Please enable JavaScript to use CodeHS

Fundamentals of Cybersecurity - Outline

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Video 1.1.1 Welcome to Cybersecurity
    3. Check for Understanding 1.1.2 Welcome to Cybersecurity
    4. Example 1.1.3 Intruder Alert!
    5. Free Response 1.1.4 Cybersecurity and You
    6. Free Response 1.1.5 Course Goals
    7. 1.2 What is Cybersecurity?

    8. Video 1.2.1 What is Cybersecurity?
    9. Check for Understanding 1.2.2 What is Cybersecurity?
    10. Connection 1.2.3 City Services Ransomware
    11. Free Response 1.2.4 Ransomware Reflection
    12. Example 1.2.5 Ransomware Simulator
    13. Connection 1.2.6 Internet of Things
    14. Connection 1.2.7 Hackers vs. Smart Homes
    15. Free Response 1.2.8 Internet of Things Reflection
    16. 1.3 Impact of Cybersecurity

    17. Video 1.3.1 Impact of Cybersecurity
    18. Check for Understanding 1.3.2 Impact of Cybersecurity
    19. Example 1.3.3 Phishing Simulator
    20. Connection 1.3.4 Phishing for Your Info
    21. Free Response 1.3.5 Phishing Reflection
    22. Connection 1.3.6 Cyber Game
    23. Free Response 1.3.7 Cyber Game Reflection
    24. Connection 1.3.8 Cyber Crime Time
    25. Free Response 1.3.9 Cyber Crime Time Reflection
    26. 1.4 The CIA Triad

    27. Video 1.4.1 CIA Triad
    28. Check for Understanding 1.4.2 CIA Triad
    29. Free Response 1.4.3 Which part of the CIA Triad?
    30. Free Response 1.4.4 Which part of the CIA Triad?
    31. Free Response 1.4.5 Breach of Confidentiality
    32. Free Response 1.4.6 Breach of Availability
    33. Free Response 1.4.7 CIA Connections
    34. 1.5 What is Cybersecurity? Quiz

    35. Unit Quiz 1.5.1 What is Cybersecurity? Quiz
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Example 2.1.3 Social Media Clean-up
    5. Free Response 2.1.4 Building a Positive Digital Footprint
    6. Connection 2.1.5 Right to be Forgotten?
    7. Free Response 2.1.6 Right to be Forgotten
    8. Free Response 2.1.7 What is your Digital Footprint?
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Free Response 2.2.5 Stopping Cyberbullying
    15. 2.3 Internet Safety

    16. Video 2.3.1 Internet Safety
    17. Check for Understanding 2.3.2 Internet Safety
    18. Free Response 2.3.3 Scenario: School Stranger
    19. Free Response 2.3.4 Scenario: Vacation Pals
    20. Free Response 2.3.5 Staying Safe
    21. 2.4 Privacy & Security

    22. Video 2.4.1 What is Data Privacy & Security?
    23. Check for Understanding 2.4.2 Privacy & Security Quiz
    24. Connection 2.4.3 Google Privacy Policy Search
    25. Free Response 2.4.4 Google Privacy Policy Search
    26. Example 2.4.5 Guess: Password List
    27. Example 2.4.6 Guess: Using an Algorithm
    28. Example 2.4.7 Guess: Brute Force
    29. Connection 2.4.8 How Strong is your Password?
    30. Free Response 2.4.9 How Strong is your password?
    31. Example 2.4.10 You Can Be Tracked!
    32. 2.5 Information Literacy

    33. Video 2.5.1 Information Literacy
    34. Check for Understanding 2.5.2 Information Literacy
    35. Free Response 2.5.3 Effective Internet Searches
    36. Connection 2.5.4 Evaluate the Source 1
    37. Free Response 2.5.5 Respond: Evaluate the Source 1
    38. Notes 2.5.6 Evaluate the Source 2
    39. Free Response 2.5.7 Respond: Evaluate the Source 2
    40. Connection 2.5.8 Hero Pig?
    41. Free Response 2.5.9 Respond: Hero Pig?
    42. 2.6 Creative Credit & Copyright

    43. Video 2.6.1 Creative Credit and Copyright
    44. Check for Understanding 2.6.2 Creative Credit and Copyright
    45. Free Response 2.6.3 Cite!
    46. Connection 2.6.4 Exploring Creative Commons
    47. Free Response 2.6.5 Respond: Creative Commons
    48. Free Response 2.6.6 Task: Finding Images
    49. Free Response 2.6.7 Reflection: Why is Copyright Important?
    50. 2.7 Hacking Ethics

    51. Video 2.7.1 Hacking Ethics & Legality
    52. Check for Understanding 2.7.2 Hacking Ethics & Legality
    53. Connection 2.7.3 Penetration Testing
    54. Free Response 2.7.4 Reflection: Penetration Testing
    55. Connection 2.7.5 Hack the Pentagon?
    56. Free Response 2.7.6 Reflection: Hack the Pentagon
    57. Check for Understanding 2.7.7 Ethical Hacker Agreement
    58. 2.8 Digital Citizenship and Cybersecurity Quiz

    59. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. Programming Fundamentals

    1. 4.1 Programming Concepts

    2. Video 4.1.1 Programming Concepts
    3. Check for Understanding 4.1.2 Programming Concepts Quiz
    4. Connection 4.1.3 Compilers vs. Interpreters
    5. Free Response 4.1.4 Compilers vs. Interpreters
    6. Example 4.1.5 Variables in Action
    7. Example 4.1.6 Data Types using Typeof
    8. Example 4.1.7 Basic Variables
    9. Exercise 4.1.8 Daily Activities
    10. 4.2 Programming with Karel

    11. Notes 4.2.1 Learning to Program
    12. Video 4.2.2 Programming With Karel
    13. Check for Understanding 4.2.3 Quiz: Karel Commands
    14. Example 4.2.4 Our First Karel Program
    15. Exercise 4.2.5 Your First Karel Program
    16. Video 4.2.6 Functions in Karel
    17. Check for Understanding 4.2.7 Functions in Karel Quiz
    18. Example 4.2.8 Turn Around
    19. Example 4.2.9 Digging Karel
    20. Exercise 4.2.10 Backflip
    21. 4.3 Looping

    22. Video 4.3.1 For Loops
    23. Check for Understanding 4.3.2 For Loops Quiz
    24. Example 4.3.3 Take 'em All
    25. Example 4.3.4 For Loop Square
    26. Exercise 4.3.5 Lots of Hurdles
    27. Video 4.3.6 While Loops in Karel
    28. Check for Understanding 4.3.7 While Loops in Karel Quiz
    29. Example 4.3.8 Move to Wall
    30. Example 4.3.9 Big Tower
    31. Exercise 4.3.10 Follow The Yellow Ball Road
    32. 4.4 Branching

    33. Video 4.4.1 If/Else Statements
    34. Check for Understanding 4.4.2 If/Else Statements Quiz
    35. Example 4.4.3 If/Else Statements
    36. Example 4.4.4 One Ball in Each Spot
    37. Exercise 4.4.5 Right Side Up
    38. Badge 4.4.6 Programming with Karel Badge
    39. 4.5 Arrays and Objects

    40. Notes 4.5.1 More JS Topics
    41. Video 4.5.2 Arrays and Objects
    42. Check for Understanding 4.5.3 Arrays and Objects
    43. Example 4.5.4 Making an Array
    44. Exercise 4.5.5 List of Places to Travel
    45. Exercise 4.5.6 List of Prime Numbers
    46. Example 4.5.7 Phonebook
    47. Exercise 4.5.8 Sidekicks
    48. 4.6 Organizational Techniques

    49. Video 4.6.1 Organizational Techniques
    50. Check for Understanding 4.6.2 Organizational Techniques Quiz
    51. Example 4.6.3 Hurdle Karel
    52. Exercise 4.6.4 One Ball in Each Spot
    53. Exercise 4.6.5 The Two Towers
    54. Example 4.6.6 Interactive Sequence Diagram
    55. 4.7 Programming Fundamentals Quiz

    56. Survey 4.7.1 Mindsets
    57. Unit Quiz 4.7.2 Programming Fundamentals Quiz
  5. The ABCs of Cryptography

    1. 5.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 5.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 5.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Example 5.1.3 Cryptogram Game!
    5. Video 5.1.4 Why encrypt?
    6. Check for Understanding 5.1.5 Why encrypt?
    7. Example 5.1.6 Encrypt/Decrypt
    8. 5.2 History of Cryptography

    9. Video 5.2.1 Cryptography: A Brief History
    10. Check for Understanding 5.2.2 Cryptography History Quiz
    11. Connection 5.2.3 How the Enigma Worked
    12. Free Response 5.2.4 How the Enigma Worked
    13. Connection 5.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 5.2.6 The Future of Cybersecurity
    15. 5.3 Basic Crypto Systems: Caesar Cipher

    16. Video 5.3.1 Caesar Cipher
    17. Check for Understanding 5.3.2 Caesar Cipher
    18. Example 5.3.3 Caesar Cipher Encryption
    19. Example 5.3.4 Decrypt Caesar's Cipher!
    20. 5.4 Basic Crypto Systems: Cracking Caesar

    21. Video 5.4.1 Cracking Caesar Cipher
    22. Check for Understanding 5.4.2 Cracking Caesar Cipher
    23. Example 5.4.3 Cracking Caesar with Brute Force
    24. Example 5.4.4 Letter Frequency and Caesar
    25. Free Response 5.4.5 Examining Caesar Cipher
    26. 5.5 Basic Crypto Systems: Vigenere Cipher

    27. Video 5.5.1 Vigenere Cipher
    28. Check for Understanding 5.5.2 Vigenere Cipher
    29. Example 5.5.3 Vigenere Cipher Example
    30. Example 5.5.4 Letter Frequency and Vigenere Cipher
    31. Free Response 5.5.5 Examining Vigenere Cipher
    32. Example 5.5.6 Improving Vigenere
    33. 5.6 The ABCs of Cryptography Quiz

    34. Unit Quiz 5.6.1 The ABCs of Cryptography Quiz
  6. Project: Classic Cipher Newscast

    1. 6.1 Project: Classic Cipher Newscast

    2. Notes 6.1.1 Overview
    3. Notes 6.1.2 Investigate a Classic Cipher
    4. Free Response 6.1.3 Write the Script and Rehearse
    5. Free Response 6.1.4 Newscast Presentation
  7. System Administration

    1. 7.1 Operating Systems

    2. Video 7.1.1 Operating Systems
    3. Check for Understanding 7.1.2 Operating Systems Quiz
    4. Example 7.1.3 Detect My OS
    5. Connection 7.1.4 Upgrading a Mac OS
    6. Example 7.1.5 Windows OS Installation Simulation
    7. Free Response 7.1.6 Installing an OS
    8. 7.2 Comparing Operating Systems

    9. Video 7.2.1 Comparing Operating Systems
    10. Check for Understanding 7.2.2 Comparing Operating Systems Quiz
    11. Example 7.2.3 Windows Simulation
    12. Example 7.2.4 MacOS Simulation
    13. Connection 7.2.5 Choose a Linux Distro!
    14. Free Response 7.2.6 Which would you choose?
    15. 7.3 Compatibility

    16. Video 7.3.1 Compatibility
    17. Check for Understanding 7.3.2 Compatibility Quiz
    18. Example 7.3.3 What Processor? Windows
    19. Example 7.3.4 What Processor? Mac
    20. Free Response 7.3.5 What Processor are you running?
    21. 7.4 Software and Applications

    22. Video 7.4.1 Software and Applications
    23. Check for Understanding 7.4.2 Software and Applications Quiz
    24. Example 7.4.3 Spreadsheet Simulation
    25. Example 7.4.4 Messaging Simulation
    26. Example 7.4.5 Kanban Board Simulation
    27. Free Response 7.4.6 Software Simulations
    28. 7.5 Software Licenses

    29. Video 7.5.1 Software Licenses
    30. Check for Understanding 7.5.2 Software Licenses Quiz
    31. Free Response 7.5.3 Do I need a Software License?
    32. Free Response 7.5.4 Is This Original?
    33. 7.6 Application Security

    34. Video 7.6.1 Application Security
    35. Check for Understanding 7.6.2 Application Security
    36. Example 7.6.3 Windows Updates
    37. Connection 7.6.4 Windows Defender Antivirus
    38. Free Response 7.6.5 Windows Defender Antivirus
    39. Free Response 7.6.6 CodeHS System Restore
    40. 7.7 Browser Configuration

    41. Video 7.7.1 Browser Configuration
    42. Check for Understanding 7.7.2 Browser Configuration
    43. Connection 7.7.3 Cached CodeHS
    44. Free Response 7.7.4 Cached CodeHS
    45. Example 7.7.5 Is Your Popup Blocker On?
    46. Free Response 7.7.6 Browser Extensions Lab
    47. 7.8 System Administration

    48. Video 7.8.1 User Accounts
    49. Check for Understanding 7.8.2 User Accounts Quiz
    50. Free Response 7.8.3 User Accounts
    51. Free Response 7.8.4 Shared Folders and Files
    52. Video 7.8.5 Host Security
    53. Check for Understanding 7.8.6 Host Security Quiz
    54. Free Response 7.8.7 Security Baseline
    55. 7.9 Command Line Interface

    56. Notes 7.9.1 Linux/MacOS vs. Windows
    57. Video 7.9.2 Command Line Interface
    58. Check for Understanding 7.9.3 Command Line Interface Quiz
    59. Resource 7.9.4 Command Equivalents
    60. Video 7.9.5 Windows Command Prompt
    61. Free Response 7.9.6 Windows Command Prompt
    62. Free Response 7.9.7 Directory Directions
    63. Connection 7.9.8 Neural Interface?
    64. Free Response 7.9.9 Neural Interface?
    65. 7.10 System Administration Quiz

    66. Survey 7.10.1 Mindsets
    67. Unit Quiz 7.10.2 System Administration Quiz
  8. Software Security

    1. 8.1 Inside Web Apps

    2. Video 8.1.1 Inside Web Apps
    3. Check for Understanding 8.1.2 Inside Web Apps
    4. Free Response 8.1.3 Using View Page Source
    5. Example 8.1.4 Recreate a Webpage?
    6. Connection 8.1.5 Getting Started with OWASP
    7. Free Response 8.1.6 Getting Started with OWASP
    8. 8.2 Developer Tools

    9. Video 8.2.1 Developer Tools
    10. Check for Understanding 8.2.2 Developer Tools
    11. Free Response 8.2.3 Using the Developer Tools
    12. Exercise 8.2.4 Console Secrets
    13. Example 8.2.5 Local Storage
    14. Connection 8.2.6 The Top Cybersecurity Blogs and Websites
    15. Free Response 8.2.7 Selecting a Site to Follow
    16. 8.3 The Value of Data

    17. Video 8.3.1 The Value of Data
    18. Check for Understanding 8.3.2 The Value of Data Quiz
    19. Notes 8.3.3 Exploring Data Visualizations
    20. Connection 8.3.4 US Recorded Music Revenue
    21. Connection 8.3.5 National Parks
    22. Connection 8.3.6 March Madness
    23. Connection 8.3.7 Captain Marvel
    24. Free Response 8.3.8 Respond: Visualizations
    25. Free Response 8.3.9 Free Response: Choosing a Visualization
    26. Free Response 8.3.10 Reflection: Design a Survey
    27. 8.4 Databases

    28. Video 8.4.1 Databases
    29. Check for Understanding 8.4.2 Databases
    30. Connection 8.4.3 Database Administrator Career
    31. Free Response 8.4.4 Database Administrator Career
    32. Video 8.4.5 Parts of a Database
    33. Check for Understanding 8.4.6 Parts of a Database
    34. Connection 8.4.7 SQL Database Diagram
    35. Free Response 8.4.8 SQL Database Diagram
    36. Free Response 8.4.9 Schema Brainstorm
    37. 8.5 Clients and Servers

    38. Video 8.5.1 Clients and Servers
    39. Check for Understanding 8.5.2 Clients and Servers
    40. Connection 8.5.3 Inside a Google Data Center
    41. Free Response 8.5.4 Inside a Google Data Center
    42. Connection 8.5.5 Cloud Vulnerabilities
    43. Free Response 8.5.6 Cloud Vulnerabilities Response
    44. Video 8.5.7 Client-Server Model
    45. Check for Understanding 8.5.8 Client-Server Model
    46. Connection 8.5.9 The Future of User Privacy
    47. Free Response 8.5.10 The Future of User Privacy
    48. 8.6 What is SQL?

    49. Notes 8.6.1 What is SQL Overview
    50. Video 8.6.2 Intro to SQL
    51. Check for Understanding 8.6.3 Quiz: What is SQL?
    52. Video 8.6.4 How to Structure Data in SQL
    53. Check for Understanding 8.6.5 How to Structure Data in SQL
    54. Example 8.6.6 SQL Tables
    55. Free Response 8.6.7 SQL Tables Response
    56. 8.7 Basic Querying in SQL

    57. Video 8.7.1 The SELECT Statement
    58. Check for Understanding 8.7.2 Basic Querying in SQL
    59. Example 8.7.3 Our First SELECT Statement
    60. Exercise 8.7.4 Your First SELECT Statement
    61. Video 8.7.5 More SELECT Statement
    62. Check for Understanding 8.7.6 More SELECT Statement
    63. Example 8.7.7 Selecting Specific Columns
    64. Exercise 8.7.8 Harry Potter Names
    65. 8.8 Filtering Queries in SQL

    66. Video 8.8.1 The WHERE Clause
    67. Check for Understanding 8.8.2 Condition Operators
    68. Example 8.8.3 Ravenclaw House
    69. Example 8.8.4 People in Gryffindor
    70. Example 8.8.5 Filter By ID
    71. Exercise 8.8.6 The Weasleys
    72. Exercise 8.8.7 The Potters
    73. 8.9 Common Security Problems

    74. Video 8.9.1 Common Security Problems
    75. Check for Understanding 8.9.2 Common Security Problems
    76. Connection 8.9.3 Meet Security Engineers at Google
    77. Free Response 8.9.4 Security Engineering Reflection
    78. Video 8.9.5 Living in a Digital World
    79. Free Response 8.9.6 Living in a Digital World
    80. 8.10 SQL Injection Overview

    81. Video 8.10.1 SQL Injection Overview
    82. Check for Understanding 8.10.2 SQL Injection Overview
    83. Connection 8.10.3 Equifax Security Breach
    84. Connection 8.10.4 Equifax Exposed Millions
    85. Free Response 8.10.5 Equifax SQL Injection Attack
    86. Example 8.10.6 SQLi
    87. 8.11 Types of SQLi and Prevention

    88. Video 8.11.1 Types of SQLi
    89. Check for Understanding 8.11.2 Types of SQLi
    90. Video 8.11.3 Preventing SQLi
    91. Check for Understanding 8.11.4 Preventing SQLi
    92. Connection 8.11.5 Mitigating SQL Injection
    93. Free Response 8.11.6 Reflection: Mitigating SQL Injection
    94. Connection 8.11.7 SQL Injection Practice
    95. 8.12 Software Security Quiz

    96. Unit Quiz 8.12.1 Software Security Quiz
  9. Networking Fundamentals

    1. 9.1 Introduction to the Internet

    2. Video 9.1.1 Welcome to the Internet
    3. Check for Understanding 9.1.2 Intro to the Internet
    4. Connection 9.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 9.1.4 Connectivity Lab Reflection
    6. 9.2 Notational Systems

    7. Video 9.2.1 Number Systems
    8. Check for Understanding 9.2.2 Number Systems Quiz
    9. Notes 9.2.3 Number Base Tool
    10. Video 9.2.4 Decimal to Binary
    11. Check for Understanding 9.2.5 Decimal to Binary Quiz
    12. Exercise 9.2.6 Binary Game
    13. 9.3 Data Representation

    14. Video 9.3.1 Hexadecimal
    15. Check for Understanding 9.3.2 Hexadecimal Quiz
    16. Exercise 9.3.3 Binary to Hex Game
    17. Video 9.3.4 Encoding Text with Binary
    18. Check for Understanding 9.3.5 Encoding Text with Binary Quiz
    19. Example 9.3.6 Custom Encoding
    20. Example 9.3.7 Bits to ASCII
    21. Exercise 9.3.8 Hello World in Bits
    22. 9.4 Internet Hardware and Sending Information

    23. Video 9.4.1 Internet Hardware
    24. Check for Understanding 9.4.2 Internet Hardware
    25. Video 9.4.3 Sending Information
    26. Check for Understanding 9.4.4 Sending Information
    27. Connection 9.4.5 The Internet is in the Ocean
    28. Free Response 9.4.6 Internet in the Ocean Reflection
    29. 9.5 Internet Addresses

    30. Video 9.5.1 Internet Addresses
    31. Check for Understanding 9.5.2 Internet Addresses
    32. Free Response 9.5.3 The Need for Addresses
    33. Connection 9.5.4 IPv4 vs. IPv6
    34. Free Response 9.5.5 Reflection: IPv4 vs IPv6
    35. 9.6 Domain Name System (DNS)

    36. Video 9.6.1 Domain Name System (DNS)
    37. Check for Understanding 9.6.2 Domain Name System
    38. Connection 9.6.3 How Does DNS Work?
    39. Free Response 9.6.4 How Does DNS Work?
    40. 9.7 Routing

    41. Video 9.7.1 Routing
    42. Check for Understanding 9.7.2 Routing
    43. Free Response 9.7.3 Redundancy
    44. 9.8 Packets & Protocols

    45. Video 9.8.1 Packets
    46. Check for Understanding 9.8.2 Packets
    47. Video 9.8.3 Protocols
    48. Check for Understanding 9.8.4 Protocols
    49. Connection 9.8.5 How the Internet Works
    50. Free Response 9.8.6 The Journey of an Image
    51. 9.9 Viewing a Webpage

    52. Video 9.9.1 Viewing a Webpage
    53. Check for Understanding 9.9.2 Viewing a Webpage
    54. Free Response 9.9.3 Explaining a URL
    55. Connection 9.9.4 Net Neutrality Explained
    56. Connection 9.9.5 FCCs Net Neutrality Rules Officially Repealed
    57. Free Response 9.9.6 Take a Side on Net Neutrality
    58. Connection 9.9.7 Net Neutrality and Cybersecurity
    59. Free Response 9.9.8 Net Neutrality and Cybersecurity Research
    60. 9.10 Impact of the Internet

    61. Video 9.10.1 Impact of the Internet
    62. Check for Understanding 9.10.2 Impact of the Internet
    63. Connection 9.10.3 What is the Digital Divide?
    64. Free Response 9.10.4 What is the Digital Divide?
    65. 9.11 Networking Fundamentals Quiz

    66. Survey 9.11.1 Mindsets
    67. Unit Quiz 9.11.2 Networking Fundamentals Quiz
  10. IT Infrastructure

    1. 10.1 Internal Components

    2. Video 10.1.1 Internal Components
    3. Check for Understanding 10.1.2 Internal Components
    4. Connection 10.1.3 Build a Computer
    5. Free Response 10.1.4 Build a Computer
    6. Example 10.1.5 Test Your Brain's RAM!
    7. Free Response 10.1.6 Test Your Brain's RAM! Reflection
    8. Connection 10.1.7 The Machine Instruction Cycle
    9. 10.2 Peripheral Devices

    10. Video 10.2.1 Peripheral Devices
    11. Check for Understanding 10.2.2 Peripheral Devices
    12. Free Response 10.2.3 Personalized Peripherals
    13. Free Response 10.2.4 IT Help
    14. Free Response 10.2.5 Your Ideal Computer Setup
    15. 10.3 Network Devices

    16. Video 10.3.1 Network Devices
    17. Check for Understanding 10.3.2 Network Devices
    18. Connection 10.3.3 Speed Test
    19. Free Response 10.3.4 Speed Test
    20. Connection 10.3.5 Fiber Optics Bend Light!
    21. Free Response 10.3.6 Fiber Optics Bend Light!
    22. Connection 10.3.7 Ethernet Standards
    23. Free Response 10.3.8 Ethernet Standards
    24. Free Response 10.3.9 Network Troubleshooting
    25. 10.4 Storage Options

    26. Video 10.4.1 Storage Options
    27. Check for Understanding 10.4.2 Storage Options Quiz
    28. Connection 10.4.3 Security of Cloud Storage
    29. Free Response 10.4.4 Security of Cloud Storage
    30. Free Response 10.4.5 Storage Suggestions
    31. 10.5 Network Options

    32. Video 10.5.1 Network Options
    33. Check for Understanding 10.5.2 Network Options Quiz
    34. Connection 10.5.3 What is an SSID?
    35. Free Response 10.5.4 What is an SSID?
    36. Connection 10.5.5 Wireless Threats
    37. Free Response 10.5.6 Wireless Threats
    38. Free Response 10.5.7 Wireless Network Setup
    39. 10.6 Network Communication

    40. Video 10.6.1 Network Communication
    41. Check for Understanding 10.6.2 Network Communication Quiz
    42. Example 10.6.3 Setting up a Firewall
    43. Free Response 10.6.4 iptables
    44. Notes 10.6.5 iptables simulation
    45. 10.7 Network Management

    46. Notes 10.7.1 Linux/MacOS vs. Windows
    47. Video 10.7.2 Network Management
    48. Check for Understanding 10.7.3 Network Management Quiz
    49. Example 10.7.4 MacOS Terminal Simulation
    50. Example 10.7.5 Windows Command Prompt Simulation
    51. Video 10.7.6 Windows Command Prompt Spy
    52. Free Response 10.7.7 Windows Command Prompt Spy
    53. Notes 10.7.8 SSH Logs
    54. Example 10.7.9 SSH Logs
    55. Free Response 10.7.10 SSH Logs Submission
    56. 10.8 IT Infrastructure Quiz

    57. Unit Quiz 10.8.1 IT Infrastructure Quiz
  11. Project: Troubleshooting

    1. 11.1 Methodology

    2. Notes 11.1.1 Troubleshooting Methodology
    3. Free Response 11.1.2 Identify the Problem
    4. Free Response 11.1.3 Research Solutions
    5. Free Response 11.1.4 Establish a Theory
    6. Free Response 11.1.5 Test the Theory
    7. Free Response 11.1.6 Fix the Problem!
    8. 11.2 Support Practice

    9. Exercise 11.2.1 Signal Strength
    10. Exercise 11.2.2 Interference
  12. Final Exam

    1. 12.1 Final Exam

    2. Final 12.1.1 Final Exam
    3. Free Response 12.1.2 Fill in the Blank
    4. Free Response 12.1.3 Short Answer - 1
    5. Free Response 12.1.4 Short Answer - 2
    6. Free Response 12.1.5 Short Answer - 3
    7. Free Response 12.1.6 Short Answer - 4
  13. What's Next?

    1. 13.1 After Fundamentals of Cybersecurity

    2. Notes 13.1.1 Cybersecurity Pathways
    3. Connection 13.1.2 CodeHS Advanced Cybersecurity
    4. Notes 13.1.3 College Pathway
    5. Connection 13.1.4 Certification Pathway
    6. Connection 13.1.5 Career Spotlight
    7. Free Response 13.1.6 My Pathway
  14. Project: Security Assessment Report

    1. 14.1 Project: Security Assessment Report

    2. Notes 14.1.1 Project Requirements
    3. Connection 14.1.2 Supercar Showdown Website
    4. Free Response 14.1.3 SQL Injection Testing
    5. Resource 14.1.4 SQLi Testing Handout
    6. Free Response 14.1.5 Security Assessment Report
    7. Free Response 14.1.6 Project Reflection
  15. Project: Digital Forensics

    1. 15.1 Digital Forensics

    2. Video 15.1.1 Digital Forensics
    3. Connection 15.1.2 Student Success Story
    4. Free Response 15.1.3 Student Success Story Response
    5. 15.2 Forensic Case 1: Logs

    6. Notes 15.2.1 Network Logs
    7. Example 15.2.2 Network Log Evidence
    8. Free Response 15.2.3 Network Logs Conclusion
    9. 15.3 Forensic Case 2: File Metadata

    10. Notes 15.3.1 File Metadata
    11. Example 15.3.2 File Metadata Evidence
    12. Free Response 15.3.3 File Metadata Conclusion
    13. 15.4 Forensic Case 3: Exif Data

    14. Notes 15.4.1 Photo Exif
    15. Connection 15.4.2 Exif Using Inspector
    16. Example 15.4.3 Exif Using the CLI
    17. Free Response 15.4.4 Photo Exif Conclusion
  16. Cryptocurrency

    1. 16.1 What is Currency?

    2. Video 16.1.1 What is Currency?
    3. Check for Understanding 16.1.2 What is Currency?
    4. Connection 16.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 16.1.4 What Gives Money Its Value
    6. Resource 16.1.5 Money: What is it Good For?
    7. 16.2 What is Cryptocurrency?

    8. Video 16.2.1 Cryptocurrency Basics
    9. Check for Understanding 16.2.2 Cryptocurrency Basics
    10. Video 16.2.3 Cryptocurrency Module Overview
    11. Connection 16.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 16.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 16.2.6 Show Me the Money
    14. Free Response 16.2.7 American Currency Exhibit
    15. 16.3 Intro to Blockchain

    16. Video 16.3.1 Intro to Blockchain
    17. Check for Understanding 16.3.2 Intro to Blockchain
    18. Connection 16.3.3 CryptoKitties
    19. Free Response 16.3.4 CryptoKitties
    20. 16.4 Hashing

    21. Video 16.4.1 Hashing
    22. Check for Understanding 16.4.2 Hashing
    23. Connection 16.4.3 SHA256 Hash Generator
    24. Free Response 16.4.4 Using the SHA256 Hash Generator
    25. 16.5 Proof of Work

    26. Video 16.5.1 Proof of Work
    27. Check for Understanding 16.5.2 Proof of Work
    28. Video 16.5.3 Mining the Block
    29. Check for Understanding 16.5.4 Mining the Block
    30. Connection 16.5.5 PoW vs. Proof of Stake
    31. Free Response 16.5.6 PoW vs. PoS
    32. Resource 16.5.7 Checking Proof of Work
    33. 16.6 Advanced Blockchain

    34. Video 16.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 16.6.2 Advanced Blockchain (part 1)
    36. Connection 16.6.3 Blockchain Buzz
    37. Free Response 16.6.4 Blockchain Buzz
    38. Video 16.6.5 Advanced Blockchain (part 2)
    39. Free Response 16.6.6 Advanced Blockchain (part 2)
    40. Resource 16.6.7 Make a Blockchain
    41. Connection 16.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 16.7 Cryptocurrencies

    43. Video 16.7.1 Cryptocurrencies
    44. Check for Understanding 16.7.2 Cryptocurrencies
    45. Free Response 16.7.3 Shiny Toy Phenomenon
    46. Connection 16.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 16.7.5 Walmart Use of Blockchain
    48. 16.8 Bitcoin

    49. Video 16.8.1 Bitcoin
    50. Check for Understanding 16.8.2 Bitcoin
    51. Connection 16.8.3 51% Attack Explained
    52. Free Response 16.8.4 51% Attack
    53. Connection 16.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 16.8.6 Bitcoin Bust
    55. Resource 16.8.7 Explore the Bitcoin Blockchain
    56. 16.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 16.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 16.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 16.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 16.9.4 Cryptocurrency Pros and Cons
    61. Free Response 16.9.5 Crypto Pros and Cons
    62. Connection 16.9.6 What is HODL?
    63. Free Response 16.9.7 What is HODL?
    64. Free Response 16.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 16.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 16.10.1 Overview
    67. Free Response 16.10.2 Preview Sample Expert Panels
    68. Free Response 16.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 16.10.4 Write an Outline and Rehearse
    70. Free Response 16.10.5 Expert Panel Talk (Presentation)
    71. 16.11 Cryptocurrency Quiz

    72. Unit Quiz 16.11.1 Cryptocurrency Quiz
    73. Badge 16.11.2 Cryptocurrency Badge
  17. Final Course Project

    1. 17.1 Final Course Project

    2. Notes 17.1.1 Choose Your Own Adventure
    3. Free Response 17.1.2 Choose Your Adventure
    4. Free Response 17.1.3 Research
    5. Free Response 17.1.4 Choose Your Target Audience
    6. Free Response 17.1.5 Draft Your Presentation
    7. Free Response 17.1.6 Draft Your Flyer
    8. Free Response 17.1.7 Make Your Presentation with Handout!
  18. SQL Part II: The SQL

    1. 18.1 More Filtering Practice

    2. Exercise 18.1.1 Initials
    3. Exercise 18.1.2 Compound Queries with BETWEEN
    4. Exercise 18.1.3 Gryffindors With G Names
    5. Exercise 18.1.4 R First Names
    6. Exercise 18.1.5 FF Houses
    7. 18.2 Ordering Results

    8. Video 18.2.1 The ORDER BY Keyword
    9. Notes 18.2.2 ORDER BY
    10. Example 18.2.3 ORDER BY First Name
    11. Example 18.2.4 Reverse Order
    12. Example 18.2.5 Order By Multiple Fields
    13. Exercise 18.2.6 House Ordering
    14. Exercise 18.2.7 Sort the P Names
    15. 18.3 Renaming Fields

    16. Notes 18.3.1 Renaming Fields with AS
    17. Example 18.3.2 Renaming in the House Table
    18. Exercise 18.3.3 Changing Column Names
    19. 18.4 Joining Tables

    20. Video 18.4.1 The JOIN command
    21. Notes 18.4.2 Basic Joining
    22. Example 18.4.3 Letters and Numbers
    23. Example 18.4.4 Person and House
    24. Example 18.4.5 Person and House (Correct)
    25. Example 18.4.6 Person and House (with namespacing)
    26. Exercise 18.4.7 List All Gryffindors
    27. Video 18.4.8 JOIN With Yourself
    28. Notes 18.4.9 Renaming Tables
    29. Example 18.4.10 Quidditch Matchups
    30. Exercise 18.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 18.5 More Joining Tables

    32. Example 18.5.1 The Course Table
    33. Exercise 18.5.2 Courses and Professors
    34. Exercise 18.5.3 Courses, Professors, and Houses
    35. Exercise 18.5.4 Courses Taught By Gryffindors
    36. Example 18.5.5 The Enrollment Table
    37. Exercise 18.5.6 Students Taking Potions
    38. Exercise 18.5.7 Non-Slytherins Taking Potions
    39. Exercise 18.5.8 Defense Students by House
    40. Exercise 18.5.9 Neville's Courses
  19. Web Development

    1. 19.1 Introduction to HTML

    2. Video 19.1.1 Introduction to HTML
    3. Check for Understanding 19.1.2 Introduction to HTML Quiz
    4. Example 19.1.3 Our First HTML Page
    5. Exercise 19.1.4 Say Hello!
    6. 19.2 Structure of an HTML Page

    7. Video 19.2.1 Structure of an HTML Page
    8. Check for Understanding 19.2.2 Structure of an HTML Page Quiz
    9. Example 19.2.3 HTML Template
    10. Example 19.2.4 Hello World Page
    11. Exercise 19.2.5 The <title> Tag
    12. Exercise 19.2.6 Your First HTML Page
    13. Badge 19.2.7 Structure Badge
    14. 19.3 Formatting Text

    15. Video 19.3.1 Formatting Text
    16. Check for Understanding 19.3.2 Formatting Text Quiz
    17. Example 19.3.3 Dictionary
    18. Exercise 19.3.4 That's Bold
    19. Exercise 19.3.5 Artificial Intelligence
    20. Exercise 19.3.6 State Capitals
    21. 19.4 Links

    22. Video 19.4.1 Links
    23. Check for Understanding 19.4.2 Links Quiz
    24. Example 19.4.3 The <a> Tag
    25. Exercise 19.4.4 Simple Link
    26. Exercise 19.4.5 My Favorite Websites
    27. 19.5 Images

    28. Video 19.5.1 Images
    29. Check for Understanding 19.5.2 Images Quiz
    30. Example 19.5.3 The <img> Tag
    31. Example 19.5.4 Building the CodeHS Homepage
    32. Exercise 19.5.5 Collage on a Theme
    33. Exercise 19.5.6 Linking an Image
    34. Exercise 19.5.7 Personal Library
    35. Badge 19.5.8 Images Badge
    36. 19.6 HTML Lists

    37. Video 19.6.1 HTML Lists
    38. Check for Understanding 19.6.2 HTML Lists Quiz
    39. Example 19.6.3 Grocery Shopping
    40. Exercise 19.6.4 Favorite Things
    41. Exercise 19.6.5 To-Do List
    42. Exercise 19.6.6 List Article
    43. 19.7 HTML Tables

    44. Video 19.7.1 HTML Tables
    45. Check for Understanding 19.7.2 HTML Tables Quiz
    46. Example 19.7.3 Address Book
    47. Exercise 19.7.4 Favorite Songs
    48. Exercise 19.7.5 Calendar
    49. 19.8 HTML Styling

    50. Video 19.8.1 HTML Styling
    51. Check for Understanding 19.8.2 HTML Styling Quiz
    52. Example 19.8.3 Stylish Address Book
    53. Exercise 19.8.4 Background Colors
    54. Exercise 19.8.5 Style Your To-Do List
    55. 19.9 Introduction to CSS

    56. Video 19.9.1 Introduction to CSS
    57. Check for Understanding 19.9.2 Introduction to CSS Quiz
    58. Example 19.9.3 Styling Your H1s
    59. Exercise 19.9.4 First Style with CSS
    60. Exercise 19.9.5 List Styling
    61. 19.10 CSS Select by Tag

    62. Video 19.10.1 CSS Select by Tag
    63. Check for Understanding 19.10.2 CSS Select by Tag Quiz
    64. Example 19.10.3 Rainbow
    65. Example 19.10.4 Dog Styling
    66. Exercise 19.10.5 Restaurant Menu
    67. Exercise 19.10.6 Put Karel Together
    68. 19.11 CSS Select by Class

    69. Video 19.11.1 CSS Select by Class
    70. Check for Understanding 19.11.2 CSS Select by Class Quiz
    71. Example 19.11.3 Simple Checkerboard
    72. Exercise 19.11.4 Tic Tac Toe
    73. Exercise 19.11.5 Music Library
    74. 19.12 CSS Select by ID

    75. Video 19.12.1 CSS Select by ID
    76. Check for Understanding 19.12.2 CSS Select by ID Quiz
    77. Example 19.12.3 Logo
    78. Exercise 19.12.4 Favorite Dog
    79. Exercise 19.12.5 Bingo
    80. Badge 19.12.6 CSS Badge
    81. 19.13 Viewing Websites

    82. Video 19.13.1 Viewing Websites
    83. Check for Understanding 19.13.2 Viewing Websites Quiz
    84. Free Response 19.13.3 Explaining a URL
    85. 19.14 Web Development Quiz

    86. Unit Quiz 19.14.1 Web Development Quiz
    87. 19.15 Your First Website

    88. Challenge 19.15.1 Set Up Your codehs.me Website
    89. Challenge 19.15.2 Practice PT: Your First Website
    90. Badge 19.15.3 Website Badge
  20. Midterm

    1. 20.1 Midterm

    2. Midterm 20.1.1 Midterm
  21. Karel Challenges

    1. 21.1 Challenge Problems

    2. Challenge 21.1.1 Fetch
    3. Challenge 21.1.2 Racing Karel
    4. Challenge 21.1.3 Tower Builder
    5. Challenge 21.1.4 Super Cleanup Karel
    6. Challenge 21.1.5 Double Tennis Balls
    7. Badge 21.1.6 Karel Challenges Badge
  22. JavaScript Control Structures

    1. 22.1 Booleans

    2. Video 22.1.1 Booleans
    3. Check for Understanding 22.1.2 Booleans Quiz
    4. Example 22.1.3 First Boolean
    5. Exercise 22.1.4 Do You Have a Dog?
    6. 22.2 Logical Operators

    7. Video 22.2.1 Logical Operators
    8. Check for Understanding 22.2.2 Logical Operators Quiz
    9. Example 22.2.3 Light Switch
    10. Example 22.2.4 President
    11. Example 22.2.5 Wasting Time
    12. Exercise 22.2.6 Can You Graduate?
    13. Exercise 22.2.7 School's Out
    14. 22.3 Comparison Operators

    15. Video 22.3.1 Comparison Operators
    16. Check for Understanding 22.3.2 Comparison Operators Quiz
    17. Example 22.3.3 Voting Age
    18. Example 22.3.4 Grade Range
    19. Exercise 22.3.5 Rolling Dice
    20. Exercise 22.3.6 Girl Scout Designation
    21. 22.4 If Statements

    22. Video 22.4.1 If Statements
    23. Check for Understanding 22.4.2 If Statements Quiz
    24. Example 22.4.3 Negative Numbers
    25. Example 22.4.4 Great Names
    26. Example 22.4.5 Even and Odd
    27. Example 22.4.6 Secret Password
    28. Exercise 22.4.7 Teenagers
    29. Exercise 22.4.8 Dietary Restrictions
    30. Badge 22.4.9 Conditionals Badge
    31. Survey 22.4.10 Mindset Survey 2
    32. 22.5 For Loops in JavaScript

    33. Video 22.5.1 Basic For Loop
    34. Check for Understanding 22.5.2 For Loops Quiz
    35. Example 22.5.3 For Loop
    36. Exercise 22.5.4 Chalkboard
    37. Exercise 22.5.5 The Worm
    38. Exercise 22.5.6 Caterpillar
    39. 22.6 General For Loops

    40. Video 22.6.1 General For Loop
    41. Check for Understanding 22.6.2 General For Loop Quiz
    42. Example 22.6.3 Countdown
    43. Example 22.6.4 Count By Twos
    44. Exercise 22.6.5 Count By Sevens
    45. Exercise 22.6.6 Powers of Two
    46. 22.7 For Loop Practice

    47. Video 22.7.1 For Loop Examples
    48. Check for Understanding 22.7.2 For Loop Examples Quiz
    49. Example 22.7.3 For Loop Sum
    50. Exercise 22.7.4 Better Sum
    51. Exercise 22.7.5 Factorial
    52. Exercise 22.7.6 All Dice Values
    53. 22.8 Random Numbers

    54. Video 22.8.1 Random Numbers
    55. Check for Understanding 22.8.2 Random Numbers Quiz
    56. Example 22.8.3 Rolling a Die
    57. Example 22.8.4 Flipping a Coin
    58. Exercise 22.8.5 Lots of Rolls
    59. Exercise 22.8.6 Random Color Square
    60. Badge 22.8.7 Randomizer Badge
    61. 22.9 While Loops

    62. Video 22.9.1 While Loops
    63. Check for Understanding 22.9.2 While Loops Quiz
    64. Example 22.9.3 While Loop Countdown
    65. Exercise 22.9.4 Inventory
    66. Exercise 22.9.5 Fibonacci
    67. Exercise 22.9.6 Concentric Circles
    68. 22.10 Loop and a Half

    69. Video 22.10.1 Loop and a Half
    70. Check for Understanding 22.10.2 Loop and a Half Quiz
    71. Example 22.10.3 Adding Up Numbers
    72. Exercise 22.10.4 Snake Eyes
    73. Exercise 22.10.5 Better Password Prompt
    74. Badge 22.10.6 Looper Badge
    75. 22.11 Javascript Control Structures Quiz

    76. Unit Quiz 22.11.1 JavaScript Control Structures Quiz
  23. Control Structures Challenges

    1. 23.1 Control Structures Challenges

    2. Challenge 23.1.1 Guessing Game
    3. Challenge 23.1.2 Circles in Circles
    4. Challenge 23.1.3 Circles in Squares
    5. Challenge 23.1.4 Happy Birthday!
  24. Cybersecurity Labs

    1. 24.1 Labs

    2. Resource 24.1.1 Lab: Configuring a Computer
    3. Resource 24.1.2 Lab: Design a Distribution Frame
    4. 24.2 Lab: Computer Disassembly

    5. Resource 24.2.1 Lab: Computer Disassembly
    6. Connection 24.2.2 Video: Disassemble a Computer
    7. Connection 24.2.3 Article: Disassemble a Computer
    8. 24.3 Lab: SOHO Devices

    9. Notes 24.3.1 SOHO Devices
    10. Resource 24.3.2 Lab: Printer Settings
    11. Free Response 24.3.3 Sharing Devices
    12. 24.4 Lab: Windows Networking

    13. Resource 24.4.1 Lab: Windows Networking
    14. Resource 24.4.2 Lab: Windows Networking w/Simulation
    15. Example 24.4.3 Windows Networking
    16. 24.5 Lab: Mobile Device Connectivity

    17. Connection 24.5.1 Mobile Device Features
    18. Notes 24.5.2 Mobile Device Simulator
    19. Resource 24.5.3 Lab: Mobile Device Connectivity
  25. Cybersecurity Level 1 Certification Practice

    1. 25.1 Practice #1: Programming and Software Security

    2. Quiz 25.1.1 Quiz: Programming and Software Security
    3. Notes 25.1.2 Practice #1 Reflection
    4. 25.2 Practice #2: IT Infrastructure + Networks

    5. Quiz 25.2.1 Quiz: IT Infrastructure and Networks
    6. Notes 25.2.2 Practice #2 Reflection
    7. 25.3 Practice #3: Digital Citizenship + Cybersecurity

    8. Quiz 25.3.1 Quiz: Digital Citizenship + Cybersecurity
    9. Notes 25.3.2 Practice #3 Reflection
    10. 25.4 Practice #4: System Admin and Cryptography

    11. Quiz 25.4.1 Quiz: System Admin and Cryptography
    12. Notes 25.4.2 Practice #4 Reflection
    13. 25.5 Mixed Practice Test

    14. Notes 25.5.1 Important Note
    15. Quiz 25.5.2 Mixed Practice
    16. Notes 25.5.3 Mixed Practice Reflection