Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
What is Cybersecurity?
1.1 Module Overview - Cybersecurity Lesson
1.1.1 Welcome to Cybersecurity 1 Video
1.1.2 Welcome to Cybersecurity 2 Check for Understanding
1.1.3 Intruder Alert! 1 Example
1.1.4 Cybersecurity and You 5 Free Response
1.1.5 Course Goals 5 Free Response
1.2 What is Cybersecurity? Lesson
1.2.1 What is Cybersecurity? 1 Video
1.2.2 What is Cybersecurity? 3 Check for Understanding
1.2.3 City Services Ransomware 1 Connection
1.2.4 Ransomware Reflection 5 Free Response
1.2.5 Ransomware Simulator 1 Example
1.2.6 Internet of Things 1 Connection
1.2.7 Hackers vs. Smart Homes 1 Connection
1.2.8 Internet of Things Reflection 5 Free Response
1.3 Impact of Cybersecurity Lesson
1.3.1 Impact of Cybersecurity 1 Video
1.3.2 Impact of Cybersecurity 2 Check for Understanding
1.3.3 Phishing Simulator 1 Example
1.3.4 Phishing for Your Info 1 Connection
1.3.5 Phishing Reflection 5 Free Response
1.3.6 Cyber Game 1 Connection
1.3.7 Cyber Game Reflection 5 Free Response
1.3.8 Cyber Crime Time 1 Connection
1.3.9 Cyber Crime Time Reflection 5 Free Response
1.4 The CIA Triad Lesson
1.4.1 CIA Triad 1 Video
1.4.2 CIA Triad 2 Check for Understanding
1.4.3 Which part of the CIA Triad? 5 Free Response
1.4.4 Which part of the CIA Triad? 5 Free Response
1.4.5 Breach of Confidentiality 5 Free Response
1.4.6 Breach of Availability 5 Free Response
1.4.7 CIA Connections 5 Free Response
1.5 What is Cybersecurity? Quiz Lesson
1.5.1 What is Cybersecurity? Quiz 15 Unit Quiz
The ABCs of Cryptography
2.1 Cryptography, Cryptology, Cryptanalysis Lesson
2.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
2.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
2.1.3 Cryptogram Game! 1 Example
2.1.4 Why encrypt? 1 Video
2.1.5 Why encrypt? 2 Check for Understanding
2.1.6 Encrypt/Decrypt 1 Example
2.2 History of Cryptography Lesson
2.2.1 Cryptography: A Brief History 1 Video
2.2.2 Cryptography History Quiz 2 Check for Understanding
2.2.3 How the Enigma Worked 1 Connection
2.2.4 How the Enigma Worked 5 Free Response
2.2.5 Unknown Languages and the Future of Cryptography 1 Connection
2.2.6 The Future of Cybersecurity 5 Free Response
2.3 Basic Crypto Systems: Caesar Cipher Lesson
2.3.1 Caesar Cipher 1 Video
2.3.2 Caesar Cipher 2 Check for Understanding
2.3.3 Caesar Cipher Encryption 1 Example
2.3.4 Decrypt Caesar's Cipher! 1 Example
2.4 Basic Crypto Systems: Cracking Caesar Lesson
2.4.1 Cracking Caesar Cipher 1 Video
2.4.2 Cracking Caesar Cipher 2 Check for Understanding
2.4.3 Cracking Caesar with Brute Force 1 Example
2.4.4 Letter Frequency and Caesar 1 Example
2.4.5 Examining Caesar Cipher 5 Free Response
2.5 Basic Crypto Systems: Vigenere Cipher Lesson
2.5.1 Vigenere Cipher 1 Video
2.5.2 Vigenere Cipher 1 Check for Understanding
2.5.3 Vigenere Cipher Example 1 Example
2.5.4 Letter Frequency and Vigenere Cipher 1 Example
2.5.5 Examining Vigenere Cipher 5 Free Response
2.5.6 Improving Vigenere 1 Example
2.6 The ABCs of Cryptography Quiz Lesson
2.6.1 The ABCs of Cryptography Quiz 15 Unit Quiz
Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast Lesson
3.1.1 Overview 1 Notes
3.1.2 Investigate a Classic Cipher 1 Notes
3.1.3 Write the Script and Rehearse 5 Free Response
3.1.4 Newscast Presentation 15 Free Response
Advanced Cryptography
4.1 Welcome to Advanced Cybersecurity! Lesson
4.1.1 Course Introduction 1 Notes
4.1.2 Cybersecurity 101 1 Connection
4.1.3 Cyber Heat Map 5 Free Response
4.1.4 Career Pathways 5 Free Response
4.1.5 Starting with Cryptography 1 Connection
4.1.6 Course Goals 5 Free Response
4.2 Encryption Algorithms Lesson
4.2.1 Symmetric Encryption 1 Video
4.2.2 Ciphers Quiz 2 Check for Understanding
4.2.3 Enhanced Caesar Cipher 5 Free Response
4.2.4 Mixed Alphabet Cipher 5 Free Response
4.2.5 Pigpen Encoder 1 Example
4.2.6 Pigpen Cipher 5 Free Response
4.2.7 Rail Fence Cipher 5 Free Response
4.2.8 Encryption Standards 1 Video
4.2.9 Encryption Standards Quiz 3 Check for Understanding
4.3 Advanced Cryptography Lesson
4.3.1 Advanced Cryptography 1 Video
4.3.2 Advanced Cryptography 3 Check for Understanding
4.3.3 Public Key Cryptography for Non-Geeks 1 Connection
4.3.4 Examining Public Key Cryptography 5 Free Response
4.3.5 Public Key Cryptography 1 Connection
4.3.6 Public Key Cryptography 5 Free Response
4.4 Hash Functions Lesson
4.4.1 Hash Functions 1 Video
4.4.2 Hash Functions 3 Check for Understanding
4.4.3 Google Shattered Crypto Algorithm 1 Connection
4.4.4 Hash Functions in the News 5 Free Response
4.4.5 Using a Hash Generator 1 Connection
4.4.6 Hash Generator 5 Free Response
4.4.7 Password Salting 1 Connection
4.4.8 Password Salting 5 Free Response
4.5 Hash Function Development Lesson
4.5.1 Hash Function Development 1 Video
4.5.2 Hash Function Development 2 Check for Understanding
4.5.3 Modulo Math Calculator 1 Example
4.5.4 Understanding Modulo Math 1 Example
4.5.5 Modulo Game! 1 Example
4.5.6 Develop a Simple Hash Function 5 Exercise
4.6 Asymmetric Encryption Lesson
4.6.1 Asymmetric Encryption 1 Video
4.6.2 Asymmetric Encryption Quiz 5 Check for Understanding
4.6.3 Diffie-Hellman Key Exchange 1 Example
4.6.4 Affine Cipher 5 Free Response
4.6.5 Trapdoor Functions 5 Free Response
4.6.6 Public-Key Encryption Explorer 1 Notes
4.6.7 Public-Key Encryption Explorer Reflection 5 Free Response
4.7 Digital Certificates Lesson
4.7.1 Digital Certificates 1 Video
4.7.2 Digital Certificates 4 Check for Understanding
4.7.3 SSL Explained 1 Connection
4.7.4 SSL Explained Response 5 Free Response
4.7.5 Digital Certificate Connection 5 Free Response
4.7.6 In The News 1 Connection
4.7.7 In The News Response 5 Free Response
4.7.8 Become a Certificate Authority! 10 Free Response
4.8 Advanced Cryptography Quiz Lesson
4.8.1 Advanced Cryptography Quiz 20 Unit Quiz
Project: Steganography
5.1 Project: Steganography Lesson
5.1.1 What is Steganography? 1 Video
5.1.2 Government Surveillance and Reality Winner 1 Connection
5.1.3 Government Surveillance and Reality Winner 5 Free Response
5.1.4 Data Hiding and Extraction 1 Connection
5.1.5 Reflect: Data Hiding and Extraction 5 Free Response
5.1.6 Hide Text 1 Example
5.1.7 Hidden Message 1 Example
5.1.8 Your turn: Encryption Algorithm 5 Free Response
5.1.9 Your turn: Image Creation 10 Challenge
5.1.10 Final Algorithm and Partner Decode 5 Free Response
5.1.11 Final Reflection 5 Free Response
System Administration
6.1 Operating Systems Lesson
6.1.1 Operating Systems 1 Video
6.1.2 Operating Systems Quiz 5 Check for Understanding
6.1.3 Detect My OS 1 Example
6.1.4 Upgrading a Mac OS 1 Connection
6.1.5 Windows OS Installation Simulation 1 Example
6.1.6 Installing an OS 5 Free Response
6.2 Comparing Operating Systems Lesson
6.2.1 Comparing Operating Systems 1 Video
6.2.2 Comparing Operating Systems Quiz 5 Check for Understanding
6.2.3 Windows Simulation 1 Example
6.2.4 MacOS Simulation 1 Example
6.2.5 Choose a Linux Distro! 1 Connection
6.2.6 Which would you choose? 5 Free Response
6.3 Compatibility Lesson
6.3.1 Compatibility 1 Video
6.3.2 Compatibility Quiz 3 Check for Understanding
6.3.3 What Processor? Windows 1 Example
6.3.4 What Processor? Mac 1 Example
6.3.5 What Processor are you running? 5 Free Response
6.4 Software and Applications Lesson
6.4.1 Software and Applications 1 Video
6.4.2 Software and Applications Quiz 2 Check for Understanding
6.4.3 Spreadsheet Simulation 1 Example
6.4.4 Messaging Simulation 1 Example
6.4.5 Kanban Board Simulation 1 Example
6.4.6 Software Simulations 5 Free Response
6.5 Software Licenses Lesson
6.5.1 Software Licenses 1 Video
6.5.2 Software Licenses Quiz 3 Check for Understanding
6.5.3 Do I need a Software License? 5 Free Response
6.5.4 Is This Original? 5 Free Response
6.6 Application Security Lesson
6.6.1 Application Security 1 Video
6.6.2 Application Security 5 Check for Understanding
6.6.3 Windows Updates 1 Example
6.6.4 Windows Defender Antivirus 1 Connection
6.6.5 Windows Defender Antivirus 5 Free Response
6.6.6 CodeHS System Restore 5 Free Response
6.7 Browser Configuration Lesson
6.7.1 Browser Configuration 1 Video
6.7.2 Browser Configuration 5 Check for Understanding
6.7.3 Cached CodeHS 1 Connection
6.7.4 Cached CodeHS 5 Free Response
6.7.5 Is Your Popup Blocker On? 1 Example
6.7.6 Browser Extensions Lab 5 Free Response
6.8 System Administration Lesson
6.8.1 User Accounts 1 Video
6.8.2 User Accounts Quiz 2 Check for Understanding
6.8.3 User Accounts 5 Free Response
6.8.4 Shared Folders and Files 5 Free Response
6.8.5 Host Security 1 Video
6.8.6 Host Security Quiz 3 Check for Understanding
6.8.7 Security Baseline 5 Free Response
6.9 Command Line Interface Lesson
6.9.1 Linux/MacOS vs. Windows 1 Notes
6.9.2 Command Line Interface 1 Video
6.9.3 Command Line Interface Quiz 5 Check for Understanding
6.9.4 Command Equivalents 1 Resource
6.9.5 Windows Command Prompt 1 Video
6.9.6 Windows Command Prompt 5 Free Response
6.9.7 Directory Directions 5 Free Response
6.9.8 Neural Interface? 1 Connection
6.9.9 Neural Interface? 5 Free Response
6.10 System Administration Quiz Lesson
6.10.1 Mindsets 1 Survey
6.10.2 System Administration Quiz 20 Unit Quiz
IT Infrastructure
7.1 Internal Components Lesson
7.1.1 Internal Components 1 Video
7.1.2 Internal Components 5 Check for Understanding
7.1.3 Build a Computer 1 Connection
7.1.4 Build a Computer 5 Free Response
7.1.5 Test Your Brain's RAM! 1 Example
7.1.6 Test Your Brain's RAM! Reflection 5 Free Response
7.2 Peripheral Devices Lesson
7.2.1 Peripheral Devices 1 Video
7.2.2 Peripheral Devices 5 Check for Understanding
7.2.3 Personalized Peripherals 5 Free Response
7.2.4 IT Help 5 Free Response
7.2.5 Your Ideal Computer Setup 5 Free Response
7.3 Network Devices Lesson
7.3.1 Network Devices 1 Video
7.3.2 Network Devices 5 Check for Understanding
7.3.3 Speed Test 1 Connection
7.3.4 Speed Test 5 Free Response
7.3.5 Fiber Optics Bend Light! 1 Connection
7.3.6 Fiber Optics Bend Light! 5 Free Response
7.3.7 Ethernet Standards 1 Connection
7.3.8 Ethernet Standards 5 Free Response
7.3.9 Network Troubleshooting 5 Free Response
7.4 Storage Options Lesson
7.4.1 Storage Options 1 Video
7.4.2 Storage Options Quiz 5 Check for Understanding
7.4.3 Security of Cloud Storage 1 Connection
7.4.4 Security of Cloud Storage 5 Free Response
7.4.5 Storage Suggestions 5 Free Response
7.5 Network Options Lesson
7.5.1 Network Options 1 Video
7.5.2 Network Options Quiz 5 Check for Understanding
7.5.3 What is an SSID? 1 Connection
7.5.4 What is an SSID? 5 Free Response
7.5.5 Wireless Network Setup 5 Free Response
7.6 Network Communication Lesson
7.6.1 Network Communication 1 Video
7.6.2 Network Communication Quiz 2 Check for Understanding
7.6.3 Setting up a Firewall 1 Example
7.6.4 iptables 5 Free Response
7.6.5 iptables simulation 1 Notes
7.7 Network Management Lesson
7.7.1 Linux/MacOS vs. Windows 1 Notes
7.7.2 Network Management 1 Video
7.7.3 Network Management Quiz 3 Check for Understanding
7.7.4 MacOS Terminal Simulation 1 Example
7.7.5 Windows Command Prompt Simulation 1 Example
7.7.6 Windows Command Prompt Spy 5 Video
7.7.7 Windows Command Prompt Spy 5 Free Response
7.7.8 SSH Logs 1 Notes
7.7.9 SSH Logs 1 Example
7.7.10 SSH Logs Submission 5 Free Response
7.8 IT Infrastructure Quiz Lesson
7.8.1 IT Infrastructure Quiz 20 Unit Quiz
Project: Troubleshooting
8.1 Methodology Lesson
8.1.1 Troubleshooting Methodology 1 Notes
8.1.2 Identify the Problem 5 Free Response
8.1.3 Research Solutions 5 Free Response
8.1.4 Establish a Theory 5 Free Response
8.1.5 Test the Theory 5 Free Response
8.1.6 Fix the Problem! 5 Free Response
8.2 Support Practice Lesson
8.2.1 Signal Strength 10 Exercise
8.2.2 Interference 10 Exercise
Software Security
9.1 Inside Web Apps Lesson
9.1.1 Inside Web Apps 1 Video
9.1.2 Inside Web Apps 2 Check for Understanding
9.1.3 Using View Page Source 5 Free Response
9.1.4 Recreate a Webpage? 1 Example
9.1.5 Getting Started with OWASP 1 Connection
9.1.6 Getting Started with OWASP 5 Free Response
9.2 Developer Tools Lesson
9.2.1 Developer Tools 1 Video
9.2.2 Developer Tools 3 Check for Understanding
9.2.3 Using the Developer Tools 5 Free Response
9.2.4 Console Secrets 5 Exercise
9.2.5 Local Storage 1 Example
9.2.6 The Top Cybersecurity Blogs and Websites 1 Connection
9.2.7 Selecting a Site to Follow 5 Free Response
9.3 The Value of Data Lesson
9.3.1 The Value of Data 1 Video
9.3.2 The Value of Data Quiz 5 Check for Understanding
9.3.3 Exploring Data Visualizations 1 Notes
9.3.4 US Recorded Music Revenue 1 Connection
9.3.5 National Parks 1 Connection
9.3.6 March Madness 1 Connection
9.3.7 Captain Marvel 1 Connection
9.3.8 Respond: Visualizations 5 Free Response
9.3.9 Free Response: Choosing a Visualization 5 Free Response
9.3.10 Reflection: Design a Survey 5 Free Response
9.4 Databases Lesson
9.4.1 Databases 1 Video
9.4.2 Databases 1 Check for Understanding
9.4.3 Database Administrator Career 1 Connection
9.4.4 Database Administrator Career 5 Free Response
9.4.5 Parts of a Database 1 Video
9.4.6 Parts of a Database 1 Check for Understanding
9.4.7 SQL Database Diagram 1 Connection
9.4.8 SQL Database Diagram 5 Free Response
9.4.9 Schema Brainstorm 5 Free Response
9.5 Clients and Servers Lesson
9.5.1 Clients and Servers 1 Video
9.5.2 Clients and Servers 2 Check for Understanding
9.5.3 Inside a Google Data Center 1 Connection
9.5.4 Inside a Google Data Center 5 Free Response
9.5.5 Cloud Vulnerabilities 1 Connection
9.5.6 Cloud Vulnerabilities Response 5 Free Response
9.5.7 Client-Server Model 1 Video
9.5.8 Client-Server Model 2 Check for Understanding
9.5.9 The Future of User Privacy 1 Connection
9.5.10 The Future of User Privacy 5 Free Response
9.6 What is SQL? Lesson
9.6.1 What is SQL Overview 1 Notes
9.6.2 Intro to SQL 1 Video
9.6.3 Quiz: What is SQL? 1 Check for Understanding
9.6.4 How to Structure Data in SQL 1 Video
9.6.5 How to Structure Data in SQL 3 Check for Understanding
9.6.6 SQL Tables 1 Example
9.6.7 SQL Tables Response 5 Free Response
9.7 Basic Querying in SQL Lesson
9.7.1 The SELECT Statement 1 Video
9.7.2 Basic Querying in SQL 1 Check for Understanding
9.7.3 Our First SELECT Statement 1 Example
9.7.4 Your First SELECT Statement 5 Exercise
9.7.5 More SELECT Statement 1 Video
9.7.6 More SELECT Statement 1 Check for Understanding
9.7.7 Selecting Specific Columns 1 Example
9.7.8 Harry Potter Names 5 Exercise
9.8 Filtering Queries in SQL Lesson
9.8.1 The WHERE Clause 1 Video
9.8.2 Condition Operators 1 Check for Understanding
9.8.3 Ravenclaw House 1 Example
9.8.4 People in Gryffindor 1 Example
9.8.5 Filter By ID 1 Example
9.8.6 The Weasleys 5 Exercise
9.8.7 The Potters 5 Exercise
9.9 Common Security Problems Lesson
9.9.1 Common Security Problems 1 Video
9.9.2 Common Security Problems 1 Check for Understanding
9.9.3 Meet Security Engineers at Google 1 Connection
9.9.4 Security Engineering Reflection 5 Free Response
9.9.5 Living in a Digital World 1 Video
9.9.6 Living in a Digital World 5 Free Response
9.10 SQL Injection Overview Lesson
9.10.1 SQL Injection Overview 1 Video
9.10.2 SQL Injection Overview 2 Check for Understanding
9.10.3 Equifax Security Breach 1 Connection
9.10.4 Equifax Exposed Millions 1 Connection
9.10.5 Equifax SQL Injection Attack 5 Free Response
9.10.6 SQLi 1 Example
9.11 Types of SQLi and Prevention Lesson
9.11.1 Types of SQLi 1 Video
9.11.2 Types of SQLi 3 Check for Understanding
9.11.3 Preventing SQLi 1 Video
9.11.4 Preventing SQLi 2 Check for Understanding
9.11.5 Mitigating SQL Injection 1 Connection
9.11.6 Reflection: Mitigating SQL Injection 5 Free Response
9.11.7 SQL Injection Practice 1 Connection
9.12 Software Security Quiz Lesson
9.12.1 Software Security Quiz 15 Unit Quiz
Project: Security Assessment Report
10.1 Project: Security Assessment Report Lesson
10.1.1 Project Requirements 1 Notes
10.1.2 Supercar Showdown Website 1 Connection
10.1.3 SQL Injection Testing 5 Free Response
10.1.4 SQLi Testing Handout 1 Resource
10.1.5 Security Assessment Report 15 Free Response
10.1.6 Project Reflection 5 Free Response
Project: Put it in Writing!
11.1 Level 1: Entry Event Lesson
11.1.1 Company Development 5 Free Response
11.1.2 Level 1: Attack! 5 Free Response
11.1.3 Level 1: Project Overview 1 Video
11.1.4 Put It In Writing! Rubric 5 Connection
11.2 Level 2: User Training Lesson
11.2.1 User Training Policy Development 5 Free Response
11.2.2 Challenge: Employee Negligence 1 5 Free Response
11.2.3 Challenge: Employee Negligence 2 5 Free Response
11.2.4 Level 2 Debrief 5 Free Response
11.3 Level 3: Incident Response Lesson
11.3.1 Incident Response Plan Template 5 Connection
11.3.2 Incident Response Plan Link 5 Free Response
11.3.3 Challenge: Cyber Attack! 5 Free Response
11.3.4 Level 3 Debrief 5 Free Response
11.4 Level 4: Data and Licenses Lesson
11.4.1 Data and Licenses 5 Video
11.4.2 FTC Data Security Guide 5 Connection
11.4.3 Data Policy Template 5 Connection
11.4.4 Data Policy Link 5 Free Response
11.4.5 Challenge: Data Breach 1 5 Free Response
11.4.6 Challenge: Data Breach 2 5 Free Response
11.4.7 Challenge: Data Breach 3 5 Free Response
11.4.8 Level 4 Debrief 5 Free Response
11.5 Level 5: Change Management Lesson
11.5.1 Change Management 5 Video
11.5.2 Change Management Plan 5 Connection
11.5.3 Change Management Plan Link 5 Free Response
Risk Management
12.1 Identifying Risks Lesson
12.1.1 Identifying Risks 1 Video
12.1.2 Identifying Risks Quiz 5 Check for Understanding
12.1.3 What is a Honeypot? 1 Connection
12.1.4 Honeypot Attacks 1 Connection
12.1.5 Honeypot Attacks 5 Free Response
12.1.6 Whois 1 Connection
12.1.7 Whois 5 Free Response
12.1.8 Packet Sniffing 1 Connection
12.1.9 Packet Sniffing Response 5 Free Response
12.1.10 Breach Trends 5 Free Response
12.2 Assessing Risks Lesson
12.2.1 Assessing Risks 1 Notes
12.2.2 Malware Risk Assessment 5 Free Response
12.2.3 Poor Password Assessment 5 Free Response
12.2.4 Social Engineering Assessment 5 Free Response
12.2.5 Assessing Risks 1 Video
12.2.6 Assessing Risks Quiz 5 Check for Understanding
12.2.7 End-of-Life OS 1 Connection
12.2.8 End-of-Life Proposal 5 Free Response
12.2.9 Input Handling 1 Example
12.2.10 Input Handling Responses 5 Free Response
12.2.11 Input Validation 1 Example
12.2.12 Input Validation Responses 5 Free Response
12.3 Risk Response Lesson
12.3.1 Risk Response 1 Video
12.3.2 Risk Response 5 Check for Understanding
12.3.3 Defense in Depth Risk Mitigation 5 Free Response
12.3.4 Sample Risk Assessment Report 5 Connection
12.3.5 Sample Risk Assessment Reflection 5 Free Response
12.3.6 Delta Outage Video 5 Connection
12.3.7 Delta Outage Reflection 5 Free Response
12.3.8 What Happens When Your Servers Go Down 5 Connection
12.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
12.3.10 Server Upgrade Memo 5 Free Response
12.4 Penetration Testing Lesson
12.4.1 Penetration Testing 1 Video
12.4.2 Penetration Testing 5 Check for Understanding
12.4.3 Penetration Test Report 5 Connection
12.4.4 Penetration Test Report 5 Free Response
12.4.5 Chaos Engineering 5 Notes
12.4.6 Chaos Engineering Reflection 5 Free Response
12.4.7 Pen Test Simulation Handout 5 Resource
12.4.8 Pen Test Simulation: Active Recon 5 Exercise
12.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
12.5 Risk Management Quiz Lesson
12.5.1 Risk Management Quiz 20 Unit Quiz
Project: The Game of Risk
13.1 The Game of Risk Lesson
13.1.1 Group Project Intro 1 Notes
13.1.2 Brainstorm: SLE 5 Free Response
13.1.3 Brainstorm: Materials 5 Free Response
13.1.4 Prototype Game and Instructions 5 Free Response
13.1.5 Test Your Game! 5 Free Response
13.1.6 Testing Feedback Form 1 Resource
13.1.7 Create Your Final Version! 20 Free Response
Introduction to Cybersecurity Pretest
14.1 Introduction to Cybersecurity Pretest Lesson
14.1.1 About the Pretest 1 Notes
14.1.2 Mindsets 1 Survey
14.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Introduction to Cybersecurity Posttest
15.1 Introduction to Cybersecurity Posttest Lesson
15.1.1 About the Posttest 1 Notes
15.1.2 Mindsets 1 Survey
15.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Cryptocurrency
16.1 What is Currency? Lesson
16.1.1 What is Currency? 1 Video
16.1.2 What is Currency? 2 Check for Understanding
16.1.3 What Gives Paper Money Its Actual Value 1 Connection
16.1.4 What Gives Money Its Value 5 Free Response
16.1.5 Money: What is it Good For? 1 Resource
16.2 What is Cryptocurrency? Lesson
16.2.1 Cryptocurrency Basics 1 Video
16.2.2 Cryptocurrency Basics 5 Check for Understanding
16.2.3 Cryptocurrency Module Overview 1 Video
16.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
16.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
16.2.6 Show Me the Money 1 Resource
16.2.7 American Currency Exhibit 5 Free Response
16.3 Intro to Blockchain Lesson
16.3.1 Intro to Blockchain 1 Video
16.3.2 Intro to Blockchain 3 Check for Understanding
16.3.3 CryptoKitties 1 Connection
16.3.4 CryptoKitties 5 Free Response
16.4 Hashing Lesson
16.4.1 Hashing 1 Video
16.4.2 Hashing 3 Check for Understanding
16.4.3 SHA256 Hash Generator 1 Connection
16.4.4 Using the SHA256 Hash Generator 5 Free Response
16.5 Proof of Work Lesson
16.5.1 Proof of Work 1 Video
16.5.2 Proof of Work 3 Check for Understanding
16.5.3 Mining the Block 1 Video
16.5.4 Mining the Block 3 Check for Understanding
16.5.5 PoW vs. Proof of Stake 1 Connection
16.5.6 PoW vs. PoS 5 Free Response
16.5.7 Checking Proof of Work 1 Resource
16.6 Advanced Blockchain Lesson
16.6.1 Advanced Blockchain (part 1) 1 Video
16.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
16.6.3 Blockchain Buzz 1 Connection
16.6.4 Blockchain Buzz 5 Free Response
16.6.5 Advanced Blockchain (part 2) 1 Video
16.6.6 Advanced Blockchain (part 2) 5 Free Response
16.6.7 Make a Blockchain 1 Resource
16.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
16.7 Cryptocurrencies Lesson
16.7.1 Cryptocurrencies 1 Video
16.7.2 Cryptocurrencies 3 Check for Understanding
16.7.3 Shiny Toy Phenomenon 5 Free Response
16.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
16.7.5 Walmart Use of Blockchain 5 Free Response
16.8 Bitcoin Lesson
16.8.1 Bitcoin 1 Video
16.8.2 Bitcoin 3 Check for Understanding
16.8.3 51% Attack Explained 1 Connection
16.8.4 51% Attack 5 Free Response
16.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
16.8.6 Bitcoin Bust 5 Free Response
16.8.7 Explore the Bitcoin Blockchain 1 Resource
16.9 Pros, Cons, and Future of Cryptocurrencies Lesson
16.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
16.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
16.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
16.9.4 Cryptocurrency Pros and Cons 1 Connection
16.9.5 Crypto Pros and Cons 5 Free Response
16.9.6 What is HODL? 1 Connection
16.9.7 What is HODL? 5 Free Response
16.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
16.10 Project: Cryptocurrency Expert Panel Talk Lesson
16.10.1 Overview 5 Free Response
16.10.2 Preview Sample Expert Panels 5 Free Response
16.10.3 Investigate a Cryptocurrency Topic 5 Free Response
16.10.4 Write an Outline and Rehearse 5 Free Response
16.10.5 Expert Panel Talk (Presentation) 5 Free Response
16.11 Cryptocurrency Quiz Lesson
16.11.1 Cryptocurrency Quiz 10 Unit Quiz
16.11.2 Cryptocurrency Badge 0 Badge
SQL Part II: The SQL
17.1 More Filtering Practice Lesson
17.1.1 Initials 5 Exercise
17.1.2 Compound Queries with BETWEEN 5 Exercise
17.1.3 Gryffindors With G Names 5 Exercise
17.1.4 R First Names 5 Exercise
17.1.5 FF Houses 5 Exercise
17.2 Ordering Results Lesson
17.2.1 The ORDER BY Keyword 1 Video
17.2.2 ORDER BY 1 Notes
17.2.3 ORDER BY First Name 1 Example
17.2.4 Reverse Order 1 Example
17.2.5 Order By Multiple Fields 1 Example
17.2.6 House Ordering 5 Exercise
17.2.7 Sort the P Names 5 Exercise
17.3 Renaming Fields Lesson
17.3.1 Renaming Fields with AS 1 Notes
17.3.2 Renaming in the House Table 1 Example
17.3.3 Changing Column Names 5 Exercise
17.4 Joining Tables Lesson
17.4.1 The JOIN command 1 Video
17.4.2 Basic Joining 1 Notes
17.4.3 Letters and Numbers 1 Example
17.4.4 Person and House 1 Example
17.4.5 Person and House (Correct) 1 Example
17.4.6 Person and House (with namespacing) 1 Example
17.4.7 List All Gryffindors 5 Exercise
17.4.8 JOIN With Yourself 1 Video
17.4.9 Renaming Tables 1 Notes
17.4.10 Quidditch Matchups 1 Example
17.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
17.5 More Joining Tables Lesson
17.5.1 The Course Table 1 Example
17.5.2 Courses and Professors 5 Exercise
17.5.3 Courses, Professors, and Houses 5 Exercise
17.5.4 Courses Taught By Gryffindors 5 Exercise
17.5.5 The Enrollment Table 1 Example
17.5.6 Students Taking Potions 5 Exercise
17.5.7 Non-Slytherins Taking Potions 5 Exercise
17.5.8 Defense Students by House 5 Exercise
17.5.9 Neville's Courses 5 Exercise
Web Development
18.1 Introduction to HTML Lesson
18.1.1 Introduction to HTML 1 Video
18.1.2 Introduction to HTML Quiz 1 Check for Understanding
18.1.3 Our First HTML Page 1 Example
18.1.4 Say Hello! 5 Exercise
18.2 Structure of an HTML Page Lesson
18.2.1 Structure of an HTML Page 1 Video
18.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
18.2.3 HTML Template 1 Example
18.2.4 Hello World Page 1 Example
18.2.5 The <title> Tag 5 Exercise
18.2.6 Your First HTML Page 5 Exercise
18.2.7 Structure Badge 1 Badge
18.3 Formatting Text Lesson
18.3.1 Formatting Text 1 Video
18.3.2 Formatting Text Quiz 1 Check for Understanding
18.3.3 Dictionary 1 Example
18.3.4 That's Bold 5 Exercise
18.3.5 Artificial Intelligence 5 Exercise
18.3.6 State Capitals 5 Exercise
18.4 Links Lesson
18.4.1 Links 1 Video
18.4.2 Links Quiz 1 Check for Understanding
18.4.3 The <a> Tag 1 Example
18.4.4 Simple Link 5 Exercise
18.4.5 My Favorite Websites 5 Exercise
18.5 Images Lesson
18.5.1 Images 1 Video
18.5.2 Images Quiz 1 Check for Understanding
18.5.3 The <img> Tag 1 Example
18.5.4 Building the CodeHS Homepage 1 Example
18.5.5 Collage on a Theme 5 Exercise
18.5.6 Linking an Image 5 Exercise
18.5.7 Personal Library 5 Exercise
18.5.8 Images Badge 1 Badge
18.6 HTML Lists Lesson
18.6.1 HTML Lists 1 Video
18.6.2 HTML Lists Quiz 1 Check for Understanding
18.6.3 Grocery Shopping 1 Example
18.6.4 Favorite Things 5 Exercise
18.6.5 To-Do List 5 Exercise
18.6.6 List Article 5 Exercise
18.7 HTML Tables Lesson
18.7.1 HTML Tables 1 Video
18.7.2 HTML Tables Quiz 3 Check for Understanding
18.7.3 Address Book 1 Example
18.7.4 Favorite Songs 5 Exercise
18.7.5 Calendar 5 Exercise
18.8 HTML Styling Lesson
18.8.1 HTML Styling 1 Video
18.8.2 HTML Styling Quiz 1 Check for Understanding
18.8.3 Stylish Address Book 1 Example
18.8.4 Background Colors 5 Exercise
18.8.5 Style Your To-Do List 5 Exercise
18.9 Introduction to CSS Lesson
18.9.1 Introduction to CSS 1 Video
18.9.2 Introduction to CSS Quiz 2 Check for Understanding
18.9.3 Styling Your H1s 1 Example
18.9.4 First Style with CSS 5 Exercise
18.9.5 List Styling 5 Exercise
18.10 CSS Select by Tag Lesson
18.10.1 CSS Select by Tag 1 Video
18.10.2 CSS Select by Tag Quiz 1 Check for Understanding
18.10.3 Rainbow 1 Example
18.10.4 Dog Styling 1 Example
18.10.5 Restaurant Menu 5 Exercise
18.10.6 Put Karel Together 5 Exercise
18.11 CSS Select by Class Lesson
18.11.1 CSS Select by Class 1 Video
18.11.2 CSS Select by Class Quiz 1 Check for Understanding
18.11.3 Simple Checkerboard 1 Example
18.11.4 Tic Tac Toe 5 Exercise
18.11.5 Music Library 5 Exercise
18.12 CSS Select by ID Lesson
18.12.1 CSS Select by ID 1 Video
18.12.2 CSS Select by ID Quiz 1 Check for Understanding
18.12.3 Logo 1 Example
18.12.4 Favorite Dog 5 Exercise
18.12.5 Bingo 5 Exercise
18.12.6 CSS Badge 1 Badge
18.13 Viewing Websites Lesson
18.13.1 Viewing Websites 1 Video
18.13.2 Viewing Websites Quiz 5 Check for Understanding
18.13.3 Explaining a URL 5 Free Response
18.14 Web Development Quiz Lesson
18.14.1 Web Development Quiz 15 Unit Quiz
18.15 Your First Website Lesson
18.15.1 Set Up Your codehs.me Website 10 Challenge
18.15.2 Practice PT: Your First Website 10 Challenge
18.15.3 Website Badge 1 Badge
Final Course Project
19.1 Final Course Project Lesson
19.1.1 Choose Your Own Adventure 1 Notes
19.1.2 Choose Your Adventure 5 Free Response
19.1.3 Research 5 Free Response
19.1.4 Choose Your Target Audience 5 Free Response
19.1.5 Draft Your Presentation 5 Free Response
19.1.6 Draft Your Flyer 5 Free Response
19.1.7 Make Your Presentation with Handout! 5 Free Response
Extra
20.1 Lesson 1 Lesson
20.1.1 Compound Queries 5 Example
Digital Citizenship and Cyber Hygiene
21.1 Digital Footprint and Reputation Lesson
21.1.1 Digital Footprint and Reputation 1 Video
21.1.2 Digital Footprint and Reputation 3 Check for Understanding
21.1.3 Social Media Clean-up 1 Example
21.1.4 Building a Positive Digital Footprint 5 Free Response
21.1.5 Right to be Forgotten? 1 Connection
21.1.6 Right to be Forgotten 5 Free Response
21.1.7 What is your Digital Footprint? 5 Free Response
21.2 Cyberbullying Lesson
21.2.1 Cyberbullying 1 Video
21.2.2 Cyberbullying 3 Check for Understanding
21.2.3 Scenario: Student Ranking 5 Free Response
21.2.4 Scenario: Singled Out 5 Free Response
21.2.5 Stopping Cyberbullying 5 Free Response
21.3 Internet Safety Lesson
21.3.1 Internet Safety 1 Video
21.3.2 Internet Safety 2 Check for Understanding
21.3.3 Scenario: School Stranger 5 Free Response
21.3.4 Scenario: Vacation Pals 5 Free Response
21.3.5 Staying Safe 5 Free Response
21.4 Privacy & Security Lesson
21.4.1 What is Data Privacy & Security? 1 Video
21.4.2 Privacy & Security Quiz 2 Check for Understanding
21.4.3 Google Privacy Policy Search 1 Connection
21.4.4 Google Privacy Policy Search 5 Free Response
21.4.5 Guess: Password List 1 Example
21.4.6 Guess: Using an Algorithm 1 Example
21.4.7 Guess: Brute Force 1 Example
21.4.8 How Strong is your Password? 1 Connection
21.4.9 How Strong is your password? 5 Free Response
21.5 Information Literacy Lesson
21.5.1 Information Literacy 1 Video
21.5.2 Information Literacy 2 Check for Understanding
21.5.3 Effective Internet Searches 5 Free Response
21.5.4 Evaluate the Source 1 1 Connection
21.5.5 Respond: Evaluate the Source 1 5 Free Response
21.5.6 Evaluate the Source 2 1 Notes
21.5.7 Respond: Evaluate the Source 2 5 Free Response
21.5.8 Hero Pig? 1 Connection
21.5.9 Respond: Hero Pig? 5 Free Response
21.6 Creative Credit & Copyright Lesson
21.6.1 Creative Credit and Copyright 1 Video
21.6.2 Creative Credit and Copyright 2 Check for Understanding
21.6.3 Cite! 5 Free Response
21.6.4 Exploring Creative Commons 1 Connection
21.6.5 Respond: Creative Commons 5 Free Response
21.6.6 Task: Finding Images 5 Free Response
21.6.7 Reflection: Why is Copyright Important? 5 Free Response
21.7 Hacking Ethics Lesson
21.7.1 Hacking Ethics & Legality 1 Video
21.7.2 Hacking Ethics & Legality 3 Check for Understanding
21.7.3 Penetration Testing 1 Connection
21.7.4 Reflection: Penetration Testing 5 Free Response
21.7.5 Hack the Pentagon? 1 Connection
21.7.6 Reflection: Hack the Pentagon 5 Free Response
21.7.7 Ethical Hacker Agreement 1 Check for Understanding
21.8 Digital Citizenship and Cybersecurity Quiz Lesson
21.8.1 Digital Citizenship and Cyber Hygiene Quiz 20 Unit Quiz
Project: Public Service Announcement
22.1 Project: Public Service Announcement Lesson
22.1.1 Pick a Topic 5 Free Response
22.1.2 Research 5 Free Response
22.1.3 Choose Your Audience 5 Free Response
22.1.4 What kind of PSA? 5 Free Response
22.1.5 Draft your PSA 5 Free Response
22.1.6 Finalize your PSA! 15 Free Response
Programming Fundamentals
23.1 Programming Concepts Lesson
23.1.1 Programming Concepts 1 Video
23.1.2 Programming Concepts Quiz 5 Check for Understanding
23.1.3 Compilers vs. Interpreters 1 Connection
23.1.4 Compilers vs. Interpreters 5 Free Response
23.1.5 Variables in Action 1 Example
23.1.6 Data Types using Typeof 1 Example
23.1.7 Basic Variables 1 Example
23.1.8 Daily Activities 5 Exercise
23.2 Programming with Karel Lesson
23.2.1 Learning to Program 1 Notes
23.2.2 Programming With Karel 1 Video
23.2.3 Quiz: Karel Commands 1 Check for Understanding
23.2.4 Our First Karel Program 1 Example
23.2.5 Your First Karel Program 5 Exercise
23.2.6 Functions in Karel 1 Video
23.2.7 Functions in Karel Quiz 1 Check for Understanding
23.2.8 Turn Around 1 Example
23.2.9 Digging Karel 1 Example
23.2.10 Backflip 5 Exercise
23.3 Looping Lesson
23.3.1 For Loops 1 Video
23.3.2 For Loops Quiz 1 Check for Understanding
23.3.3 Take 'em All 1 Example
23.3.4 For Loop Square 1 Example
23.3.5 Lots of Hurdles 5 Exercise
23.3.6 While Loops in Karel 1 Video
23.3.7 While Loops in Karel Quiz 2 Check for Understanding
23.3.8 Move to Wall 1 Example
23.3.9 Big Tower 1 Example
23.3.10 Follow The Yellow Ball Road 5 Exercise
23.4 Branching Lesson
23.4.1 If/Else Statements 1 Video
23.4.2 If/Else Statements Quiz 2 Check for Understanding
23.4.3 If/Else Statements 1 Example
23.4.4 One Ball in Each Spot 1 Example
23.4.5 Right Side Up 5 Exercise
23.4.6 Programming with Karel Badge 5 Badge
23.5 Arrays and Objects Lesson
23.5.1 More JS Topics 1 Notes
23.5.2 Arrays and Objects 1 Video
23.5.3 Arrays and Objects 5 Check for Understanding
23.5.4 Making an Array 1 Example
23.5.5 List of Places to Travel 5 Exercise
23.5.6 List of Prime Numbers 5 Exercise
23.5.7 Phonebook 1 Example
23.5.8 Sidekicks 5 Exercise
23.6 Organizational Techniques Lesson
23.6.1 Organizational Techniques 1 Video
23.6.2 Organizational Techniques Quiz 4 Check for Understanding
23.6.3 Hurdle Karel 1 Example
23.6.4 One Ball in Each Spot 5 Exercise
23.6.5 The Two Towers 5 Exercise
23.6.6 Interactive Sequence Diagram 1 Example
23.7 Programming Fundamentals Quiz Lesson
23.7.1 Mindsets 1 Survey
23.7.2 Programming Fundamentals Quiz 15 Unit Quiz
Networking Fundamentals
24.1 Introduction to the Internet Lesson
24.1.1 Welcome to the Internet 1 Video
24.1.2 Intro to the Internet 3 Check for Understanding
24.1.3 Inside Facebook's Connectivity Lab 1 Connection
24.1.4 Connectivity Lab Reflection 5 Free Response
24.2 Notational Systems Lesson
24.2.1 Number Systems 1 Video
24.2.2 Number Systems Quiz 2 Check for Understanding
24.2.3 Number Base Tool 1 Notes
24.2.4 Decimal to Binary 1 Video
24.2.5 Decimal to Binary Quiz 3 Check for Understanding
24.2.6 Binary Game 5 Exercise
24.3 Data Representation Lesson
24.3.1 Hexadecimal 1 Video
24.3.2 Hexadecimal Quiz 2 Check for Understanding
24.3.3 Binary to Hex Game 5 Exercise
24.3.4 Encoding Text with Binary 1 Video
24.3.5 Encoding Text with Binary Quiz 2 Check for Understanding
24.3.6 Custom Encoding 1 Example
24.3.7 Bits to ASCII 1 Example
24.3.8 Hello World in Bits 5 Exercise
24.4 Internet Hardware and Sending Information Lesson
24.4.1 Internet Hardware 1 Video
24.4.2 Internet Hardware 2 Check for Understanding
24.4.3 Sending Information 1 Video
24.4.4 Sending Information 3 Check for Understanding
24.4.5 The Internet is in the Ocean 1 Connection
24.4.6 Internet in the Ocean Reflection 5 Free Response
24.5 Internet Addresses Lesson
24.5.1 Internet Addresses 1 Video
24.5.2 Internet Addresses 2 Check for Understanding
24.5.3 The Need for Addresses 5 Free Response
24.5.4 IPv4 vs. IPv6 1 Connection
24.5.5 Reflection: IPv4 vs IPv6 5 Free Response
24.6 Domain Name System (DNS) Lesson
24.6.1 Domain Name System (DNS) 1 Video
24.6.2 Domain Name System 2 Check for Understanding
24.6.3 How Does DNS Work? 1 Connection
24.6.4 How Does DNS Work? 5 Free Response
24.7 Routing Lesson
24.7.1 Routing 1 Video
24.7.2 Routing 3 Check for Understanding
24.7.3 Redundancy 5 Free Response
24.8 Packets & Protocols Lesson
24.8.1 Packets 1 Video
24.8.2 Packets 2 Check for Understanding
24.8.3 Protocols 1 Video
24.8.4 Protocols 3 Check for Understanding
24.8.5 How the Internet Works 1 Connection
24.8.6 The Journey of an Image 5 Free Response
24.9 Viewing a Webpage Lesson
24.9.1 Viewing a Webpage 1 Video
24.9.2 Viewing a Webpage 2 Check for Understanding
24.9.3 Explaining a URL 5 Free Response
24.9.4 Net Neutrality Explained 1 Connection
24.9.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
24.9.6 Take a Side on Net Neutrality 5 Free Response
24.9.7 Net Neutrality and Cybersecurity 1 Connection
24.9.8 Net Neutrality and Cybersecurity Research 5 Free Response
24.10 Impact of the Internet Lesson
24.10.1 Impact of the Internet 1 Video
24.10.2 Impact of the Internet 3 Check for Understanding
24.10.3 What is the Digital Divide? 1 Connection
24.10.4 What is the Digital Divide? 5 Free Response
24.11 Networking Fundamentals Quiz Lesson
24.11.1 Mindsets 1 Survey
24.11.2 Networking Fundamentals Quiz 15 Unit Quiz
Cybersecurity Level 1 Certification Practice
25.1 Practice #1: Programming and Software Security Lesson
25.1.1 Quiz: Programming and Software Security 14 Quiz
25.1.2 Practice #1 Reflection 5 Notes
25.2 Practice #2: IT Infrastructure + Networks Lesson
25.2.1 Quiz: IT Infrastructure and Networks 15 Quiz
25.2.2 Practice #2 Reflection 5 Notes
25.3 Practice #3: Digital Citizenship + Cybersecurity Lesson
25.3.1 Quiz: Digital Citizenship + Cybersecurity 8 Quiz
25.3.2 Practice #3 Reflection 5 Notes
25.4 Practice #4: System Admin and Cryptography Lesson
25.4.1 Quiz: System Admin and Cryptography 15 Quiz
25.4.2 Practice #4 Reflection 5 Notes
25.5 Mixed Practice Test Lesson
25.5.1 Important Note 5 Notes
25.5.2 Mixed Practice 30 Quiz
25.5.3 Mixed Practice Reflection 5 Notes