Please enable JavaScript to use CodeHS

Georgia Foundations of Secure Information Systems

Description

In this lesson, students will learn about the essential internal components that make up a computer. Component categories include the motherboard (system board), firmware (BIOS), CPU (processor), GPU (graphics processor), storage, cooling, and NIC (network adapter).

Objective

Students will be able to:

  • Explain the purpose of common internal computing components such as motherboards, BIOS, RAM, and more.
Description

In this lesson, students will learn about the different storage options including local storage, network storage, and cloud storage.

Objective

Students will be able to:

  • Compare and contrast storage types
  • Examine and discuss the security of cloud storage
  • Select suitable storage devices for given situations
Description

In this lesson, students will learn about different networking devices that allow devices to connect to other devices as well as the Internet. They will also learn different networking connection methods such as using dialup, DSL, coax cables, and fiber optic cables.

Objective

Students will be able to:

  • Compare and contrast common Internet service types
  • Compare and contrast common networking hardware devices
  • Explain basic cable types, features, and their purposes
Description

In this lesson, students will learn about the different network types and options that are available. This will include wireless networking standards and protocols.

Objective

Students will be able to:

  • Compare and contrast the different wireless network standards
  • Compare and contrast Internet connection types, network types, and their features
Description

In this lesson, students will learn about different ports and protocols and how they can be protected using a firewall. They will explore port scans and how to set firewall rules.

Objective

Students will be able to:

  • Compare and contrast different ports, protocols and their purposes
  • Explain the purpose of a firewall and how it protects against unwanted traffic
Description

In this lesson, students will learn about the basic functions and types of operating systems. Students will also explore the process for upgrading and installing Windows and Mac operating systems.

Objective

Students will be able to:

  • Explain the purpose of operating systems
  • Identify the main types of operating systems
  • Analyze the upgrade and installation process for operating systems
Description

In this lesson, students learn about the different types of software. Through interactive exercises, students explore how different software can be used in the workplace and our every day lives. Students also learn about single and cross-platform software.

Objective

Students will be able to:

  • Explain the different types of software (productivity, collaboration, business) and the purpose of each.
  • Explain the benefits and challenges of single and cross-platform software.
Description

In this lesson, students will learn about the importance of application security and what they can do to protect applications once they have been installed on a device.

Objective

Students will be able to:

  • Explain the importance of application security
  • Explain the multiple methods for protecting software
Description

In this lesson, students learn how to use user accounts and permissions to secure a device. Students also learn about system hardening and how to strengthen the security of a network by setting up and implementing host security.

Objective

Students will be able to:

  • Describe how creating user accounts and permissions enhances security
  • Define system hardening explain the importance of establishing baseline security, including deciding rules around authentication and authorization
  • Explain the importance of performing security audits
Description

In this lesson, students will explore at a high-level what the internet is and how the internet works.

Objective

Students will be able to:

  • Understand what the internet is
  • Understand how the internet works
Description

In this lesson, students will explore the hardware that makes up the internet and the characteristics of that hardware that define our experience on the internet.

Objective

Students will be able to:

  • Discuss and answer questions about the hardware that powers the internet
Description

In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol.

Objective

Students will be able to:

  • Discuss the necessity of internet protocols
  • Recognize the hierarchy of elements in an IP address
Description

In this lesson, students will explore the DNS system and how it maps human readable domain names into actual accessible IP addresses.

Objective

Students will be able to:

  • Understand the DNS system and how it works
  • Recognize the DNS system as an abstraction
Description

In this lesson, students explore how messages get from one address on the internet to another.

Objective

Students will be able to:

  • Explain how computers communicate using routers
  • Explain what considerations are made when choosing a route
  • Discuss how routers are fault-tolerant because of redundancy
Description

In this lesson, students learn about the last piece of the puzzle for how the Internet works: Packets and Protocols. All information sent over the internet is broken down into small groups of bits called packets. The format for creating and reading packets is defined by open protocols so that all devices can read packets from all other devices.

Objective

Students will be able to:

  • Explain the packet process and how protocols (TCP/IP and HTTP) are vital to the exchange of information on the Internet
  • Explain the Hyper Text Transfer Protocol
Description

In this lesson, students are presented with different ways that the Internet impacts their lives. The Internet affects the way that people communicate (emails, social media, video chat) and collaborate to solve problems. It has revolutionized the way that people can learn and even buy things. Because the Internet is present in almost every facet of people’s lives, there are severe ethical and legal concerns that derive from the Internet.

Objective

Students will be able to:

  • Analyze the different ways that the Internet impacts their lives by learning about how the Internet contributes to collaboration, communication, etc
  • Evaluate whether the Internet has a more positive or negative effect on their community by citing examples from the lesson
  • Explain what the digital divide is and articulate their own opinions related to it
Description

In this lesson, students explore what a network administrator career entails.

Objective

Students will be able to:

  • Explain the AAA (authentication, authorization, accounting) protocol and how it supports network security
  • Read a network log and analyze it for basic intrusion detection
  • Establish basic firewall rules for a network
  • Explain what an Intrusion Detection System (IDS) does to support network security
  • Explain in basic terms what a network administrator does
Description

In this lesson, students complete a summative assessment of the unit’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of networking fundamentals concepts through a multiple choice quiz
Description

In this lesson, students will learn what is meant by cybersecurity and explore a few news worthy cyber attacks. They will also discuss the Internet of Things and the increase in connected devices.

Cybersecurity is the protection of computer systems, networks, and data from digital attacks. Increased connectivity via the Internet of Things and reliance on computer devices to send and store data makes users more vulnerable to cyber attacks.

Objective

Students will be able to:

  • Define cybersecurity
  • Describe how the Internet of Things makes people more vulnerable to cyber attacks
  • Reflect on recent cyber attacks and identify the financial and societal impact of the attack
Description

In this lesson, students will learn and examine recent cyber attacks. Cyber attacks result in financial loss, lowered trust, disruption of important services, and more. There is a growing need for cybersecurity experts, and careers in the field are lucrative with high-impact.

Objective

Students will be able to:

  • Evaluate recent cyber attacks and understand the negative consequences of these attacks
  • Understand career opportunities in the field of cybersecurity
Description

In this lesson, students will explore and discuss the ethics and legality around hacking. A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network. There are white hat hackers, who help companies find and protect exploits in their systems, and black hat hackers who hack maliciously.

Objective

Students will be able to:

  • Identify the difference between white hat hacking and black hat hacking
  • Explain career opportunities in cybersecurity
Description

In this lesson, students will learn about The CIA Triad. The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

  • Confidentiality is the protection of information from people who are not authorized to view it.
  • Integrity aims at ensuring that information is protected from unauthorized or unintentional alteration.
  • Availability is the assurance that systems and data are accessible by authorized users when and where needed.
Objective

Students will be able to:

  • Identify what the CIA triad is and how it relates to cybersecurity
  • Identify which part of the CIA triad has been broken in a given scenario
Description

In this lesson, students will discuss and examine policies regarding privacy and security. Using best practices like setting strong passwords, reading privacy policies, and using https can help in staying safe online.

Objective

Students will be able to:

  • Use best practices in personal privacy and security, including strong passwords, using https, and reading privacy policies
Description

In this lesson, students will learn how basic encryption and decryption works. There is a need for secrecy when sending and receiving personal information. Encryption and decryption are used to protect personal information.

Objective

Students will be able to:

  • Define cryptography, cryptology, and cryptanalysis
  • Explain the need for encryption and how basic encryption and decryption works
  • Relate encryption with how it affects the CIA Triad
Description

In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.

Objective

Students will be able to:

  • Identify what a hashing algorithm is and its related vocabulary, such as digest and collisions
  • Describe what makes an ideal hashing algorithm and why they are important in encryption and cybersecurity overall
  • Describe how malicious actors try to crack hashing algorithms
Description

In this lesson, students will learn about and discuss cyberbullying. Cyberbullying is the use of electronic communication to harass or target someone. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.

Objective

Students will be able to:

  • Understand the impact of cyberbullying, and identify unacceptable bullying behavior
  • Identify proper actions to take if they are victims of cyberbullying or if they observe someone being cyberbullied
Description

In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

Objective

Students will be able to:

  • Explain what copyright laws are and why they are important
  • Find images they are legally allowed to use in their projects
  • Accurately attribute images they find and want to use
Description

Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!

Objective

Students will be able to:

  • Create a public service announcement for members of their community about a topic in digital citizenship or cyber hygiene
  • Use google sheets to store and analyze data, and create a data visualization.