Please enable JavaScript to use CodeHS

NCyTE Cybersecurity Concept Lessons (JavaScript)

Points

Activity Points
Caesar Cipher
1.1 Caesar Ciphers
1.1.1 Introduction to Caesar Ciphers 5
1.1.2 slides 5
1.1.3 A Caesar Cipher 5
1.1.4 Encryption and Decryption 5
1.1.5 Decryption Practice 5
1.1.6 Caesar Cipher Encryption 5
1.2 Decrypting and Breaking Caesar Ciphers
1.2.1 Caesar Cipher Decryption 5
1.2.2 Break Caesar's Cipher! 5
1.2.3 Reflection: Caesar's Cipher 5
1.2.4 Ethics Moment: Apple v. Barr 5
1.2.5 Reflection: Apple v. Barr 5
The CIA Triad
2.1 Introduction to Cybersecurity
2.1.1 Warm-Up 5
2.1.2 Gone Phishing 5
2.1.3 Deepfake Videos 5
2.1.4 Keeping Secrets 5
2.1.5 Phishing Quiz 5
2.1.6 How is Your Phishing IQ? 5
2.1.7 Phishing Simulator 1
2.1.8 Reflection: Phishing Emails 5
2.1.9 Think-Pair-Share Activity 5
2.2 CIA Triad
2.2.1 Warm-Up 5
2.2.2 CIA Triad 5
2.2.3 Alice-Bob-Eve 5
2.2.4 PII 5
2.2.5 CIA Breach 5
2.2.6 Identity Theft 5
2.2.7 CIA and Phishing 5
2.2.8 Challenge: Create a Phishing Email 5
2.2.9 Challenge: Investigate Legalities 5
CyberEthics
3.1 CyberEthics
3.1.1 Presentation 5
3.1.2 Topics 5
3.1.3 Problem Summary 5
3.1.4 Pros and Cons 5
3.1.5 Your Solution 5
3.1.6 Writing an Introduction 5
3.1.7 Developing your position 5
3.1.8 Conclusion 5
3.1.9 Position Paper 5
Data Structures
4.1 Introduction to Lists
4.1.1 Intro to Lists 5
4.1.2 List Introduction 5
4.2 Traversing a List
4.2.1 Traversing a List 5
4.2.2 Traversing a List 5
4.3 Applying Iteration: Usernames and Passwords
4.3.1 Username and Password Creation 5
4.3.2 Usernames and Passwords: Pseudocode 5
4.3.3 Usernames and Passwords: JavaScript 5
4.3.4 Username and Password Verification 10
4.3.5 Ethics Moment: Facebook and AWS 5
4.3.6 Reflection: Facebook and AWS 5
Identity, Authentication and Authorization
5.1 Identity Crisis
5.1.1 Warm Up 5
5.1.2 Identity Crisis 5
5.1.3 Sharing Passwords 5
5.1.4 Reflect: Sharing Passwords 5
5.1.5 What is your password? 5
5.1.6 Identity crisis activity 5
5.1.7 World's Biggest Data Breaches 5
5.1.8 Research: Types of Attacks 5
5.1.9 You Can Be Tracked! 1
5.2 Let Me In
5.2.1 Warm Up 5
5.2.2 Authenticate and Authorize 5
5.2.3 How do you protect your data? 5
5.2.4 Common Passwords 5
5.2.5 Password Strength 1
5.2.6 Reflection: Password Strength 5
5.2.7 What Makes a Password Strong? 5
5.2.8 Multifactor Authentication 1
5.2.9 One Pager: Password Security 5
Input Validation & Conditionals
6.1 Applying Conditionals - Password Validation
6.1.1 Input Validation and Conditionals 5
6.1.2 Conditional Pseudocode Activity 5
6.1.3 Password Checker 5
6.1.4 How are passwords saved? 5
6.1.5 Reflect: How are passwords saved? 5
6.2 Password Protection
6.2.1 Password Protection 5
6.2.2 Create a password 5
6.2.3 Ethics Moment: Impact of Code 5
6.2.4 Reflection: Impact of Code 5
Iterative Process
7.1 Iterative Process
7.1.1 Iterations 5
7.1.2 Iterative Pseudocode Activity - Part 1 5
7.1.3 Iterative Pseudocode Activity - Part 2 5
7.1.4 Verify the Password Length 5
7.1.5 Making a Stronger Password 5
7.1.6 Passwords with Letters and Numbers 5
7.1.7 Ethics Moment: Sampling Music 5
7.1.8 Reflection: Sampling Music 5
Secure Networking
8.1 Introduction to Networking
8.1.1 Warm Up 5
8.1.2 Ethics Moment: Equifax Data Breach 5
8.1.3 Reflection: Equifax Data Breach 5
8.1.4 Muddy City 5
8.1.5 Reflection: Muddy City 5
8.2 OSI model activity
8.2.1 Introduction 5
8.2.2 Event 1: Truck Payload Change 5
8.2.3 Event 2: Truck Payload Change 5
8.2.4 Event 3: Route Change 5
8.2.5 Event 4: Envelopes Never Arrive 5
8.2.6 Event 5: Missing One Box 5
8.2.7 Event 6: Box Payload Change 5
8.2.8 Organizing the Events 5
8.2.9 Relating this to the Internet 5
8.3 Network Attacks
8.3.1 Warm Up 5
8.3.2 One Pager: Network Attacks 5
8.3.3 Reflection: Network Attacks 5
Personal Data Vulnerabilities
9.1 Unintentional Data Sharing
9.1.1 Warm up 5
9.1.2 Personal Data Vulnerabilities 5
9.1.3 Spokeo 5
9.1.4 Cyber Insecurity 5
9.1.5 Who is this Person? 5
9.1.6 Who is this Person? - Car 5
9.1.7 Who is this Person? - Hobby 5
9.1.8 What can you learn from ... 5
9.1.9 Social Media Clean-up 1
9.2 Metadata and Data Collection
9.2.1 Warm Up 5
9.2.2 Understanding Metadata 5
9.2.3 Image Data Extraction 5
9.2.4 Information about your images 5
9.2.5 Security Vulnerability 5
9.2.6 Ethics Moment: Collection of Data 5
9.2.7 Reflection: Collection of Data 5
9.2.8 Online Privacy 5
Risk
10.1 Basic Cybersecurity Risk Concepts
10.1.1 Warm up 5
10.1.2 Basic Cybersecurity Risk, Part 1 5
10.1.3 Personal Data Threats 5
10.1.4 Basic Cybersecurity Risk, Part 2 5
10.1.5 Risk and Consequences: Part 1 5
10.1.6 Risk and Consequences: Part 2 5
10.1.7 Digital Footprint 5
10.2 Cybersecurity Risk Model-Assessing Risk
10.2.1 Warm up 5
10.2.2 Assessing Risk, Part 1 5
10.2.3 Think, Pair, Share: Assets 5
10.2.4 Assessing Risk, Part 2 5
10.2.5 Risk Scenario Assessment 1: Malware 5
10.2.6 Risk Scenario Assessment 2: Identity Theft 5
10.2.7 Risk Scenario Assessment 3: Ransomware 5
10.2.8 Risk Scenario Assessment 4: Email Compromise 5
10.2.9 Asset Identification Activity 5
10.3 Cybersecurity Risk Model-Vulnerabilities
10.3.1 Warm up 5
10.3.2 Vulnerabilities 5
10.3.3 National Vulnerability Database Activity 5
10.3.4 Exploring Vulnerabilities 5
10.4 Cybersecurity Risk Model-Security Controls
10.4.1 Warm up 5
10.4.2 Internet of Things 5
10.4.3 Security Controls 5
10.4.4 Defense in Depth 5
10.4.5 Ethics Moment: The Risk of AI 5
10.4.6 Reflect: The Risk of AI 5
Steganography
11.1 Introduction to Steganography
11.1.1 Introduction to Steganography 5
11.1.2 What is steganography? 5
11.1.3 Hide Text 1
11.1.4 Steganography 5
11.1.5 Creating a Secret Message 5
11.1.6 Part 1: Loading images 5
11.2 Ethics of Steganography
11.2.1 Steganography - Part 2 5
11.2.2 Government Surveillance and Reality Winner 1
11.2.3 Government Surveillance and Reality Winner 5
11.2.4 Ethics Moment: Government Surveillance 5
11.2.5 Reflection: Government Surveillance 5
11.2.6 Upload your own photos 5
11.2.7 Part 2: The encrypt function 5
11.3 Steganography Exploration
11.3.1 Data Hiding and Extraction 1
11.3.2 Reflect: Data Hiding and Extraction 5
11.3.3 Part 3: The decrypt function 5
Symmetric and Public Key Encryption
12.1 Symmetric and Public Key Encryption
12.1.1 Symmetric and Public Key Encryption 5
12.1.2 Diffie-Hellman Key Exchange 5
12.1.3 Diffie-Hellman Key Exchange 1
12.1.4 Public Key Programming Exercise 5
12.1.5 RSA Encryption: Step 1 5
12.1.6 RSA Encryption: Step 2 5
12.1.7 RSA Encryption: Step 3 5
12.1.8 RSA Encryption: Step 4 5
12.1.9 RSA 1
12.1.10 RSA Reflection 5
12.1.11 Ethics Moment: Ransomware 5
12.1.12 Reflection: Ransomware 5
Vigenère Cipher
13.1 Vigenère Cipher
13.1.1 Vigenère Cipher 5
13.1.2 One-Time Pad Cipher 5
13.1.3 How a Vigenère Cipher Works 5
13.1.4 Vigenère Scavenger Hunt 5
13.1.5 Vigenère Pseudocode 5
13.1.6 Write your own Vigenère Cipher 5
13.1.7 Reflection: Vigenère Cipher 5
13.1.8 Ethics Moment: Cryptography and the NSA 5
13.1.9 Reflection: Cryptography and the NSA 5