1. 1.1 Welcome to Advanced Cybersecurity!

2. Notes 1.1.1 Course Introduction
3. Connection 1.1.2 Cybersecurity 101
4. Free Response 1.1.3 Cyber Heat Map
5. Free Response 1.1.4 Career Pathways
6. Connection 1.1.5 Starting with Cryptography
7. Free Response 1.1.6 Course Goals
8. 1.2 Encryption Algorithms

9. Video 1.2.1 Symmetric Encryption
10. Check for Understanding 1.2.2 Ciphers Quiz
11. Free Response 1.2.3 Enhanced Caesar Cipher
12. Free Response 1.2.4 Mixed Alphabet Cipher
13. Example 1.2.5 Pigpen Encoder
14. Free Response 1.2.6 Pigpen Cipher
15. Free Response 1.2.7 Rail Fence Cipher
16. Video 1.2.8 Encryption Standards
17. Check for Understanding 1.2.9 Encryption Standards Quiz

20. Check for Understanding 1.3.2 Advanced Cryptography
21. Connection 1.3.3 Public Key Cryptography for Non-Geeks
22. Free Response 1.3.4 Examining Public Key Cryptography
23. Connection 1.3.5 Public Key Cryptography
24. Free Response 1.3.6 Public Key Cryptography
25. 1.4 Hash Functions

26. Video 1.4.1 Hash Functions
27. Check for Understanding 1.4.2 Hash Functions
28. Connection 1.4.3 Google Shattered Crypto Algorithm
29. Free Response 1.4.4 Hash Functions in the News
30. Connection 1.4.5 Using a Hash Generator
31. Free Response 1.4.6 Hash Generator
33. Free Response 1.4.8 Password Salting
34. 1.5 Hash Function Development

35. Video 1.5.1 Hash Function Development
36. Check for Understanding 1.5.2 Hash Function Development
37. Example 1.5.3 Modulo Math Calculator
38. Example 1.5.4 Understanding Modulo Math
39. Example 1.5.5 Modulo Game!
40. Exercise 1.5.6 Develop a Simple Hash Function
41. 1.6 Asymmetric Encryption

42. Video 1.6.1 Asymmetric Encryption
43. Check for Understanding 1.6.2 Asymmetric Encryption Quiz
44. Example 1.6.3 Diffie-Hellman Key Exchange
45. Free Response 1.6.4 Affine Cipher
46. Free Response 1.6.5 Trapdoor Functions
47. Notes 1.6.6 RSA Encryption
48. Free Response 1.6.7 RSA Reflection
49. 1.7 Digital Certificates

50. Video 1.7.1 Digital Certificates
51. Check for Understanding 1.7.2 Digital Certificates
52. Connection 1.7.3 SSL Explained
53. Free Response 1.7.4 SSL Explained Response
54. Free Response 1.7.5 Digital Certificate Connection
55. Connection 1.7.6 In The News
56. Free Response 1.7.7 In The News Response
57. Free Response 1.7.8 Become a Certificate Authority!

59. Unit Quiz 1.8.1 Advanced Cryptography Quiz
2. Project: Steganography

1. 2.1 Project: Steganography

2. Video 2.1.1 What is Steganography?
3. Connection 2.1.2 Government Surveillance and Reality Winner
4. Free Response 2.1.3 Government Surveillance and Reality Winner
5. Connection 2.1.4 Data Hiding and Extraction
6. Free Response 2.1.5 Reflect: Data Hiding and Extraction
7. Example 2.1.6 Hide Text
8. Example 2.1.7 Hidden Message
9. Free Response 2.1.8 Your turn: Encryption Algorithm
10. Challenge 2.1.9 Your turn: Image Creation
11. Free Response 2.1.10 Final Algorithm and Partner Decode
12. Free Response 2.1.11 Final Reflection

3. Check for Understanding 3.1.2 Advanced Devices Quiz
4. Connection 3.1.3 Network Administrator Career
5. Free Response 3.1.4 Network Administrator Career
6. Free Response 3.1.5 Choosing the Best Devices
7. Free Response 3.1.6 Network Diagram
8. 3.2 Environmental Controls

9. Video 3.2.1 Environmental Controls
10. Check for Understanding 3.2.2 Environmental Controls Quiz
11. Connection 3.2.3 Infographic
12. Free Response 3.2.4 Infographic FR
13. Free Response 3.2.5 Your Security Systems
14. Free Response 3.2.6 Security Design
15. 3.3 Protocols and Standards

16. Video 3.3.1 Protocols
17. Check for Understanding 3.3.2 Protocols Quiz
18. Video 3.3.3 Standards
19. Check for Understanding 3.3.4 Standards Quiz
20. Connection 3.3.5 The New Wireless Standard
21. Connection 3.3.6 801.11ax
22. Free Response 3.3.7 801.11ax FR
23. 3.4 Private Networks

24. Video 3.4.1 IP and MAC Addresses
25. Check for Understanding 3.4.2 IP and MAC Addresses Quiz
26. Example 3.4.3 Intranet Permissions
27. Free Response 3.4.4 Coffee Shop: Design an Intranet
28. Video 3.4.5 DMZs and VPNs
29. Check for Understanding 3.4.6 DMZs and VPNs Quiz
30. Connection 3.4.7 Protecting Privacy with VPNs
31. Free Response 3.4.8 Protecting Privacy with VPNs
32. Free Response 3.4.9 Coffee Shop: Network Plan
33. Free Response 3.4.10 Coffee Shop: Network Diagram
34. Video 3.4.11 SOHO Network
35. Example 3.4.12 Network Topologies
36. 3.5 Mobile Devices

37. Video 3.5.1 Mobile Devices
38. Check for Understanding 3.5.2 Mobile Devices Quiz
39. Connection 3.5.3 How Apple FaceID Works
40. Free Response 3.5.4 How Apple FaceID Works Response
41. Free Response 3.5.5 Biometric Data Debate
42. Connection 3.5.6 BYOD and MDM Concept Map
43. Free Response 3.5.7 BYOD and MDM Conclusions
44. 3.6 Access Control

45. Video 3.6.1 Access Control
46. Check for Understanding 3.6.2 Access Control
47. Example 3.6.3 Multifactor Authentication
48. Example 3.6.4 Two Factor Authentication
49. Free Response 3.6.5 Two Factor Authentication Reflection
50. Connection 3.6.6 RADIUS Overview with AAA Protocol
51. Connection 3.6.7 RADIUS Server Access Control
52. Free Response 3.6.8 RADIUS Reflection

54. Unit Quiz 3.7.1 Advanced Networking Quiz
4. Project: IT Professional

1. 4.1 Communication is Key!

2. Notes 4.1.1 IT Professional
3. Free Response 4.1.2 Cybersecurity Careers
4. Connection 4.1.3 Customer Service Skills
5. Free Response 4.1.4 Customer Service Skills
6. Free Response 4.1.5 Act it Out!
7. 4.2 Building a Knowledge Base

8. Connection 4.2.1 What is a Knowledge Base?
9. Free Response 4.2.2 Draft a KB Article
10. Free Response 4.2.3 Share your KB Article
11. Free Response 4.2.4 Finalize your KB Article
12. 4.3 Star in a Video!

13. Connection 4.3.1 Instructional Videos
14. Connection 4.3.2 Example Tutorial
15. Free Response 4.3.3 Instructional Video Plan
16. Free Response 4.3.4 Write the Script
17. Free Response 4.3.5 Create the Storyboard
18. Free Response 4.3.6 Record Your Video
5. Cyber Defense

1. 5.1 Network Attacks

2. Video 5.1.1 Network Attacks Overview
3. Check for Understanding 5.1.2 Network Attacks Quiz
4. Notes 5.1.3 Check for Vulnerabilities
5. Connection 5.1.4 Bug Bounty Hunting
6. Free Response 5.1.5 Bug Bounty Hunting
7. Connection 5.1.6 Common Port Targets
8. Example 5.1.7 Port Scanner Simulation
9. Free Response 5.1.8 Open Port Reflection
10. 5.2 Malware Types and Prevention

11. Video 5.2.1 Malware Types and Prevention
12. Check for Understanding 5.2.2 Malware Types and Prevention
13. Connection 5.2.3 How Anti-malware Works
14. Free Response 5.2.4 How Anti-malware Works
15. Free Response 5.2.5 OS Malware Security
16. Free Response 5.2.6 Reverse Engineering Malware
17. 5.3 Common Network Attacks

18. Video 5.3.1 Common Network Attacks
19. Check for Understanding 5.3.2 Network Attacks
20. Connection 5.3.3 Social Engineering Hack
21. Free Response 5.3.4 Social Engineering Reflection
22. Connection 5.3.5 DDoS Attacks
23. Example 5.3.6 DDoS Simulation
24. Free Response 5.3.7 DDoS Reflection

27. Check for Understanding 5.4.2 Additional Attacks Quiz
28. Connection 5.4.3 Botnet Attacks - Mirai
29. Connection 5.4.4 Botnet Attacks - 3ve
30. Connection 5.4.5 Botnet Attacks - 3ve Video
31. Free Response 5.4.6 Botnet Attacks - Reflection
32. Connection 5.4.7 Zero-day Exploit: Stuxnet
33. Notes 5.4.8 Zero-day Exploit: Stuxnet
34. Free Response 5.4.9 Zero-day Exploit Reflection
35. Free Response 5.4.10 US-CERT Current Activity
36. 5.5 Cross-site Scripting

37. Video 5.5.1 Cross-site Scripting
38. Check for Understanding 5.5.2 Cross-site Scripting
39. Connection 5.5.3 XSS Bug in Yahoo Mail
40. Free Response 5.5.4 XSS Bug in Yahoo Mail
41. Connection 5.5.5 Hacksplaining XSS Demo
42. Connection 5.5.6 Google's Tutorial for XSS
43. Free Response 5.5.7 XSS Reflection
44. 5.6 Internal Threats

45. Video 5.6.1 Internal Threats
46. Check for Understanding 5.6.2 Internal Threats
47. Connection 5.6.3 BIOS/UEFI Attack Example
48. Notes 5.6.4 Accessing BIOS/UEFI
49. Connection 5.6.5 Causes of Data Breaches
50. Free Response 5.6.6 Causes of Data Breaches
51. Connection 5.6.7 Protecting Data at All Times
52. Free Response 5.6.8 Protecting Data at All Times
53. 5.7 Cyber Defense Quiz

54. Unit Quiz 5.7.1 Cyber Defense Quiz
6. Project: Security Assessment Report

1. 6.1 Project Security Assessment Report

2. Notes 6.1.1 Project Requirements
3. Connection 6.1.2 Supercar Showdown Website
4. Free Response 6.1.3 Cross-site Scripting Testing
5. Resource 6.1.4 Cross-site Scripting Handout
6. Free Response 6.1.5 Security Assessment Report
7. Free Response 6.1.6 Project Reflection
7. Project: Put it in Writing!

1. 7.1 Level 1: Entry Event

2. Free Response 7.1.1 Company Development
3. Free Response 7.1.2 Level 1: Attack!
4. Video 7.1.3 Level 1: Project Overview
5. Connection 7.1.4 Put It In Writing! Rubric
6. 7.2 Level 2: User Training

7. Free Response 7.2.1 User Training Policy Development
8. Free Response 7.2.2 Challenge: Employee Negligence 1
9. Free Response 7.2.3 Challenge: Employee Negligence 2
10. Free Response 7.2.4 Level 2 Debrief
11. 7.3 Level 3: Incident Response

12. Connection 7.3.1 Incident Response Plan Template
13. Free Response 7.3.2 Incident Response Plan Link
14. Free Response 7.3.3 Challenge: Cyber Attack!
15. Free Response 7.3.4 Level 3 Debrief
16. 7.4 Level 4: Data and Licenses

17. Video 7.4.1 Data and Licenses
18. Connection 7.4.2 FTC Data Security Guide
19. Connection 7.4.3 Data Policy Template
20. Free Response 7.4.4 Data Policy Link
21. Free Response 7.4.5 Challenge: Data Breach 1
22. Free Response 7.4.6 Challenge: Data Breach 2
23. Free Response 7.4.7 Challenge: Data Breach 3
24. Free Response 7.4.8 Level 4 Debrief
25. 7.5 Level 5: Change Management

26. Video 7.5.1 Change Management
27. Connection 7.5.2 Change Management Plan
28. Free Response 7.5.3 Change Management Plan Link
8. Risk Management

1. 8.1 Identifying Risks

2. Video 8.1.1 Identifying Risks
3. Check for Understanding 8.1.2 Identifying Risks Quiz
4. Connection 8.1.3 What is a Honeypot?
5. Connection 8.1.4 Honeypot Attacks
6. Free Response 8.1.5 Honeypot Attacks
7. Free Response 8.1.6 Whois
8. Connection 8.1.7 Packet Sniffing
9. Free Response 8.1.8 Packet Sniffing Response
10. Free Response 8.1.9 Breach Trends
11. 8.2 Assessing Risks

12. Notes 8.2.1 Assessing Risks
13. Free Response 8.2.2 Malware Risk Assessment
14. Free Response 8.2.3 Poor Password Assessment
15. Free Response 8.2.4 Social Engineering Assessment
16. Video 8.2.5 Assessing Risks
17. Check for Understanding 8.2.6 Assessing Risks Quiz
18. Connection 8.2.7 End-of-Life OS
19. Free Response 8.2.8 End-of-Life Proposal
20. Example 8.2.9 Input Handling
21. Free Response 8.2.10 Input Handling Responses
22. Example 8.2.11 Input Validation
23. Free Response 8.2.12 Input Validation Responses
24. 8.3 Risk Response

25. Video 8.3.1 Risk Response
26. Check for Understanding 8.3.2 Risk Response
27. Free Response 8.3.3 Defense in Depth Risk Mitigation
28. Connection 8.3.4 Sample Risk Assessment Report
29. Free Response 8.3.5 Sample Risk Assessment Reflection
30. Connection 8.3.6 Delta Outage Video
31. Free Response 8.3.7 Delta Outage Reflection
32. Connection 8.3.8 What Happens When Your Servers Go Down
33. Free Response 8.3.9 What Happens When Your Servers Go Down Reflection
34. Free Response 8.3.10 Server Upgrade Memo
35. 8.4 Penetration Testing

36. Video 8.4.1 Penetration Testing
37. Check for Understanding 8.4.2 Penetration Testing
38. Connection 8.4.3 Penetration Test Report
39. Free Response 8.4.4 Penetration Test Report
40. Notes 8.4.5 Chaos Engineering
41. Free Response 8.4.6 Chaos Engineering Reflection
42. Resource 8.4.7 Pen Test Simulation Handout
43. Exercise 8.4.8 Pen Test Simulation: Active Recon
44. Exercise 8.4.9 Pen Test Simulation: Exploit Vulnerabilities
45. 8.5 Risk Management Quiz

46. Unit Quiz 8.5.1 Risk Management Quiz
9. Project: The Game of Risk

1. 9.1 The Game of Risk

2. Notes 9.1.1 Group Project Intro
3. Free Response 9.1.2 Brainstorm: Type of Game
4. Free Response 9.1.3 Brainstorm: SLE
5. Free Response 9.1.4 Brainstorm: Materials
6. Free Response 9.1.5 Prototype Game and Instructions
7. Free Response 9.1.6 Test Your Game!
8. Resource 9.1.7 Testing Feedback Form
9. Free Response 9.1.8 Create Your Final Version!
10. Midterm

1. 10.1 Midterm

2. Midterm 10.1.1 Midterm
11. Final Exam

1. 11.1 Final Exam

2. Final 11.1.1 Final Exam
12. What's Next?

2. Notes 12.1.1 Cybersecurity Pathways
3. Connection 12.1.2 CodeHS Programming Courses
4. Notes 12.1.3 College Pathway
5. Connection 12.1.4 Certification Pathway
6. Connection 12.1.5 Career Spotlight
7. Free Response 12.1.6 My Pathway
13. Cryptocurrency

1. 13.1 What is Currency?

2. Video 13.1.1 What is Currency?
3. Check for Understanding 13.1.2 What is Currency?
4. Connection 13.1.3 What Gives Paper Money Its Actual Value
5. Free Response 13.1.4 What Gives Money Its Value
6. Resource 13.1.5 Money: What is it Good For?
7. 13.2 What is Cryptocurrency?

8. Video 13.2.1 Cryptocurrency Basics
9. Check for Understanding 13.2.2 Cryptocurrency Basics
10. Video 13.2.3 Cryptocurrency Module Overview
11. Connection 13.2.4 Cryptocurrencies Might Help Developing Countries
12. Free Response 13.2.5 Cryptocurrencies are Helping Developing Countries
13. Resource 13.2.6 Show Me the Money
14. Free Response 13.2.7 American Currency Exhibit
15. 13.3 Intro to Blockchain

16. Video 13.3.1 Intro to Blockchain
17. Check for Understanding 13.3.2 Intro to Blockchain
18. Connection 13.3.3 CryptoKitties
19. Free Response 13.3.4 CryptoKitties
20. 13.4 Hashing

21. Video 13.4.1 Hashing
22. Check for Understanding 13.4.2 Hashing
23. Connection 13.4.3 SHA256 Hash Generator
24. Free Response 13.4.4 Using the SHA256 Hash Generator
25. 13.5 Proof of Work

26. Video 13.5.1 Proof of Work
27. Check for Understanding 13.5.2 Proof of Work
28. Video 13.5.3 Mining the Block
29. Check for Understanding 13.5.4 Mining the Block
30. Connection 13.5.5 PoW vs. Proof of Stake
31. Free Response 13.5.6 PoW vs. PoS
32. Resource 13.5.7 Checking Proof of Work

34. Video 13.6.1 Advanced Blockchain (part 1)
35. Check for Understanding 13.6.2 Advanced Blockchain (part 1)
36. Connection 13.6.3 Blockchain Buzz
37. Free Response 13.6.4 Blockchain Buzz
38. Video 13.6.5 Advanced Blockchain (part 2)
39. Free Response 13.6.6 Advanced Blockchain (part 2)
40. Resource 13.6.7 Make a Blockchain
41. Connection 13.6.8 SUPPLEMENTARY: How to TimeStamp a Document
42. 13.7 Cryptocurrencies

43. Video 13.7.1 Cryptocurrencies
44. Check for Understanding 13.7.2 Cryptocurrencies
45. Free Response 13.7.3 Shiny Toy Phenomenon
46. Connection 13.7.4 Walmart Using Blockchain to Stop Spread of Disease
47. Free Response 13.7.5 Walmart Use of Blockchain
48. 13.8 Bitcoin

49. Video 13.8.1 Bitcoin
50. Check for Understanding 13.8.2 Bitcoin
51. Connection 13.8.3 51% Attack Explained
52. Free Response 13.8.4 51% Attack
53. Connection 13.8.5 Why the Bitcoin Bubble will Burst in 2018
54. Free Response 13.8.6 Bitcoin Bust
55. Resource 13.8.7 Explore the Bitcoin Blockchain
56. 13.9 Pros, Cons, and Future of Cryptocurrencies

57. Video 13.9.1 Pros, Cons, and Future of Cryptocurrencies
58. Check for Understanding 13.9.2 Pros, Cons and Future of Cryptocurrencies
59. Free Response 13.9.3 Pros, Cons and future of Cryptocurrencies
60. Connection 13.9.4 Cryptocurrency Pros and Cons
61. Free Response 13.9.5 Crypto Pros and Cons
62. Connection 13.9.6 What is HODL?
63. Free Response 13.9.7 What is HODL?
64. Free Response 13.9.8 Pros, Cons, and Future of Cryptocurrencies
65. 13.10 Project: Cryptocurrency Expert Panel Talk

66. Free Response 13.10.1 Overview
67. Free Response 13.10.2 Preview Sample Expert Panels
68. Free Response 13.10.3 Investigate a Cryptocurrency Topic
69. Free Response 13.10.4 Write an Outline and Rehearse
70. Free Response 13.10.5 Expert Panel Talk (Presentation)
71. 13.11 Cryptocurrency Quiz

72. Unit Quiz 13.11.1 Cryptocurrency Quiz
14. Web Development

1. 14.1 Introduction to HTML

2. Video 14.1.1 Introduction to HTML
3. Check for Understanding 14.1.2 Introduction to HTML Quiz
4. Example 14.1.3 Our First HTML Page
5. Exercise 14.1.4 Say Hello!
6. 14.2 Structure of an HTML Page

7. Video 14.2.1 Structure of an HTML Page
8. Check for Understanding 14.2.2 Structure of an HTML Page Quiz
9. Example 14.2.3 HTML Template
10. Example 14.2.4 Hello World Page
11. Exercise 14.2.5 The <title> Tag
12. Exercise 14.2.6 Your First HTML Page
14. 14.3 Formatting Text

15. Video 14.3.1 Formatting Text
16. Check for Understanding 14.3.2 Formatting Text Quiz
17. Example 14.3.3 Dictionary
18. Exercise 14.3.4 That's Bold
19. Exercise 14.3.5 Artificial Intelligence
20. Exercise 14.3.6 State Capitals

23. Check for Understanding 14.4.2 Links Quiz
24. Example 14.4.3 The <a> Tag
26. Exercise 14.4.5 My Favorite Websites
27. 14.5 Images

28. Video 14.5.1 Images
29. Check for Understanding 14.5.2 Images Quiz
30. Example 14.5.3 The <img> Tag
31. Example 14.5.4 Building the CodeHS Homepage
32. Exercise 14.5.5 Collage on a Theme
33. Exercise 14.5.6 Linking an Image
34. Exercise 14.5.7 Personal Library
36. 14.6 HTML Lists

37. Video 14.6.1 HTML Lists
38. Check for Understanding 14.6.2 HTML Lists Quiz
39. Example 14.6.3 Grocery Shopping
40. Exercise 14.6.4 Favorite Things
41. Exercise 14.6.5 To-Do List
42. Exercise 14.6.6 List Article
43. 14.7 HTML Tables

44. Video 14.7.1 HTML Tables
45. Check for Understanding 14.7.2 HTML Tables Quiz
47. Exercise 14.7.4 Favorite Songs
48. Exercise 14.7.5 Calendar
49. 14.8 HTML Styling

50. Video 14.8.1 HTML Styling
51. Check for Understanding 14.8.2 HTML Styling Quiz
52. Example 14.8.3 Stylish Address Book
53. Exercise 14.8.4 Background Colors
54. Exercise 14.8.5 Style Your To-Do List
55. 14.9 Introduction to CSS

56. Video 14.9.1 Introduction to CSS
57. Check for Understanding 14.9.2 Introduction to CSS Quiz
58. Example 14.9.3 Styling Your H1s
59. Exercise 14.9.4 First Style with CSS
60. Exercise 14.9.5 List Styling
61. 14.10 CSS Select by Tag

62. Video 14.10.1 CSS Select by Tag
63. Check for Understanding 14.10.2 CSS Select by Tag Quiz
64. Example 14.10.3 Rainbow
65. Example 14.10.4 Dog Styling
67. Exercise 14.10.6 Put Karel Together
68. 14.11 CSS Select by Class

69. Video 14.11.1 CSS Select by Class
70. Check for Understanding 14.11.2 CSS Select by Class Quiz
71. Example 14.11.3 Simple Checkerboard
72. Exercise 14.11.4 Tic Tac Toe
73. Exercise 14.11.5 Music Library
74. 14.12 CSS Select by ID

75. Video 14.12.1 CSS Select by ID
76. Check for Understanding 14.12.2 CSS Select by ID Quiz
77. Example 14.12.3 Logo
78. Exercise 14.12.4 Favorite Dog
79. Exercise 14.12.5 Bingo
81. 14.13 Viewing Websites

82. Video 14.13.1 Viewing Websites
83. Check for Understanding 14.13.2 Viewing Websites Quiz
84. Free Response 14.13.3 Explaining a URL
85. 14.14 Web Development Quiz

86. Unit Quiz 14.14.1 Web Development Quiz

88. Challenge 14.15.1 Set Up Your codehs.me Website
89. Challenge 14.15.2 Practice PT: Your First Website
15. SQL Part II: The SQL

1. 15.1 More Filtering Practice

2. Exercise 15.1.1 Initials
3. Exercise 15.1.2 Compound Queries with BETWEEN
4. Exercise 15.1.3 Gryffindors With G Names
5. Exercise 15.1.4 R First Names
6. Exercise 15.1.5 FF Houses
7. 15.2 Ordering Results

8. Video 15.2.1 The ORDER BY Keyword
9. Notes 15.2.2 ORDER BY
10. Example 15.2.3 ORDER BY First Name
11. Example 15.2.4 Reverse Order
12. Example 15.2.5 Order By Multiple Fields
13. Exercise 15.2.6 House Ordering
14. Exercise 15.2.7 Sort the P Names
15. 15.3 Renaming Fields

16. Notes 15.3.1 Renaming Fields with AS
17. Example 15.3.2 Renaming in the House Table
18. Exercise 15.3.3 Changing Column Names
19. 15.4 Joining Tables

20. Video 15.4.1 The JOIN command
21. Notes 15.4.2 Basic Joining
22. Example 15.4.3 Letters and Numbers
23. Example 15.4.4 Person and House
24. Example 15.4.5 Person and House (Correct)
25. Example 15.4.6 Person and House (with namespacing)
26. Exercise 15.4.7 List All Gryffindors
27. Video 15.4.8 JOIN With Yourself
28. Notes 15.4.9 Renaming Tables
29. Example 15.4.10 Quidditch Matchups
30. Exercise 15.4.11 Quidditch Matchups: Ravenclaw Away Games
31. 15.5 More Joining Tables

32. Example 15.5.1 The Course Table
33. Exercise 15.5.2 Courses and Professors
34. Exercise 15.5.3 Courses, Professors, and Houses
35. Exercise 15.5.4 Courses Taught By Gryffindors
36. Example 15.5.5 The Enrollment Table
37. Exercise 15.5.6 Students Taking Potions
38. Exercise 15.5.7 Non-Slytherins Taking Potions
39. Exercise 15.5.8 Defense Students by House
40. Exercise 15.5.9 Neville's Courses
16. More Cyber Topics

2. Connection 16.1.1 Air Gapped Computers
3. Free Response 16.1.2 Air Gapped Computers Response
4. Connection 16.1.3 Cyberterrorism
5. Free Response 16.1.4 Cyberterrorism Response
6. Connection 16.1.5 What is Virtualization?
7. Free Response 16.1.6 Virtualization Response
8. Connection 16.1.7 The OSI Model and Network Attacks
9. Free Response 16.1.8 The OSI Model and Network Attacks Response
10. Connection 16.1.9 The Machine Instruction Cycle
17. Cybersecurity Labs

1. 17.1 Labs

2. Resource 17.1.1 Lab: Configuring a Computer
3. Resource 17.1.2 Lab: Design a Distribution Frame
4. 17.2 Lab: Computer Disassembly

5. Resource 17.2.1 Lab: Computer Disassembly
6. Connection 17.2.2 Video: Disassemble a Computer
7. Connection 17.2.3 Article: Disassemble a Computer
8. 17.3 Lab: SOHO Devices

9. Notes 17.3.1 SOHO Devices
10. Resource 17.3.2 Lab: Printer Settings
11. Free Response 17.3.3 Sharing Devices
12. 17.4 Lab: Windows Networking

13. Resource 17.4.1 Lab: Windows Networking
14. Resource 17.4.2 Lab: Windows Networking w/Simulation
15. Example 17.4.3 Windows Networking
16. 17.5 Lab: Mobile Device Connectivity

17. Connection 17.5.1 Mobile Device Features
18. Notes 17.5.2 Mobile Device Simulator
19. Resource 17.5.3 Lab: Mobile Device Connectivity
18. Cloud Computing

1. 18.1 Different Types of Cloud Computing

2. Connection 18.1.1 SaaS, IaaS, and PaaS
3. Free Response 18.1.2 Research Project: Cloud Computing Types
19. Cybersecurity Level 2 Certification Practice

1. 19.1 Practice #1: Advanced Cryptography

2. Quiz 19.1.1 Quiz: Advanced Cryptography
3. Notes 19.1.2 Practice #1 Reflection
4. 19.2 Practice #2: Advanced Networking

5. Quiz 19.2.1 Quiz: Advanced Networking
6. Notes 19.2.2 Practice #2 Reflection
7. 19.3 Practice #3: Cyber Defense

8. Quiz 19.3.1 Quiz: Cyber Defense
9. Notes 19.3.2 Practice #3 Reflection
10. 19.4 Practice #4: Documentation & Risk Management

11. Quiz 19.4.1 Quiz: Documentation & Risk Management
12. Notes 19.4.2 Practice #4 Reflection