### Please enable JavaScript to use CodeHS

#### Points

Activity Points Item Type
1.1 Welcome to Advanced Cybersecurity! Lesson
1.1.1 Course Introduction 1 Notes
1.1.2 Cybersecurity 101 1 Connection
1.1.3 Cyber Heat Map 5 Free Response
1.1.4 Career Pathways 5 Free Response
1.1.5 Starting with Cryptography 1 Connection
1.1.6 Course Goals 5 Free Response
1.2 Encryption Algorithms Lesson
1.2.1 Symmetric Encryption 1 Video
1.2.2 Ciphers Quiz 2 Check for Understanding
1.2.3 Enhanced Caesar Cipher 5 Free Response
1.2.4 Mixed Alphabet Cipher 5 Free Response
1.2.5 Pigpen Encoder 1 Example
1.2.6 Pigpen Cipher 5 Free Response
1.2.7 Rail Fence Cipher 5 Free Response
1.2.8 Encryption Standards 1 Video
1.2.9 Encryption Standards Quiz 3 Check for Understanding
1.3.2 Advanced Cryptography 3 Check for Understanding
1.3.3 Public Key Cryptography for Non-Geeks 1 Connection
1.3.4 Examining Public Key Cryptography 5 Free Response
1.3.5 Public Key Cryptography 1 Connection
1.3.6 Public Key Cryptography 5 Free Response
1.4 Hash Functions Lesson
1.4.1 Hash Functions 1 Video
1.4.2 Hash Functions 3 Check for Understanding
1.4.3 Google Shattered Crypto Algorithm 1 Connection
1.4.4 Hash Functions in the News 5 Free Response
1.4.5 Using a Hash Generator 1 Connection
1.4.6 Hash Generator 5 Free Response
1.4.8 Password Salting 5 Free Response
1.5 Hash Function Development Lesson
1.5.1 Hash Function Development 1 Video
1.5.2 Hash Function Development 2 Check for Understanding
1.5.3 Modulo Math Calculator 1 Example
1.5.4 Understanding Modulo Math 1 Example
1.5.5 Modulo Game! 1 Example
1.5.6 Develop a Simple Hash Function 5 Exercise
1.6 Asymmetric Encryption Lesson
1.6.1 Asymmetric Encryption 1 Video
1.6.2 Asymmetric Encryption Quiz 5 Check for Understanding
1.6.3 Diffie-Hellman Key Exchange 1 Example
1.6.4 Affine Cipher 5 Free Response
1.6.5 Trapdoor Functions 5 Free Response
1.6.6 RSA Encryption 1 Notes
1.6.7 RSA Reflection 5 Free Response
1.7 Digital Certificates Lesson
1.7.1 Digital Certificates 1 Video
1.7.2 Digital Certificates 4 Check for Understanding
1.7.3 SSL Explained 1 Connection
1.7.4 SSL Explained Response 5 Free Response
1.7.5 Digital Certificate Connection 5 Free Response
1.7.6 In The News 1 Connection
1.7.7 In The News Response 5 Free Response
1.7.8 Become a Certificate Authority! 10 Free Response
1.8.1 Advanced Cryptography Quiz 20 Unit Quiz
Project: Steganography
2.1 Project: Steganography Lesson
2.1.1 What is Steganography? 1 Video
2.1.2 Government Surveillance and Reality Winner 1 Connection
2.1.3 Government Surveillance and Reality Winner 5 Free Response
2.1.4 Data Hiding and Extraction 1 Connection
2.1.5 Reflect: Data Hiding and Extraction 5 Free Response
2.1.6 Hide Text 1 Example
2.1.7 Hidden Message 1 Example
2.1.8 Your turn: Encryption Algorithm 5 Free Response
2.1.9 Your turn: Image Creation 10 Challenge
2.1.10 Final Algorithm and Partner Decode 5 Free Response
2.1.11 Final Reflection 5 Free Response
3.1.2 Advanced Devices Quiz 5 Check for Understanding
3.1.3 Network Administrator Career 1 Connection
3.1.4 Network Administrator Career 5 Free Response
3.1.5 Choosing the Best Devices 5 Free Response
3.1.6 Network Diagram 5 Free Response
3.2 Environmental Controls Lesson
3.2.1 Environmental Controls 1 Video
3.2.2 Environmental Controls Quiz 5 Check for Understanding
3.2.3 Infographic 1 Connection
3.2.4 Infographic FR 5 Free Response
3.2.5 Your Security Systems 5 Free Response
3.2.6 Security Design 10 Free Response
3.3 Protocols and Standards Lesson
3.3.1 Protocols 1 Video
3.3.2 Protocols Quiz 3 Check for Understanding
3.3.3 Standards 1 Video
3.3.4 Standards Quiz 2 Check for Understanding
3.3.5 The New Wireless Standard 1 Connection
3.3.6 801.11ax 1 Connection
3.3.7 801.11ax FR 5 Free Response
3.4 Private Networks Lesson
3.4.1 IP and MAC Addresses 1 Video
3.4.2 IP and MAC Addresses Quiz 2 Check for Understanding
3.4.3 Intranet Permissions 1 Example
3.4.4 Coffee Shop: Design an Intranet 5 Free Response
3.4.5 DMZs and VPNs 1 Video
3.4.6 DMZs and VPNs Quiz 3 Check for Understanding
3.4.7 Protecting Privacy with VPNs 1 Connection
3.4.8 Protecting Privacy with VPNs 5 Free Response
3.4.9 Coffee Shop: Network Plan 5 Free Response
3.4.10 Coffee Shop: Network Diagram 5 Free Response
3.4.11 SOHO Network 1 Video
3.4.12 Network Topologies 1 Example
3.5 Mobile Devices Lesson
3.5.1 Mobile Devices 1 Video
3.5.2 Mobile Devices Quiz 5 Check for Understanding
3.5.3 How Apple FaceID Works 1 Connection
3.5.4 How Apple FaceID Works Response 5 Free Response
3.5.5 Biometric Data Debate 5 Free Response
3.5.6 BYOD and MDM Concept Map 1 Connection
3.5.7 BYOD and MDM Conclusions 5 Free Response
3.6 Access Control Lesson
3.6.1 Access Control 1 Video
3.6.2 Access Control 4 Check for Understanding
3.6.3 Multifactor Authentication 1 Example
3.6.4 Two Factor Authentication 1 Example
3.6.5 Two Factor Authentication Reflection 5 Free Response
3.6.6 RADIUS Overview with AAA Protocol 1 Connection
3.6.7 RADIUS Server Access Control 1 Connection
3.6.8 RADIUS Reflection 5 Free Response
3.7.1 Advanced Networking Quiz 20 Unit Quiz
Project: IT Professional
4.1 Communication is Key! Lesson
4.1.1 IT Professional 5 Notes
4.1.2 Cybersecurity Careers 5 Free Response
4.1.3 Customer Service Skills 1 Connection
4.1.4 Customer Service Skills 5 Free Response
4.1.5 Act it Out! 15 Free Response
4.2 Building a Knowledge Base Lesson
4.2.1 What is a Knowledge Base? 1 Connection
4.2.2 Draft a KB Article 5 Free Response
4.2.3 Share your KB Article 5 Free Response
4.2.4 Finalize your KB Article 15 Free Response
4.3 Star in a Video! Lesson
4.3.1 Instructional Videos 1 Connection
4.3.2 Example Tutorial 1 Connection
4.3.3 Instructional Video Plan 5 Free Response
4.3.4 Write the Script 5 Free Response
4.3.5 Create the Storyboard 5 Free Response
4.3.6 Record Your Video 5 Free Response
Cyber Defense
5.1 Network Attacks Lesson
5.1.1 Network Attacks Overview 1 Video
5.1.2 Network Attacks Quiz 4 Check for Understanding
5.1.3 Check for Vulnerabilities 1 Notes
5.1.4 Bug Bounty Hunting 1 Connection
5.1.5 Bug Bounty Hunting 5 Free Response
5.1.6 Common Port Targets 1 Connection
5.1.7 Port Scanner Simulation 1 Example
5.1.8 Open Port Reflection 5 Free Response
5.2 Malware Types and Prevention Lesson
5.2.1 Malware Types and Prevention 1 Video
5.2.2 Malware Types and Prevention 5 Check for Understanding
5.2.3 How Anti-malware Works 1 Connection
5.2.4 How Anti-malware Works 5 Free Response
5.2.5 OS Malware Security 5 Free Response
5.2.6 Reverse Engineering Malware 5 Free Response
5.3 Common Network Attacks Lesson
5.3.1 Common Network Attacks 1 Video
5.3.2 Network Attacks 3 Check for Understanding
5.3.3 Social Engineering Hack 1 Connection
5.3.4 Social Engineering Reflection 5 Free Response
5.3.5 DDoS Attacks 1 Connection
5.3.6 DDoS Simulation 1 Example
5.3.7 DDoS Reflection 5 Free Response
5.4.2 Additional Attacks Quiz 5 Check for Understanding
5.4.3 Botnet Attacks - Mirai 1 Connection
5.4.4 Botnet Attacks - 3ve 1 Connection
5.4.5 Botnet Attacks - 3ve Video 1 Connection
5.4.6 Botnet Attacks - Reflection 5 Free Response
5.4.7 Zero-day Exploit: Stuxnet 5 Connection
5.4.8 Zero-day Exploit: Stuxnet 5 Notes
5.4.9 Zero-day Exploit Reflection 5 Free Response
5.4.10 US-CERT Current Activity 5 Free Response
5.5 Cross-site Scripting Lesson
5.5.1 Cross-site Scripting 1 Video
5.5.2 Cross-site Scripting 2 Check for Understanding
5.5.3 XSS Bug in Yahoo Mail 1 Connection
5.5.4 XSS Bug in Yahoo Mail 5 Free Response
5.5.5 Hacksplaining XSS Demo 1 Connection
5.5.6 Google's Tutorial for XSS 1 Connection
5.5.7 XSS Reflection 5 Free Response
5.6 Internal Threats Lesson
5.6.1 Internal Threats 1 Video
5.6.2 Internal Threats 5 Check for Understanding
5.6.3 BIOS/UEFI Attack Example 1 Connection
5.6.4 Accessing BIOS/UEFI 1 Notes
5.6.5 Causes of Data Breaches 5 Connection
5.6.6 Causes of Data Breaches 5 Free Response
5.6.7 Protecting Data at All Times 1 Connection
5.6.8 Protecting Data at All Times 5 Free Response
5.7 Cyber Defense Quiz Lesson
5.7.1 Cyber Defense Quiz 20 Unit Quiz
Project: Security Assessment Report
6.1 Project Security Assessment Report Lesson
6.1.1 Project Requirements 1 Notes
6.1.2 Supercar Showdown Website 1 Connection
6.1.3 Cross-site Scripting Testing 5 Free Response
6.1.4 Cross-site Scripting Handout 1 Resource
6.1.5 Security Assessment Report 15 Free Response
6.1.6 Project Reflection 5 Free Response
Project: Put it in Writing!
7.1 Level 1: Entry Event Lesson
7.1.1 Company Development 5 Free Response
7.1.2 Level 1: Attack! 5 Free Response
7.1.3 Level 1: Project Overview 1 Video
7.1.4 Put It In Writing! Rubric 5 Connection
7.2 Level 2: User Training Lesson
7.2.1 User Training Policy Development 5 Free Response
7.2.2 Challenge: Employee Negligence 1 5 Free Response
7.2.3 Challenge: Employee Negligence 2 5 Free Response
7.2.4 Level 2 Debrief 5 Free Response
7.3 Level 3: Incident Response Lesson
7.3.1 Incident Response Plan Template 5 Connection
7.3.2 Incident Response Plan Link 5 Free Response
7.3.3 Challenge: Cyber Attack! 5 Free Response
7.3.4 Level 3 Debrief 5 Free Response
7.4 Level 4: Data and Licenses Lesson
7.4.1 Data and Licenses 5 Video
7.4.2 FTC Data Security Guide 5 Connection
7.4.3 Data Policy Template 5 Connection
7.4.4 Data Policy Link 5 Free Response
7.4.5 Challenge: Data Breach 1 5 Free Response
7.4.6 Challenge: Data Breach 2 5 Free Response
7.4.7 Challenge: Data Breach 3 5 Free Response
7.4.8 Level 4 Debrief 5 Free Response
7.5 Level 5: Change Management Lesson
7.5.1 Change Management 5 Video
7.5.2 Change Management Plan 5 Connection
7.5.3 Change Management Plan Link 5 Free Response
Risk Management
8.1 Identifying Risks Lesson
8.1.1 Identifying Risks 1 Video
8.1.2 Identifying Risks Quiz 5 Check for Understanding
8.1.3 What is a Honeypot? 1 Connection
8.1.4 Honeypot Attacks 1 Connection
8.1.5 Honeypot Attacks 5 Free Response
8.1.6 Whois 5 Free Response
8.1.7 Packet Sniffing 1 Connection
8.1.8 Packet Sniffing Response 5 Free Response
8.1.9 Breach Trends 5 Free Response
8.2 Assessing Risks Lesson
8.2.1 Assessing Risks 1 Notes
8.2.2 Malware Risk Assessment 5 Free Response
8.2.3 Poor Password Assessment 5 Free Response
8.2.4 Social Engineering Assessment 5 Free Response
8.2.5 Assessing Risks 1 Video
8.2.6 Assessing Risks Quiz 5 Check for Understanding
8.2.7 End-of-Life OS 1 Connection
8.2.8 End-of-Life Proposal 5 Free Response
8.2.9 Input Handling 1 Example
8.2.10 Input Handling Responses 5 Free Response
8.2.11 Input Validation 1 Example
8.2.12 Input Validation Responses 5 Free Response
8.3 Risk Response Lesson
8.3.1 Risk Response 1 Video
8.3.2 Risk Response 5 Check for Understanding
8.3.3 Defense in Depth Risk Mitigation 5 Free Response
8.3.4 Sample Risk Assessment Report 5 Connection
8.3.5 Sample Risk Assessment Reflection 5 Free Response
8.3.6 Delta Outage Video 5 Connection
8.3.7 Delta Outage Reflection 5 Free Response
8.3.8 What Happens When Your Servers Go Down 5 Connection
8.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
8.3.10 Server Upgrade Memo 5 Free Response
8.4 Penetration Testing Lesson
8.4.1 Penetration Testing 1 Video
8.4.2 Penetration Testing 5 Check for Understanding
8.4.3 Penetration Test Report 5 Connection
8.4.4 Penetration Test Report 5 Free Response
8.4.5 Chaos Engineering 5 Notes
8.4.6 Chaos Engineering Reflection 5 Free Response
8.4.7 Pen Test Simulation Handout 5 Resource
8.4.8 Pen Test Simulation: Active Recon 5 Exercise
8.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
8.5 Risk Management Quiz Lesson
8.5.1 Risk Management Quiz 20 Unit Quiz
Project: The Game of Risk
9.1 The Game of Risk Lesson
9.1.1 Group Project Intro 1 Notes
9.1.2 Brainstorm: Type of Game 5 Free Response
9.1.3 Brainstorm: SLE 5 Free Response
9.1.4 Brainstorm: Materials 5 Free Response
9.1.5 Prototype Game and Instructions 5 Free Response
9.1.6 Test Your Game! 5 Free Response
9.1.7 Testing Feedback Form 1 Resource
9.1.8 Create Your Final Version! 20 Free Response
Midterm
10.1 Midterm Lesson
10.1.1 Midterm 15 Midterm
Final Exam
11.1 Final Exam Lesson
11.1.1 Final Exam 15 Final
What's Next?
12.1.1 Cybersecurity Pathways 1 Notes
12.1.2 CodeHS Programming Courses 1 Connection
12.1.3 College Pathway 1 Notes
12.1.4 Certification Pathway 1 Connection
12.1.5 Career Spotlight 1 Connection
12.1.6 My Pathway 5 Free Response
Cryptocurrency
13.1 What is Currency? Lesson
13.1.1 What is Currency? 1 Video
13.1.2 What is Currency? 2 Check for Understanding
13.1.3 What Gives Paper Money Its Actual Value 1 Connection
13.1.4 What Gives Money Its Value 5 Free Response
13.1.5 Money: What is it Good For? 1 Resource
13.2 What is Cryptocurrency? Lesson
13.2.1 Cryptocurrency Basics 1 Video
13.2.2 Cryptocurrency Basics 5 Check for Understanding
13.2.3 Cryptocurrency Module Overview 1 Video
13.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
13.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
13.2.6 Show Me the Money 1 Resource
13.2.7 American Currency Exhibit 5 Free Response
13.3 Intro to Blockchain Lesson
13.3.1 Intro to Blockchain 1 Video
13.3.2 Intro to Blockchain 3 Check for Understanding
13.3.3 CryptoKitties 1 Connection
13.3.4 CryptoKitties 5 Free Response
13.4 Hashing Lesson
13.4.1 Hashing 1 Video
13.4.2 Hashing 3 Check for Understanding
13.4.3 SHA256 Hash Generator 1 Connection
13.4.4 Using the SHA256 Hash Generator 5 Free Response
13.5 Proof of Work Lesson
13.5.1 Proof of Work 1 Video
13.5.2 Proof of Work 3 Check for Understanding
13.5.3 Mining the Block 1 Video
13.5.4 Mining the Block 3 Check for Understanding
13.5.5 PoW vs. Proof of Stake 1 Connection
13.5.6 PoW vs. PoS 5 Free Response
13.5.7 Checking Proof of Work 1 Resource
13.6.1 Advanced Blockchain (part 1) 1 Video
13.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
13.6.3 Blockchain Buzz 1 Connection
13.6.4 Blockchain Buzz 5 Free Response
13.6.5 Advanced Blockchain (part 2) 1 Video
13.6.6 Advanced Blockchain (part 2) 5 Free Response
13.6.7 Make a Blockchain 1 Resource
13.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
13.7 Cryptocurrencies Lesson
13.7.1 Cryptocurrencies 1 Video
13.7.2 Cryptocurrencies 3 Check for Understanding
13.7.3 Shiny Toy Phenomenon 5 Free Response
13.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
13.7.5 Walmart Use of Blockchain 5 Free Response
13.8 Bitcoin Lesson
13.8.1 Bitcoin 1 Video
13.8.2 Bitcoin 3 Check for Understanding
13.8.3 51% Attack Explained 1 Connection
13.8.4 51% Attack 5 Free Response
13.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
13.8.6 Bitcoin Bust 5 Free Response
13.8.7 Explore the Bitcoin Blockchain 1 Resource
13.9 Pros, Cons, and Future of Cryptocurrencies Lesson
13.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
13.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
13.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
13.9.4 Cryptocurrency Pros and Cons 1 Connection
13.9.5 Crypto Pros and Cons 5 Free Response
13.9.6 What is HODL? 1 Connection
13.9.7 What is HODL? 5 Free Response
13.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
13.10 Project: Cryptocurrency Expert Panel Talk Lesson
13.10.1 Overview 5 Free Response
13.10.2 Preview Sample Expert Panels 5 Free Response
13.10.3 Investigate a Cryptocurrency Topic 5 Free Response
13.10.4 Write an Outline and Rehearse 5 Free Response
13.10.5 Expert Panel Talk (Presentation) 5 Free Response
13.11 Cryptocurrency Quiz Lesson
13.11.1 Cryptocurrency Quiz 10 Unit Quiz
Web Development
14.1 Introduction to HTML Lesson
14.1.1 Introduction to HTML 1 Video
14.1.2 Introduction to HTML Quiz 1 Check for Understanding
14.1.3 Our First HTML Page 1 Example
14.1.4 Say Hello! 5 Exercise
14.2 Structure of an HTML Page Lesson
14.2.1 Structure of an HTML Page 1 Video
14.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
14.2.3 HTML Template 1 Example
14.2.4 Hello World Page 1 Example
14.2.5 The <title> Tag 5 Exercise
14.2.6 Your First HTML Page 5 Exercise
14.3 Formatting Text Lesson
14.3.1 Formatting Text 1 Video
14.3.2 Formatting Text Quiz 1 Check for Understanding
14.3.3 Dictionary 1 Example
14.3.4 That's Bold 5 Exercise
14.3.5 Artificial Intelligence 5 Exercise
14.3.6 State Capitals 5 Exercise
14.4.2 Links Quiz 1 Check for Understanding
14.4.3 The <a> Tag 1 Example
14.4.5 My Favorite Websites 5 Exercise
14.5 Images Lesson
14.5.1 Images 1 Video
14.5.2 Images Quiz 1 Check for Understanding
14.5.3 The <img> Tag 1 Example
14.5.4 Building the CodeHS Homepage 1 Example
14.5.5 Collage on a Theme 5 Exercise
14.5.6 Linking an Image 5 Exercise
14.5.7 Personal Library 5 Exercise
14.6 HTML Lists Lesson
14.6.1 HTML Lists 1 Video
14.6.2 HTML Lists Quiz 1 Check for Understanding
14.6.3 Grocery Shopping 1 Example
14.6.4 Favorite Things 5 Exercise
14.6.5 To-Do List 5 Exercise
14.6.6 List Article 5 Exercise
14.7 HTML Tables Lesson
14.7.1 HTML Tables 1 Video
14.7.2 HTML Tables Quiz 3 Check for Understanding
14.7.4 Favorite Songs 5 Exercise
14.7.5 Calendar 5 Exercise
14.8 HTML Styling Lesson
14.8.1 HTML Styling 1 Video
14.8.2 HTML Styling Quiz 1 Check for Understanding
14.8.3 Stylish Address Book 1 Example
14.8.4 Background Colors 5 Exercise
14.8.5 Style Your To-Do List 5 Exercise
14.9 Introduction to CSS Lesson
14.9.1 Introduction to CSS 1 Video
14.9.2 Introduction to CSS Quiz 2 Check for Understanding
14.9.3 Styling Your H1s 1 Example
14.9.4 First Style with CSS 5 Exercise
14.9.5 List Styling 5 Exercise
14.10 CSS Select by Tag Lesson
14.10.1 CSS Select by Tag 1 Video
14.10.2 CSS Select by Tag Quiz 1 Check for Understanding
14.10.3 Rainbow 1 Example
14.10.4 Dog Styling 1 Example
14.10.6 Put Karel Together 5 Exercise
14.11 CSS Select by Class Lesson
14.11.1 CSS Select by Class 1 Video
14.11.2 CSS Select by Class Quiz 1 Check for Understanding
14.11.3 Simple Checkerboard 1 Example
14.11.4 Tic Tac Toe 5 Exercise
14.11.5 Music Library 5 Exercise
14.12 CSS Select by ID Lesson
14.12.1 CSS Select by ID 1 Video
14.12.2 CSS Select by ID Quiz 1 Check for Understanding
14.12.3 Logo 1 Example
14.12.4 Favorite Dog 5 Exercise
14.12.5 Bingo 5 Exercise
14.13 Viewing Websites Lesson
14.13.1 Viewing Websites 1 Video
14.13.2 Viewing Websites Quiz 5 Check for Understanding
14.13.3 Explaining a URL 5 Free Response
14.14 Web Development Quiz Lesson
14.14.1 Web Development Quiz 15 Unit Quiz
14.15.1 Set Up Your codehs.me Website 10 Challenge
14.15.2 Practice PT: Your First Website 10 Challenge
SQL Part II: The SQL
15.1 More Filtering Practice Lesson
15.1.1 Initials 5 Exercise
15.1.2 Compound Queries with BETWEEN 5 Exercise
15.1.3 Gryffindors With G Names 5 Exercise
15.1.4 R First Names 5 Exercise
15.1.5 FF Houses 5 Exercise
15.2 Ordering Results Lesson
15.2.1 The ORDER BY Keyword 1 Video
15.2.2 ORDER BY 1 Notes
15.2.3 ORDER BY First Name 1 Example
15.2.4 Reverse Order 1 Example
15.2.5 Order By Multiple Fields 1 Example
15.2.6 House Ordering 5 Exercise
15.2.7 Sort the P Names 5 Exercise
15.3 Renaming Fields Lesson
15.3.1 Renaming Fields with AS 1 Notes
15.3.2 Renaming in the House Table 1 Example
15.3.3 Changing Column Names 5 Exercise
15.4 Joining Tables Lesson
15.4.1 The JOIN command 1 Video
15.4.2 Basic Joining 1 Notes
15.4.3 Letters and Numbers 1 Example
15.4.4 Person and House 1 Example
15.4.5 Person and House (Correct) 1 Example
15.4.6 Person and House (with namespacing) 1 Example
15.4.7 List All Gryffindors 5 Exercise
15.4.8 JOIN With Yourself 1 Video
15.4.9 Renaming Tables 1 Notes
15.4.10 Quidditch Matchups 1 Example
15.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
15.5 More Joining Tables Lesson
15.5.1 The Course Table 1 Example
15.5.2 Courses and Professors 5 Exercise
15.5.3 Courses, Professors, and Houses 5 Exercise
15.5.4 Courses Taught By Gryffindors 5 Exercise
15.5.5 The Enrollment Table 1 Example
15.5.6 Students Taking Potions 5 Exercise
15.5.7 Non-Slytherins Taking Potions 5 Exercise
15.5.8 Defense Students by House 5 Exercise
15.5.9 Neville's Courses 5 Exercise
More Cyber Topics
16.1.1 Air Gapped Computers 1 Connection
16.1.2 Air Gapped Computers Response 5 Free Response
16.1.3 Cyberterrorism 1 Connection
16.1.4 Cyberterrorism Response 5 Free Response
16.1.5 What is Virtualization? 1 Connection
16.1.6 Virtualization Response 5 Free Response
16.1.7 The OSI Model and Network Attacks 1 Connection
16.1.8 The OSI Model and Network Attacks Response 5 Free Response
16.1.9 The Machine Instruction Cycle 5 Connection
Cybersecurity Labs
17.1 Labs Lesson
17.1.1 Lab: Configuring a Computer 1 Resource
17.1.2 Lab: Design a Distribution Frame 5 Resource
17.2 Lab: Computer Disassembly Lesson
17.2.1 Lab: Computer Disassembly 5 Resource
17.2.2 Video: Disassemble a Computer 1 Connection
17.2.3 Article: Disassemble a Computer 5 Connection
17.3 Lab: SOHO Devices Lesson
17.3.1 SOHO Devices 1 Notes
17.3.2 Lab: Printer Settings 1 Resource
17.3.3 Sharing Devices 5 Free Response
17.4 Lab: Windows Networking Lesson
17.4.1 Lab: Windows Networking 1 Resource
17.4.2 Lab: Windows Networking w/Simulation 1 Resource
17.4.3 Windows Networking 1 Example
17.5 Lab: Mobile Device Connectivity Lesson
17.5.1 Mobile Device Features 1 Connection
17.5.2 Mobile Device Simulator 1 Notes
17.5.3 Lab: Mobile Device Connectivity 5 Resource
Cloud Computing
18.1 Different Types of Cloud Computing Lesson
18.1.1 SaaS, IaaS, and PaaS 5 Connection
18.1.2 Research Project: Cloud Computing Types 5 Free Response
Cybersecurity Level 2 Certification Practice
19.1 Practice #1: Advanced Cryptography Lesson
19.1.1 Quiz: Advanced Cryptography 7 Quiz
19.1.2 Practice #1 Reflection 5 Notes
19.2 Practice #2: Advanced Networking Lesson
19.2.1 Quiz: Advanced Networking 10 Quiz
19.2.2 Practice #2 Reflection 5 Notes
19.3 Practice #3: Cyber Defense Lesson
19.3.1 Quiz: Cyber Defense 10 Quiz
19.3.2 Practice #3 Reflection 5 Notes
19.4 Practice #4: Documentation & Risk Management Lesson
19.4.1 Quiz: Documentation & Risk Management 6 Quiz
19.4.2 Practice #4 Reflection 5 Notes