Styling
    66. Exercise 23.10.5 Restaurant Menu
    67. Exercise 23.10.6 Put Karel Together
    68. 23.11 CSS Select by Class

    69. Video 23.11.1 CSS Select by Class
    70. Check for Understanding 23.11.2 CSS Select by Class Quiz
    71. Example 23.11.3 Simple Checkerboard
    72. Exercise 23.11.4 Tic Tac Toe
    73. Exercise 23.11.5 Music Library
    74. 23.12 CSS Select by ID

    75. Video 23.12.1 CSS Select by ID
    76. Check for Understanding 23.12.2 CSS Select by ID Quiz
    77. Example 23.12.3 Logo
    78. Exercise 23.12.4 Favorite Dog
    79. Exercise 23.12.5 Bingo
    80. Badge 23.12.6 CSS Badge
    81. 23.13 Viewing Websites

    82. Video 23.13.1 Viewing Websites
    83. Check for Understanding 23.13.2 Viewing Websites Quiz
    84. Free Response 23.13.3 Explaining a URL
    85. 23.14 Web Development Quiz

    86. Unit Quiz 23.14.1 Web Development Quiz
    87. 23.15 Your First Website

    88. Challenge 23.15.1 Set Up Your codehs.me Website
    89. Challenge 23.15.2 Practice PT: Your First Website
    90. Badge 23.15.3 Website Badge
  24. Midterm

    1. 24.1 Midterm

    2. Midterm 24.1.1 Midterm
  25. Final Course Project

    1. 25.1 Final Course Project

    2. Notes 25.1.1 Choose Your Own Adventure
    3. Free Response 25.1.2 Choose Your Adventure
    4. Free Response 25.1.3 Research
    5. Free Response 25.1.4 Choose Your Target Audience
    6. Free Response 25.1.5 Draft Your Presentation
    7. Free Response 25.1.6 Draft Your Flyer
    8. Free Response 25.1.7 Make Your Presentation with Handout!
  26. Extra

    1. 26.1 Lesson 1

    2. Example 26.1.1 Compound Queries
  27. Cybersecurity Level 1 Certification Practice

    1. 27.1 Practice #1: Programming and Software Security

    2. Quiz 27.1.1 Quiz: Programming and Software Security
    3. Notes 27.1.2 Practice #1 Reflection
    4. 27.2 Practice #2: IT Infrastructure + Networks

    5. Quiz 27.2.1 Quiz: IT Infrastructure and Networks
    6. Notes 27.2.2 Practice #2 Reflection
    7. 27.3 Practice #3: Digital Citizenship + Cybersecurity

    8. Quiz 27.3.1 Quiz: Digital Citizenship + Cybersecurity
    9. Notes 27.3.2 Practice #3 Reflection
    10. 27.4 Practice #4: System Admin and Cryptography

    11. Quiz 27.4.1 Quiz: System Admin and Cryptography
    12. Notes 27.4.2 Practice #4 Reflection
    13. 27.5 Mixed Practice Test

    14. Notes 27.5.1 Important Note
    15. Quiz 27.5.2 Mixed Practice
    16. Notes 27.5.3 Mixed Practice Reflection