Please enable JavaScript to use CodeHS

Points

Activity Points Item Type
What is Cybersecurity?
1.1 Module Overview - Cybersecurity Lesson
1.1.1 Welcome to Cybersecurity 1 Video
1.1.2 Welcome to Cybersecurity 2 Check for Understanding
1.1.3 Intruder Alert! 1 Example
1.1.4 Cybersecurity and You 5 Free Response
1.1.5 Course Goals 5 Free Response
1.2 What is Cybersecurity? Lesson
1.2.1 What is Cybersecurity? 1 Video
1.2.2 What is Cybersecurity? 3 Check for Understanding
1.2.3 City Services Ransomware 1 Connection
1.2.4 Ransomware Reflection 5 Free Response
1.2.5 Ransomware Simulator 1 Example
1.2.6 Internet of Things 1 Connection
1.2.7 Hackers vs. Smart Homes 1 Connection
1.2.8 Internet of Things Reflection 5 Free Response
1.3 Impact of Cybersecurity Lesson
1.3.1 Impact of Cybersecurity 1 Video
1.3.2 Impact of Cybersecurity 2 Check for Understanding
1.3.3 Phishing Simulator 1 Example
1.3.4 Phishing for Your Info 1 Connection
1.3.5 Phishing Reflection 5 Free Response
1.3.6 Cyber Game 1 Connection
1.3.7 Cyber Game Reflection 5 Free Response
1.3.8 Cyber Crime Time 1 Connection
1.3.9 Cyber Crime Time Reflection 5 Free Response
1.4 The CIA Triad Lesson
1.4.1 CIA Triad 1 Video
1.4.2 CIA Triad 2 Check for Understanding
1.4.3 Which part of the CIA Triad? 5 Free Response
1.4.4 Which part of the CIA Triad? 5 Free Response
1.4.5 Breach of Confidentiality 5 Free Response
1.4.6 Breach of Availability 5 Free Response
1.4.7 CIA Connections 5 Free Response
1.5 What is Cybersecurity? Quiz Lesson
1.5.1 What is Cybersecurity? Quiz 15 Unit Quiz
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation Lesson
2.1.1 Digital Footprint and Reputation 1 Video
2.1.2 Digital Footprint and Reputation 3 Check for Understanding
2.1.3 Social Media Clean-up 1 Example
2.1.4 Building a Positive Digital Footprint 5 Free Response
2.1.5 Right to be Forgotten? 1 Connection
2.1.6 Right to be Forgotten 5 Free Response
2.1.7 What is your Digital Footprint? 5 Free Response
2.2 Cyberbullying Lesson
2.2.1 Cyberbullying 1 Video
2.2.2 Cyberbullying 3 Check for Understanding
2.2.3 Scenario: Student Ranking 5 Free Response
2.2.4 Scenario: Singled Out 5 Free Response
2.2.5 Stopping Cyberbullying 5 Free Response
2.3 Internet Safety Lesson
2.3.1 Internet Safety 1 Video
2.3.2 Internet Safety 2 Check for Understanding
2.3.3 Scenario: School Stranger 5 Free Response
2.3.4 Scenario: Vacation Pals 5 Free Response
2.3.5 Staying Safe 5 Free Response
2.4 Privacy & Security Lesson
2.4.1 What is Data Privacy & Security? 1 Video
2.4.2 Privacy & Security Quiz 2 Check for Understanding
2.4.3 Google Privacy Policy Search 1 Connection
2.4.4 Google Privacy Policy Search 5 Free Response
2.4.5 Guess: Password List 1 Example
2.4.6 Guess: Using an Algorithm 1 Example
2.4.7 Guess: Brute Force 1 Example
2.4.8 How Strong is your Password? 1 Connection
2.4.9 How Strong is your password? 5 Free Response
2.5 Information Literacy Lesson
2.5.1 Information Literacy 1 Video
2.5.2 Information Literacy 2 Check for Understanding
2.5.3 Effective Internet Searches 5 Free Response
2.5.4 Evaluate the Source 1 1 Connection
2.5.5 Respond: Evaluate the Source 1 5 Free Response
2.5.6 Evaluate the Source 2 1 Notes
2.5.7 Respond: Evaluate the Source 2 5 Free Response
2.5.8 Hero Pig? 1 Connection
2.5.9 Respond: Hero Pig? 5 Free Response
2.6 Creative Credit & Copyright Lesson
2.6.1 Creative Credit and Copyright 1 Video
2.6.2 Creative Credit and Copyright 2 Check for Understanding
2.6.3 Cite! 5 Free Response
2.6.4 Exploring Creative Commons 1 Connection
2.6.5 Respond: Creative Commons 5 Free Response
2.6.6 Task: Finding Images 5 Free Response
2.6.7 Reflection: Why is Copyright Important? 5 Free Response
2.7 Hacking Ethics Lesson
2.7.1 Hacking Ethics & Legality 1 Video
2.7.2 Hacking Ethics & Legality 3 Check for Understanding
2.7.3 Penetration Testing 1 Connection
2.7.4 Reflection: Penetration Testing 5 Free Response
2.7.5 Hack the Pentagon? 1 Connection
2.7.6 Reflection: Hack the Pentagon 5 Free Response
2.7.7 Ethical Hacker Agreement 1 Check for Understanding
2.8 Digital Citizenship and Cybersecurity Quiz Lesson
2.8.1 Digital Citizenship and Cyber Hygiene Quiz 20 Unit Quiz
Project: Public Service Announcement
3.1 Project: Public Service Announcement Lesson
3.1.1 Pick a Topic 5 Free Response
3.1.2 Research 5 Free Response
3.1.3 Choose Your Audience 5 Free Response
3.1.4 What kind of PSA? 5 Free Response
3.1.5 Draft your PSA 5 Free Response
3.1.6 Finalize your PSA! 15 Free Response
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis Lesson
4.1.1 Cryptography, Cryptology, Cryptanalysis 1 Video
4.1.2 Cryptography, Cryptology, Cryptanalysis 2 Check for Understanding
4.1.3 Cryptogram Game! 1 Example
4.1.4 Why encrypt? 1 Video
4.1.5 Why encrypt? 2 Check for Understanding
4.1.6 Encrypt/Decrypt 1 Example
4.2 History of Cryptography Lesson
4.2.1 Cryptography: A Brief History 1 Video
4.2.2 Cryptography History Quiz 2 Check for Understanding
4.2.3 How the Enigma Worked 1 Connection
4.2.4 How the Enigma Worked 5 Free Response
4.2.5 Unknown Languages and the Future of Cryptography 1 Connection
4.2.6 The Future of Cybersecurity 5 Free Response
4.3 Basic Crypto Systems: Caesar Cipher Lesson
4.3.1 Caesar Cipher 1 Video
4.3.2 Caesar Cipher 2 Check for Understanding
4.3.3 Caesar Cipher Encryption 1 Example
4.3.4 Decrypt Caesar's Cipher! 1 Example
4.4 Basic Crypto Systems: Cracking Caesar Lesson
4.4.1 Cracking Caesar Cipher 1 Video
4.4.2 Cracking Caesar Cipher 2 Check for Understanding
4.4.3 Cracking Caesar with Brute Force 1 Example
4.4.4 Letter Frequency and Caesar 1 Example
4.4.5 Examining Caesar Cipher 5 Free Response
4.5 Basic Crypto Systems: Vigenere Cipher Lesson
4.5.1 Vigenere Cipher 1 Video
4.5.2 Vigenere Cipher 1 Check for Understanding
4.5.3 Vigenere Cipher Example 1 Example
4.5.4 Letter Frequency and Vigenere Cipher 1 Example
4.5.5 Examining Vigenere Cipher 5 Free Response
4.5.6 Improving Vigenere 1 Example
4.6 Hash Functions Lesson
4.6.1 Hash Functions 1 Video
4.6.2 Hash Functions 3 Check for Understanding
4.6.3 Google Shattered Crypto Algorithm 1 Connection
4.6.4 Hash Functions in the News 5 Free Response
4.6.5 Using a Hash Generator 1 Connection
4.6.6 Hash Generator 5 Free Response
4.6.7 Password Salting 1 Connection
4.6.8 Password Salting 5 Free Response
4.7 Hash Function Development Lesson
4.7.1 Hash Function Development 1 Video
4.7.2 Hash Function Development 2 Check for Understanding
4.7.3 Modulo Math Calculator 1 Example
4.7.4 Understanding Modulo Math 1 Example
4.7.5 Modulo Game! 1 Example
4.7.6 Develop a Simple Hash Function 5 Exercise
4.8 Digital Certificates Lesson
4.8.1 Digital Certificates 1 Video
4.8.2 Digital Certificates 4 Check for Understanding
4.8.3 SSL Explained 1 Connection
4.8.4 SSL Explained Response 5 Free Response
4.8.5 Digital Certificate Connection 5 Free Response
4.8.6 In The News 1 Connection
4.8.7 In The News Response 5 Free Response
4.8.8 Become a Certificate Authority! 10 Free Response
4.9 The ABCs of Cryptography Quiz Lesson
4.9.1 The ABCs of Cryptography Quiz 15 Unit Quiz
Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast Lesson
5.1.1 Overview 1 Notes
5.1.2 Investigate a Classic Cipher 1 Notes
5.1.3 Write the Script and Rehearse 5 Free Response
5.1.4 Newscast Presentation 15 Free Response
System Administration
6.1 Operating Systems Lesson
6.1.1 Operating Systems 1 Video
6.1.2 Operating Systems Quiz 5 Check for Understanding
6.1.3 Detect My OS 1 Example
6.1.4 Windows OS Installation Simulation 1 Example
6.1.5 Installing an OS 5 Free Response
6.1.6 Upgrading a Mac OS 1 Connection
6.2 Comparing Operating Systems Lesson
6.2.1 Comparing Operating Systems 1 Video
6.2.2 Comparing Operating Systems Quiz 5 Check for Understanding
6.2.3 Windows Simulation 1 Example
6.2.4 MacOS Simulation 1 Example
6.2.5 Choose a Linux Distro! 1 Connection
6.2.6 Which would you choose? 5 Free Response
6.3 Compatibility Lesson
6.3.1 Compatibility 1 Video
6.3.2 Compatibility Quiz 3 Check for Understanding
6.3.3 What Processor? Windows 1 Example
6.3.4 What Processor? Mac 1 Example
6.3.5 What Processor are you running? 5 Free Response
6.4 Software and Applications Lesson
6.4.1 Software and Applications 1 Video
6.4.2 Software and Applications Quiz 2 Check for Understanding
6.4.3 Spreadsheet Simulation 1 Example
6.4.4 Messaging Simulation 1 Example
6.4.5 Kanban Board Simulation 1 Example
6.4.6 Software Simulations 5 Free Response
6.5 Software Licenses Lesson
6.5.1 Software Licenses 1 Video
6.5.2 Software Licenses Quiz 3 Check for Understanding
6.5.3 Do I need a Software License? 5 Free Response
6.5.4 Is This Original? 5 Free Response
6.6 Application Security Lesson
6.6.1 Application Security 1 Video
6.6.2 Application Security 5 Check for Understanding
6.6.3 Windows Updates 1 Example
6.6.4 Windows Defender Antivirus 1 Connection
6.6.5 Windows Defender Antivirus 5 Free Response
6.6.6 CodeHS System Restore 5 Free Response
6.7 Browser Configuration Lesson
6.7.1 Browser Configuration 1 Video
6.7.2 Browser Configuration 5 Check for Understanding
6.7.3 Cached CodeHS 1 Connection
6.7.4 Cached CodeHS 5 Free Response
6.7.5 Is Your Popup Blocker On? 1 Example
6.7.6 Browser Extensions Lab 5 Free Response
6.8 System Administration Lesson
6.8.1 User Accounts 1 Video
6.8.2 User Accounts Quiz 2 Check for Understanding
6.8.3 User Accounts 5 Free Response
6.8.4 Shared Folders and Files 5 Free Response
6.8.5 Host Security 1 Video
6.8.6 Host Security Quiz 3 Check for Understanding
6.8.7 Security Baseline 5 Free Response
6.9 Command Line Interface Lesson
6.9.1 Linux/MacOS vs. Windows 1 Notes
6.9.2 Command Line Interface 1 Video
6.9.3 Command Line Interface Quiz 5 Check for Understanding
6.9.4 Command Equivalents 1 Resource
6.9.5 Windows Command Prompt 1 Video
6.9.6 Windows Command Prompt 5 Free Response
6.9.7 Directory Directions 5 Free Response
6.9.8 Neural Interface? 1 Connection
6.9.9 Neural Interface? 5 Free Response
6.10 System Administration Quiz Lesson
6.10.1 Mindsets 1 Survey
6.10.2 System Administration Quiz 20 Unit Quiz
Software Security
7.1 Clients and Servers Lesson
7.1.1 Clients and Servers 1 Video
7.1.2 Clients and Servers 2 Check for Understanding
7.1.3 Inside a Google Data Center 1 Connection
7.1.4 Inside a Google Data Center 5 Free Response
7.1.5 Cloud Vulnerabilities 1 Connection
7.1.6 Cloud Vulnerabilities Response 5 Free Response
7.1.7 Client-Server Model 1 Video
7.1.8 Client-Server Model 2 Check for Understanding
7.1.9 The Future of User Privacy 1 Connection
7.1.10 The Future of User Privacy 5 Free Response
7.2 What is SQL? Lesson
7.2.1 What is SQL Overview 1 Notes
7.2.2 Intro to SQL 1 Video
7.2.3 Quiz: What is SQL? 1 Check for Understanding
7.2.4 How to Structure Data in SQL 1 Video
7.2.5 How to Structure Data in SQL 3 Check for Understanding
7.2.6 SQL Tables 1 Example
7.2.7 SQL Tables Response 5 Free Response
7.3 Basic Querying in SQL Lesson
7.3.1 The SELECT Statement 1 Video
7.3.2 Basic Querying in SQL 1 Check for Understanding
7.3.3 Our First SELECT Statement 1 Example
7.3.4 Your First SELECT Statement 5 Exercise
7.3.5 More SELECT Statement 1 Video
7.3.6 More SELECT Statement 1 Check for Understanding
7.3.7 Selecting Specific Columns 1 Example
7.3.8 Harry Potter Names 5 Exercise
7.4 Common Security Problems Lesson
7.4.1 Common Security Problems 1 Video
7.4.2 Common Security Problems 1 Check for Understanding
7.4.3 Meet Security Engineers at Google 1 Connection
7.4.4 Security Engineering Reflection 5 Free Response
7.4.5 Living in a Digital World 1 Video
7.4.6 Living in a Digital World 5 Free Response
7.5 SQL Injection Overview Lesson
7.5.1 SQL Injection Overview 1 Video
7.5.2 SQL Injection Overview 2 Check for Understanding
7.5.3 Equifax Security Breach 1 Connection
7.5.4 Equifax Exposed Millions 1 Connection
7.5.5 Equifax SQL Injection Attack 5 Free Response
7.5.6 SQLi 1 Example
7.6 Types of SQLi and Prevention Lesson
7.6.1 Types of SQLi 1 Video
7.6.2 Types of SQLi 3 Check for Understanding
7.6.3 Preventing SQLi 1 Video
7.6.4 Preventing SQLi 2 Check for Understanding
7.6.5 Mitigating SQL Injection 1 Connection
7.6.6 Reflection: Mitigating SQL Injection 5 Free Response
7.6.7 SQL Injection Practice 1 Connection
7.7 Software Security Quiz Lesson
7.7.1 Software Security Quiz 15 Unit Quiz
Project: Security Assessment Report (SQLi)
8.1 Project: Security Assessment Report Lesson
8.1.1 Project Requirements 1 Notes
8.1.2 Supercar Showdown Website 1 Connection
8.1.3 SQL Injection Testing 5 Free Response
8.1.4 SQLi Testing Handout 1 Resource
8.1.5 Security Assessment Report 15 Free Response
8.1.6 Project Reflection 5 Free Response
Networking Fundamentals
9.1 Introduction to the Internet Lesson
9.1.1 Welcome to the Internet 1 Video
9.1.2 Intro to the Internet 3 Check for Understanding
9.1.3 Inside Facebook's Connectivity Lab 1 Connection
9.1.4 Connectivity Lab Reflection 5 Free Response
9.2 Notational Systems Lesson
9.2.1 Number Systems 1 Video
9.2.2 Number Systems Quiz 2 Check for Understanding
9.2.3 Number Base Tool 1 Notes
9.2.4 Decimal to Binary 1 Video
9.2.5 Decimal to Binary Quiz 3 Check for Understanding
9.2.6 Binary Game 5 Exercise
9.3 Data Representation Lesson
9.3.1 Hexadecimal 1 Video
9.3.2 Hexadecimal Quiz 2 Check for Understanding
9.3.3 Binary to Hex Game 5 Exercise
9.3.4 Encoding Text with Binary 1 Video
9.3.5 Encoding Text with Binary Quiz 2 Check for Understanding
9.3.6 Custom Encoding 1 Example
9.3.7 Bits to ASCII 1 Example
9.3.8 Hello World in Bits 5 Exercise
9.4 Internet Hardware and Sending Information Lesson
9.4.1 Internet Hardware 1 Video
9.4.2 Internet Hardware 2 Check for Understanding
9.4.3 Sending Information 1 Video
9.4.4 Sending Information 3 Check for Understanding
9.4.5 The Internet is in the Ocean 1 Connection
9.4.6 Internet in the Ocean Reflection 5 Free Response
9.5 Internet Addresses Lesson
9.5.1 Internet Addresses 1 Video
9.5.2 Internet Addresses 2 Check for Understanding
9.5.3 The Need for Addresses 5 Free Response
9.5.4 IPv4 vs. IPv6 1 Connection
9.5.5 Reflection: IPv4 vs IPv6 5 Free Response
9.6 Domain Name System (DNS) Lesson
9.6.1 Domain Name System (DNS) 1 Video
9.6.2 Domain Name System 2 Check for Understanding
9.6.3 How Does DNS Work? 1 Connection
9.6.4 How Does DNS Work? 5 Free Response
9.7 Routing Lesson
9.7.1 Routing 1 Video
9.7.2 Routing 3 Check for Understanding
9.7.3 Redundancy 5 Free Response
9.8 Packets & Protocols Lesson
9.8.1 Packets 1 Video
9.8.2 Packets 2 Check for Understanding
9.8.3 Protocols 1 Video
9.8.4 Protocols 3 Check for Understanding
9.8.5 How the Internet Works 1 Connection
9.8.6 The Journey of an Image 5 Free Response
9.9 Viewing a Webpage Lesson
9.9.1 Viewing a Webpage 1 Video
9.9.2 Viewing a Webpage 2 Check for Understanding
9.9.3 Explaining a URL 5 Free Response
9.9.4 Net Neutrality Explained 1 Connection
9.9.5 FCCs Net Neutrality Rules Officially Repealed 1 Connection
9.9.6 Take a Side on Net Neutrality 5 Free Response
9.9.7 Net Neutrality and Cybersecurity 1 Connection
9.9.8 Net Neutrality and Cybersecurity Research 5 Free Response
9.10 Access Control Lesson
9.10.1 Access Control 1 Video
9.10.2 Access Control 4 Check for Understanding
9.10.3 Multifactor Authentication 1 Example
9.10.4 Two Factor Authentication 1 Example
9.10.5 Two Factor Authentication Reflection 5 Free Response
9.10.6 RADIUS Overview with AAA Protocol 1 Connection
9.10.7 RADIUS Server Access Control 1 Connection
9.10.8 RADIUS Reflection 5 Free Response
9.11 Impact of the Internet Lesson
9.11.1 Impact of the Internet 1 Video
9.11.2 Impact of the Internet 3 Check for Understanding
9.11.3 What is the Digital Divide? 1 Connection
9.11.4 What is the Digital Divide? 5 Free Response
9.12 Networking Fundamentals Quiz Lesson
9.12.1 Mindsets 1 Survey
9.12.2 Networking Fundamentals Quiz 15 Unit Quiz
IT Infrastructure
10.1 Internal Components Lesson
10.1.1 Internal Components 1 Video
10.1.2 Internal Components 5 Check for Understanding
10.1.3 Build a Computer 1 Connection
10.1.4 Build a Computer 5 Free Response
10.1.5 Test Your Brain's RAM! 1 Example
10.1.6 Test Your Brain's RAM! Reflection 5 Free Response
10.2 Peripheral Devices Lesson
10.2.1 Peripheral Devices 1 Video
10.2.2 Peripheral Devices 5 Check for Understanding
10.2.3 Personalized Peripherals 5 Free Response
10.2.4 IT Help 5 Free Response
10.2.5 Your Ideal Computer Setup 5 Free Response
10.3 Network Devices Lesson
10.3.1 Network Devices 1 Video
10.3.2 Network Devices 5 Check for Understanding
10.3.3 Speed Test 1 Connection
10.3.4 Speed Test 5 Free Response
10.3.5 Fiber Optics Bend Light! 1 Connection
10.3.6 Fiber Optics Bend Light! 5 Free Response
10.3.7 Ethernet Standards 1 Connection
10.3.8 Ethernet Standards 5 Free Response
10.3.9 Network Troubleshooting 5 Free Response
10.4 Storage Options Lesson
10.4.1 Storage Options 1 Video
10.4.2 Storage Options Quiz 5 Check for Understanding
10.4.3 Security of Cloud Storage 1 Connection
10.4.4 Security of Cloud Storage 5 Free Response
10.4.5 Storage Suggestions 5 Free Response
10.5 Network Options Lesson
10.5.1 Network Options 1 Video
10.5.2 Network Options Quiz 5 Check for Understanding
10.5.3 What is an SSID? 1 Connection
10.5.4 What is an SSID? 5 Free Response
10.5.5 Wireless Threats 1 Connection
10.5.6 Wireless Threats 5 Free Response
10.5.7 Wireless Network Setup 5 Free Response
10.6 Network Communication Lesson
10.6.1 Network Communication 1 Video
10.6.2 Network Communication Quiz 2 Check for Understanding
10.6.3 Setting up a Firewall 1 Example
10.6.4 iptables 5 Free Response
10.6.5 iptables simulation 1 Notes
10.7 Network Management Lesson
10.7.1 Linux/MacOS vs. Windows 1 Notes
10.7.2 Network Management 1 Video
10.7.3 Network Management Quiz 3 Check for Understanding
10.7.4 MacOS Terminal Simulation 1 Example
10.7.5 Windows Command Prompt Simulation 1 Example
10.7.6 Windows Command Prompt Spy 5 Video
10.7.7 Windows Command Prompt Spy 5 Free Response
10.8 IT Infrastructure Quiz Lesson
10.8.1 IT Infrastructure Quiz 20 Unit Quiz
Project: Troubleshooting
11.1 Methodology Lesson
11.1.1 Troubleshooting Methodology 1 Notes
11.1.2 Identify the Problem 5 Free Response
11.1.3 Research Solutions 5 Free Response
11.1.4 Establish a Theory 5 Free Response
11.1.5 Test the Theory 5 Free Response
11.1.6 Fix the Problem! 5 Free Response
11.2 Support Practice Lesson
11.2.1 Signal Strength 10 Exercise
11.2.2 Interference 10 Exercise
Project: IT Professional
12.1 Building a Resume Lesson
12.1.1 What is a Resume? 5 Connection
12.1.2 What is a Resume? 5 Free Response
12.1.3 Explore Resume Layouts 5 Connection
12.1.4 Explore Resume Layouts 5 Free Response
12.1.5 Draft Your Resume 5 Free Response
12.2 Communication is Key! Lesson
12.2.1 IT Professional 5 Notes
12.2.2 Cybersecurity Careers 5 Free Response
12.2.3 Customer Service Skills 1 Connection
12.2.4 Customer Service Skills 5 Free Response
12.2.5 Act it Out! 15 Free Response
12.3 Building a Knowledge Base Lesson
12.3.1 What is a Knowledge Base? 1 Connection
12.3.2 Draft a KB Article 5 Free Response
12.3.3 Share your KB Article 5 Free Response
12.3.4 Finalize your KB Article 15 Free Response
12.4 Star in a Video! Lesson
12.4.1 Instructional Videos 1 Connection
12.4.2 Instructional Video Plan 5 Free Response
12.4.3 Write the Script 5 Free Response
12.4.4 Create the Storyboard 5 Free Response
12.4.5 Record Your Video 5 Free Response
Project: Digital Forensics
13.1 Digital Forensics Lesson
13.1.1 Digital Forensics 1 Video
13.1.2 Student Success Story 1 Connection
13.1.3 Student Success Story Response 5 Free Response
13.2 Forensic Case 1: Logs Lesson
13.2.1 Network Logs 1 Notes
13.2.2 Network Log Evidence 1 Example
13.2.3 Network Logs Conclusion 5 Free Response
13.3 Forensic Case 2: File Metadata Lesson
13.3.1 File Metadata 1 Notes
13.3.2 File Metadata Evidence 1 Example
13.3.3 File Metadata Conclusion 5 Free Response
13.4 Forensic Case 3: Exif Data Lesson
13.4.1 Photo Exif 1 Notes
13.4.2 Exif Using Inspector 1 Connection
13.4.3 Exif Using the CLI 1 Example
13.4.4 Photo Exif Conclusion 5 Free Response
Cyber Defense
14.1 Network Attacks Lesson
14.1.1 Network Attacks Overview 1 Video
14.1.2 Network Attacks Quiz 4 Check for Understanding
14.1.3 Check for Vulnerabilities 1 Notes
14.1.4 Bug Bounty Hunting 1 Connection
14.1.5 Bug Bounty Hunting 5 Free Response
14.1.6 Common Port Targets 1 Connection
14.1.7 Port Scanner Simulation 1 Example
14.1.8 Open Port Reflection 5 Free Response
14.2 Malware Types and Prevention Lesson
14.2.1 Malware Types and Prevention 1 Video
14.2.2 Malware Types and Prevention 5 Check for Understanding
14.2.3 How Anti-malware Works 1 Connection
14.2.4 How Anti-malware Works 5 Free Response
14.2.5 OS Malware Security 5 Free Response
14.2.6 Reverse Engineering Malware 5 Free Response
14.2.7 Cyberterrorism 1 Connection
14.2.8 Cyberterrorism Response 5 Free Response
14.3 Common Network Attacks Lesson
14.3.1 Common Network Attacks 1 Video
14.3.2 Network Attacks 3 Check for Understanding
14.3.3 Social Engineering Hack 1 Connection
14.3.4 Social Engineering Reflection 5 Free Response
14.3.5 DDoS Attacks 1 Connection
14.3.6 DDoS Simulation 1 Example
14.3.7 DDoS Reflection 5 Free Response
14.4 Additional Attacks Lesson
14.4.1 Additional Attacks 1 Video
14.4.2 Additional Attacks Quiz 5 Check for Understanding
14.4.3 Botnet Attacks - Mirai 1 Connection
14.4.4 Botnet Attacks - 3ve 1 Connection
14.4.5 Botnet Attacks - 3ve Video 1 Connection
14.4.6 Botnet Attacks - Reflection 5 Free Response
14.4.7 Zero-day Exploit: Stuxnet 5 Connection
14.4.8 Zero-day Exploit: Stuxnet 5 Notes
14.4.9 Zero-day Exploit Reflection 5 Free Response
14.4.10 US-CERT Current Activity 5 Free Response
14.5 Cross-site Scripting Lesson
14.5.1 Cross-site Scripting 1 Video
14.5.2 Cross-site Scripting 2 Check for Understanding
14.5.3 XSS Bug in Yahoo Mail 1 Connection
14.5.4 XSS Bug in Yahoo Mail 5 Free Response
14.5.5 XSS Demo Overview 1 Notes
14.5.6 Hacksplaining XSS Demo 1 Connection
14.5.7 Google's Tutorial for XSS 1 Connection
14.5.8 XSS Reflection 5 Free Response
14.6 Internal Threats Lesson
14.6.1 Internal Threats 1 Video
14.6.2 Internal Threats 5 Check for Understanding
14.6.3 BIOS/UEFI Attack Example 1 Connection
14.6.4 Accessing BIOS/UEFI 1 Notes
14.6.5 Causes of Data Breaches 5 Connection
14.6.6 Causes of Data Breaches 5 Free Response
14.6.7 Protecting Data at All Times 1 Connection
14.6.8 Protecting Data at All Times 5 Free Response
14.6.9 Air Gapped Computers 1 Connection
14.6.10 Air Gapped Computers Response 5 Free Response
14.7 Cyber Defense Quiz Lesson
14.7.1 Cyber Defense Quiz 20 Unit Quiz
Project: Security Assessment Report (XSS)
15.1 Project Security Assessment Report Lesson
15.1.1 Project Requirements 1 Notes
15.1.2 Supercar Showdown Website 1 Connection
15.1.3 Cross-site Scripting Testing 5 Free Response
15.1.4 Cross-site Scripting Handout 1 Resource
15.1.5 Security Assessment Report 15 Free Response
15.1.6 Project Reflection 5 Free Response
Risk Management
16.1 Identifying Risks Lesson
16.1.1 Identifying Risks 1 Video
16.1.2 Identifying Risks Quiz 5 Check for Understanding
16.1.3 What is a Honeypot? 1 Connection
16.1.4 Honeypot Attacks 1 Connection
16.1.5 Honeypot Attacks 5 Free Response
16.1.6 Whois 1 Connection
16.1.7 Whois 5 Free Response
16.1.8 Packet Sniffing 1 Connection
16.1.9 Packet Sniffing Response 5 Free Response
16.1.10 Breach Trends 5 Free Response
16.2 Assessing Risks Lesson
16.2.1 Assessing Risks 1 Notes
16.2.2 Malware Risk Assessment 5 Free Response
16.2.3 Poor Password Assessment 5 Free Response
16.2.4 Social Engineering Assessment 5 Free Response
16.2.5 Assessing Risks 1 Video
16.2.6 Assessing Risks Quiz 5 Check for Understanding
16.2.7 End-of-Life OS 1 Connection
16.2.8 End-of-Life Proposal 5 Free Response
16.2.9 Input Handling 1 Example
16.2.10 Input Handling Responses 5 Free Response
16.2.11 Input Validation 1 Example
16.2.12 Input Validation Responses 5 Free Response
16.3 Risk Response Lesson
16.3.1 Risk Response 1 Video
16.3.2 Risk Response 5 Check for Understanding
16.3.3 Defense in Depth Risk Mitigation 5 Free Response
16.3.4 Sample Risk Assessment Report 5 Connection
16.3.5 Sample Risk Assessment Reflection 5 Free Response
16.3.6 Delta Outage Video 5 Connection
16.3.7 Delta Outage Reflection 5 Free Response
16.3.8 What Happens When Your Servers Go Down 5 Connection
16.3.9 What Happens When Your Servers Go Down Reflection 5 Free Response
16.3.10 Server Upgrade Memo 5 Free Response
16.4 Penetration Testing Lesson
16.4.1 Penetration Testing 1 Video
16.4.2 Penetration Testing 5 Check for Understanding
16.4.3 Penetration Test Report 5 Connection
16.4.4 Penetration Test Report 5 Free Response
16.4.5 Chaos Engineering 5 Notes
16.4.6 Chaos Engineering Reflection 5 Free Response
16.4.7 Pen Test Simulation Handout 5 Resource
16.4.8 Pen Test Simulation: Active Recon 5 Exercise
16.4.9 Pen Test Simulation: Exploit Vulnerabilities 5 Exercise
16.5 Risk Management Quiz Lesson
16.5.1 Risk Management Quiz 20 Unit Quiz
Project: The Game of Risk
17.1 The Game of Risk Lesson
17.1.1 Group Project Intro 1 Notes
17.1.2 Brainstorm: SLE 5 Free Response
17.1.3 Brainstorm: Materials 5 Free Response
17.1.4 Prototype Game and Instructions 5 Free Response
17.1.5 Test Your Game! 5 Free Response
17.1.6 Testing Feedback Form 1 Resource
17.1.7 Create Your Final Version! 20 Free Response
Final Exam
18.1 Final Exam Lesson
18.1.1 Final Exam 25 Final
Introduction to Cybersecurity Pretest
19.1 Introduction to Cybersecurity Pretest Lesson
19.1.1 About the Pretest 1 Notes
19.1.2 Mindsets 1 Survey
19.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Introduction to Cybersecurity Posttest
20.1 Introduction to Cybersecurity Posttest Lesson
20.1.1 About the Posttest 1 Notes
20.1.2 Mindsets 1 Survey
20.1.3 Introduction to Cybersecurity Knowledge & Skills 15 Quiz
Programming Fundamentals
21.1 Programming Concepts Lesson
21.1.1 Programming Concepts 1 Video
21.1.2 Programming Concepts Quiz 5 Check for Understanding
21.1.3 Compilers vs. Interpreters 1 Connection
21.1.4 Compilers vs. Interpreters 5 Free Response
21.1.5 Variables in Action 1 Example
21.1.6 Data Types using Typeof 1 Example
21.1.7 Basic Variables 1 Example
21.1.8 Daily Activities 5 Exercise
21.2 Programming with Karel Lesson
21.2.1 Learning to Program 1 Notes
21.2.2 Programming With Karel 1 Video
21.2.3 Quiz: Karel Commands 1 Check for Understanding
21.2.4 Our First Karel Program 1 Example
21.2.5 Your First Karel Program 5 Exercise
21.2.6 Functions in Karel 1 Video
21.2.7 Functions in Karel Quiz 1 Check for Understanding
21.2.8 Turn Around 1 Example
21.2.9 Digging Karel 1 Example
21.2.10 Backflip 5 Exercise
21.3 Looping Lesson
21.3.1 For Loops 1 Video
21.3.2 For Loops Quiz 1 Check for Understanding
21.3.3 Take 'em All 1 Example
21.3.4 For Loop Square 1 Example
21.3.5 Lots of Hurdles 5 Exercise
21.3.6 While Loops in Karel 1 Video
21.3.7 While Loops in Karel Quiz 2 Check for Understanding
21.3.8 Move to Wall 1 Example
21.3.9 Big Tower 1 Example
21.3.10 Follow The Yellow Ball Road 5 Exercise
21.4 Branching Lesson
21.4.1 If/Else Statements 1 Video
21.4.2 If/Else Statements Quiz 2 Check for Understanding
21.4.3 If/Else Statements 1 Example
21.4.4 One Ball in Each Spot 1 Example
21.4.5 Right Side Up 5 Exercise
21.4.6 Programming with Karel Badge 5 Badge
21.5 Arrays and Objects Lesson
21.5.1 More JS Topics 1 Notes
21.5.2 Arrays and Objects 1 Video
21.5.3 Arrays and Objects 5 Check for Understanding
21.5.4 Making an Array 1 Example
21.5.5 List of Places to Travel 5 Exercise
21.5.6 List of Prime Numbers 5 Exercise
21.5.7 Phonebook 1 Example
21.5.8 Sidekicks 5 Exercise
21.6 Organizational Techniques Lesson
21.6.1 Organizational Techniques 1 Video
21.6.2 Organizational Techniques Quiz 4 Check for Understanding
21.6.3 Hurdle Karel 1 Example
21.6.4 One Ball in Each Spot 5 Exercise
21.6.5 The Two Towers 5 Exercise
21.6.6 Interactive Sequence Diagram 1 Example
21.7 Programming Fundamentals Quiz Lesson
21.7.1 Mindsets 1 Survey
21.7.2 Programming Fundamentals Quiz 15 Unit Quiz
Cryptocurrency
22.1 What is Currency? Lesson
22.1.1 What is Currency? 1 Video
22.1.2 What is Currency? 2 Check for Understanding
22.1.3 What Gives Paper Money Its Actual Value 1 Connection
22.1.4 What Gives Money Its Value 5 Free Response
22.1.5 Money: What is it Good For? 1 Resource
22.2 What is Cryptocurrency? Lesson
22.2.1 Cryptocurrency Basics 1 Video
22.2.2 Cryptocurrency Basics 5 Check for Understanding
22.2.3 Cryptocurrency Module Overview 1 Video
22.2.4 Cryptocurrencies Might Help Developing Countries 1 Connection
22.2.5 Cryptocurrencies are Helping Developing Countries 5 Free Response
22.2.6 Show Me the Money 1 Resource
22.2.7 American Currency Exhibit 5 Free Response
22.3 Intro to Blockchain Lesson
22.3.1 Intro to Blockchain 1 Video
22.3.2 Intro to Blockchain 3 Check for Understanding
22.3.3 CryptoKitties 1 Connection
22.3.4 CryptoKitties 5 Free Response
22.4 Hashing Lesson
22.4.1 Hashing 1 Video
22.4.2 Hashing 3 Check for Understanding
22.4.3 SHA256 Hash Generator 1 Connection
22.4.4 Using the SHA256 Hash Generator 5 Free Response
22.5 Proof of Work Lesson
22.5.1 Proof of Work 1 Video
22.5.2 Proof of Work 3 Check for Understanding
22.5.3 Mining the Block 1 Video
22.5.4 Mining the Block 3 Check for Understanding
22.5.5 PoW vs. Proof of Stake 1 Connection
22.5.6 PoW vs. PoS 5 Free Response
22.5.7 Checking Proof of Work 1 Resource
22.6 Advanced Blockchain Lesson
22.6.1 Advanced Blockchain (part 1) 1 Video
22.6.2 Advanced Blockchain (part 1) 3 Check for Understanding
22.6.3 Blockchain Buzz 1 Connection
22.6.4 Blockchain Buzz 5 Free Response
22.6.5 Advanced Blockchain (part 2) 1 Video
22.6.6 Advanced Blockchain (part 2) 5 Free Response
22.6.7 Make a Blockchain 1 Resource
22.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1 Connection
22.7 Cryptocurrencies Lesson
22.7.1 Cryptocurrencies 1 Video
22.7.2 Cryptocurrencies 3 Check for Understanding
22.7.3 Shiny Toy Phenomenon 5 Free Response
22.7.4 Walmart Using Blockchain to Stop Spread of Disease 1 Connection
22.7.5 Walmart Use of Blockchain 5 Free Response
22.8 Bitcoin Lesson
22.8.1 Bitcoin 1 Video
22.8.2 Bitcoin 3 Check for Understanding
22.8.3 51% Attack Explained 1 Connection
22.8.4 51% Attack 5 Free Response
22.8.5 Why the Bitcoin Bubble will Burst in 2018 1 Connection
22.8.6 Bitcoin Bust 5 Free Response
22.8.7 Explore the Bitcoin Blockchain 1 Resource
22.9 Pros, Cons, and Future of Cryptocurrencies Lesson
22.9.1 Pros, Cons, and Future of Cryptocurrencies 1 Video
22.9.2 Pros, Cons and Future of Cryptocurrencies 3 Check for Understanding
22.9.3 Pros, Cons and future of Cryptocurrencies 5 Free Response
22.9.4 Cryptocurrency Pros and Cons 1 Connection
22.9.5 Crypto Pros and Cons 5 Free Response
22.9.6 What is HODL? 1 Connection
22.9.7 What is HODL? 5 Free Response
22.9.8 Pros, Cons, and Future of Cryptocurrencies 5 Free Response
22.10 Project: Cryptocurrency Expert Panel Talk Lesson
22.10.1 Overview 5 Free Response
22.10.2 Preview Sample Expert Panels 5 Free Response
22.10.3 Investigate a Cryptocurrency Topic 5 Free Response
22.10.4 Write an Outline and Rehearse 5 Free Response
22.10.5 Expert Panel Talk (Presentation) 5 Free Response
22.11 Cryptocurrency Quiz Lesson
22.11.1 Cryptocurrency Quiz 10 Unit Quiz
22.11.2 Cryptocurrency Badge 0 Badge
Final Course Project
23.1 Final Course Project Lesson
23.1.1 Choose Your Own Adventure 1 Notes
23.1.2 Choose Your Adventure 5 Free Response
23.1.3 Research 5 Free Response
23.1.4 Choose Your Target Audience 5 Free Response
23.1.5 Draft Your Presentation 5 Free Response
23.1.6 Draft Your Flyer 5 Free Response
23.1.7 Make Your Presentation with Handout! 5 Free Response
SQL Part II: The SQL
24.1 More Filtering Practice Lesson
24.1.1 Initials 5 Exercise
24.1.2 Compound Queries with BETWEEN 5 Exercise
24.1.3 Gryffindors With G Names 5 Exercise
24.1.4 R First Names 5 Exercise
24.1.5 FF Houses 5 Exercise
24.2 Ordering Results Lesson
24.2.1 The ORDER BY Keyword 1 Video
24.2.2 ORDER BY 1 Notes
24.2.3 ORDER BY First Name 1 Example
24.2.4 Reverse Order 1 Example
24.2.5 Order By Multiple Fields 1 Example
24.2.6 House Ordering 5 Exercise
24.2.7 Sort the P Names 5 Exercise
24.3 Renaming Fields Lesson
24.3.1 Renaming Fields with AS 1 Notes
24.3.2 Renaming in the House Table 1 Example
24.3.3 Changing Column Names 5 Exercise
24.4 Joining Tables Lesson
24.4.1 The JOIN command 1 Video
24.4.2 Basic Joining 1 Notes
24.4.3 Letters and Numbers 1 Example
24.4.4 Person and House 1 Example
24.4.5 Person and House (Correct) 1 Example
24.4.6 Person and House (with namespacing) 1 Example
24.4.7 List All Gryffindors 5 Exercise
24.4.8 JOIN With Yourself 1 Video
24.4.9 Renaming Tables 1 Notes
24.4.10 Quidditch Matchups 1 Example
24.4.11 Quidditch Matchups: Ravenclaw Away Games 5 Exercise
24.5 More Joining Tables Lesson
24.5.1 The Course Table 1 Example
24.5.2 Courses and Professors 5 Exercise
24.5.3 Courses, Professors, and Houses 5 Exercise
24.5.4 Courses Taught By Gryffindors 5 Exercise
24.5.5 The Enrollment Table 1 Example
24.5.6 Students Taking Potions 5 Exercise
24.5.7 Non-Slytherins Taking Potions 5 Exercise
24.5.8 Defense Students by House 5 Exercise
24.5.9 Neville's Courses 5 Exercise
Web Development
25.1 Introduction to HTML Lesson
25.1.1 Introduction to HTML 1 Video
25.1.2 Introduction to HTML Quiz 1 Check for Understanding
25.1.3 Our First HTML Page 1 Example
25.1.4 Say Hello! 5 Exercise
25.2 Structure of an HTML Page Lesson
25.2.1 Structure of an HTML Page 1 Video
25.2.2 Structure of an HTML Page Quiz 1 Check for Understanding
25.2.3 HTML Template 1 Example
25.2.4 Hello World Page 1 Example
25.2.5 The <title> Tag 5 Exercise
25.2.6 Your First HTML Page 5 Exercise
25.2.7 Structure Badge 1 Badge
25.3 Formatting Text Lesson
25.3.1 Formatting Text 1 Video
25.3.2 Formatting Text Quiz 1 Check for Understanding
25.3.3 Dictionary 1 Example
25.3.4 That's Bold 5 Exercise
25.3.5 Artificial Intelligence 5 Exercise
25.3.6 State Capitals 5 Exercise
25.4 Links Lesson
25.4.1 Links 1 Video
25.4.2 Links Quiz 1 Check for Understanding
25.4.3 The <a> Tag 1 Example
25.4.4 Simple Link 5 Exercise
25.4.5 My Favorite Websites 5 Exercise
25.5 Images Lesson
25.5.1 Images 1 Video
25.5.2 Images Quiz 1 Check for Understanding
25.5.3 The <img> Tag 1 Example
25.5.4 Building the CodeHS Homepage 1 Example
25.5.5 Collage on a Theme 5 Exercise
25.5.6 Linking an Image 5 Exercise
25.5.7 Personal Library 5 Exercise
25.5.8 Images Badge 1 Badge
25.6 HTML Lists Lesson
25.6.1 HTML Lists 1 Video
25.6.2 HTML Lists Quiz 1 Check for Understanding
25.6.3 Grocery Shopping 1 Example
25.6.4 Favorite Things 5 Exercise
25.6.5 To-Do List 5 Exercise
25.6.6 List Article 5 Exercise
25.7 HTML Tables Lesson
25.7.1 HTML Tables 1 Video
25.7.2 HTML Tables Quiz 3 Check for Understanding
25.7.3 Address Book 1 Example
25.7.4 Favorite Songs 5 Exercise
25.7.5 Calendar 5 Exercise
25.8 HTML Styling Lesson
25.8.1 HTML Styling 1 Video
25.8.2 HTML Styling Quiz 1 Check for Understanding
25.8.3 Stylish Address Book 1 Example
25.8.4 Background Colors 5 Exercise
25.8.5 Style Your To-Do List 5 Exercise
25.9 Introduction to CSS Lesson
25.9.1 Introduction to CSS 1 Video
25.9.2 Introduction to CSS Quiz 2 Check for Understanding
25.9.3 Styling Your H1s 1 Example
25.9.4 First Style with CSS 5 Exercise
25.9.5 List Styling 5 Exercise
25.10 CSS Select by Tag Lesson
25.10.1 CSS Select by Tag 1 Video
25.10.2 CSS Select by Tag Quiz 1 Check for Understanding
25.10.3 Rainbow 1 Example
25.10.4 Dog Styling 1 Example
25.10.5 Restaurant Menu 5 Exercise
25.10.6 Put Karel Together 5 Exercise
25.11 CSS Select by Class Lesson
25.11.1 CSS Select by Class 1 Video
25.11.2 CSS Select by Class Quiz 1 Check for Understanding
25.11.3 Simple Checkerboard 1 Example
25.11.4 Tic Tac Toe 5 Exercise
25.11.5 Music Library 5 Exercise
25.12 CSS Select by ID Lesson
25.12.1 CSS Select by ID 1 Video
25.12.2 CSS Select by ID Quiz 1 Check for Understanding
25.12.3 Logo 1 Example
25.12.4 Favorite Dog 5 Exercise
25.12.5 Bingo 5 Exercise
25.12.6 CSS Badge 1 Badge
25.13 Viewing Websites Lesson
25.13.1 Viewing Websites 1 Video
25.13.2 Viewing Websites Quiz 5 Check for Understanding
25.13.3 Explaining a URL 5 Free Response
25.14 Web Development Quiz Lesson
25.14.1 Web Development Quiz 15 Unit Quiz
25.15 Your First Website Lesson
25.15.1 Set Up Your codehs.me Website 10 Challenge
25.15.2 Practice PT: Your First Website 10 Challenge
25.15.3 Website Badge 1 Badge
Midterm
26.1 Midterm Lesson
26.1.1 Midterm 15 Midterm
Extra
27.1 Lesson 1 Lesson
27.1.1 Compound Queries 5 Example
Cybersecurity Labs
28.1 Labs Lesson
28.1.1 Lab: Configuring a Computer 1 Resource
28.1.2 Lab: Design a Distribution Frame 5 Resource
28.2 Lab: Computer Disassembly Lesson
28.2.1 Lab: Computer Disassembly 5 Resource
28.2.2 Video: Disassemble a Computer 1 Connection
28.2.3 Article: Disassemble a Computer 5 Connection
28.3 Lab: SOHO Devices Lesson
28.3.1 SOHO Devices 1 Notes
28.3.2 Lab: Printer Settings 1 Resource
28.3.3 Sharing Devices 5 Free Response
28.4 Lab: Windows Networking Lesson
28.4.1 Lab: Windows Networking 1 Resource
28.4.2 Lab: Windows Networking w/Simulation 1 Resource
28.4.3 Windows Networking 1 Example
28.5 Lab: Mobile Device Connectivity Lesson
28.5.1 Mobile Device Features 1 Connection
28.5.2 Mobile Device Simulator 1 Notes
28.5.3 Lab: Mobile Device Connectivity 5 Resource