Please enable JavaScript to use CodeHS

Texas Foundations of Cybersecurity - Outline

  1. What is Cybersecurity?

    1. 1.1 Module Overview - Cybersecurity

    2. Video 1.1.1 Welcome to Cybersecurity
    3. Check for Understanding 1.1.2 Welcome to Cybersecurity
    4. Example 1.1.3 Intruder Alert!
    5. Free Response 1.1.4 Cybersecurity and You
    6. Free Response 1.1.5 Course Goals
    7. 1.2 What is Cybersecurity?

    8. Video 1.2.1 What is Cybersecurity?
    9. Check for Understanding 1.2.2 What is Cybersecurity?
    10. Connection 1.2.3 WannaCry Ransomware Attack
    11. Free Response 1.2.4 WannaCry Reflection
    12. Example 1.2.5 Ransomware Simulator
    13. Connection 1.2.6 Internet of Things
    14. Connection 1.2.7 Cybersecurity and Connected Cars
    15. Free Response 1.2.8 Internet of Things Reflection
    16. 1.3 Impact of Cybersecurity

    17. Video 1.3.1 Impact of Cybersecurity
    18. Check for Understanding 1.3.2 Impact of Cybersecurity
    19. Example 1.3.3 Phishing Simulator
    20. Connection 1.3.4 Yahoo! Attack
    21. Free Response 1.3.5 Yahoo! Reflection
    22. Connection 1.3.6 Fighting Cyber Crime
    23. Free Response 1.3.7 Cyber Crime Reflection
    24. Connection 1.3.8 FBI Cyber Crime
    25. Free Response 1.3.9 FBI Reflection
    26. 1.4 The CIA Triad

    27. Video 1.4.1 CIA Triad
    28. Check for Understanding 1.4.2 CIA Triad
    29. Free Response 1.4.3 Which part of the CIA Triad?
    30. Free Response 1.4.4 Which part of the CIA Triad?
    31. Free Response 1.4.5 Breach of Confidentiality
    32. Free Response 1.4.6 Breach of Availability
    33. Free Response 1.4.7 CIA Connections
    34. 1.5 What is Cybersecurity? Quiz

    35. Unit Quiz 1.5.1 What is Cybersecurity? Quiz
  2. Digital Citizenship and Cyber Hygiene

    1. 2.1 Digital Footprint and Reputation

    2. Video 2.1.1 Digital Footprint and Reputation
    3. Check for Understanding 2.1.2 Digital Footprint and Reputation
    4. Example 2.1.3 Social Media Clean-up
    5. Free Response 2.1.4 Building a Positive Digital Footprint
    6. Connection 2.1.5 Right to be Forgotten?
    7. Free Response 2.1.6 Right to be Forgotten
    8. Free Response 2.1.7 What is your Digital Footprint?
    9. 2.2 Cyberbullying

    10. Video 2.2.1 Cyberbullying
    11. Check for Understanding 2.2.2 Cyberbullying
    12. Free Response 2.2.3 Scenario: Student Ranking
    13. Free Response 2.2.4 Scenario: Singled Out
    14. Notes 2.2.5 United Against Cyberbullying: A Fictional Story
    15. Free Response 2.2.6 Reflection: United Against Cyberbullying
    16. Free Response 2.2.7 Stopping Cyberbullying
    17. 2.3 Internet Safety

    18. Video 2.3.1 Internet Safety
    19. Check for Understanding 2.3.2 Internet Safety
    20. Free Response 2.3.3 Scenario: School Stranger
    21. Free Response 2.3.4 Scenario: Vacation Pals
    22. Free Response 2.3.5 Staying Safe
    23. 2.4 Privacy & Security

    24. Video 2.4.1 What is Data Privacy & Security?
    25. Check for Understanding 2.4.2 Privacy & Security Quiz
    26. Connection 2.4.3 Google Privacy Policy Search
    27. Free Response 2.4.4 Google Privacy Policy Search
    28. Example 2.4.5 Guess: Password List
    29. Example 2.4.6 Guess: Using an Algorithm
    30. Example 2.4.7 Guess: Brute Force
    31. Connection 2.4.8 How Strong is your Password?
    32. Free Response 2.4.9 How Strong is your password?
    33. 2.5 Information Literacy

    34. Video 2.5.1 Information Literacy
    35. Check for Understanding 2.5.2 Information Literacy
    36. Free Response 2.5.3 Effective Internet Searches
    37. Connection 2.5.4 Evaluate the Source 1
    38. Free Response 2.5.5 Respond: Evaluate the Source 1
    39. Notes 2.5.6 Evaluate the Source 2
    40. Free Response 2.5.7 Respond: Evaluate the Source 2
    41. Connection 2.5.8 Hero Pig?
    42. Free Response 2.5.9 Respond: Hero Pig?
    43. 2.6 Creative Credit & Copyright

    44. Video 2.6.1 Creative Credit and Copyright
    45. Check for Understanding 2.6.2 Creative Credit and Copyright
    46. Free Response 2.6.3 Cite!
    47. Connection 2.6.4 Exploring Creative Commons
    48. Free Response 2.6.5 Respond: Creative Commons
    49. Free Response 2.6.6 Task: Finding Images
    50. Free Response 2.6.7 Reflection: Why is Copyright Important?
    51. 2.7 Hacking Ethics

    52. Video 2.7.1 Hacking Ethics & Legality
    53. Check for Understanding 2.7.2 Hacking Ethics & Legality
    54. Free Response 2.7.3 Reflection: White Hat vs Black Hat Hacking
    55. Connection 2.7.4 Penetration Testing
    56. Free Response 2.7.5 Reflection: Penetration Testing
    57. Connection 2.7.6 Hack the Pentagon?
    58. Free Response 2.7.7 Reflection: Hack the Pentagon
    59. Check for Understanding 2.7.8 Ethical Hacker Agreement
    60. 2.8 Digital Citizenship and Cybersecurity Quiz

    61. Unit Quiz 2.8.1 Digital Citizenship and Cyber Hygiene Quiz
  3. Project: Public Service Announcement

    1. 3.1 Project: Public Service Announcement

    2. Free Response 3.1.1 Pick a Topic
    3. Free Response 3.1.2 Research
    4. Free Response 3.1.3 Choose Your Audience
    5. Free Response 3.1.4 What kind of PSA?
    6. Free Response 3.1.5 Draft your PSA
    7. Free Response 3.1.6 Finalize your PSA!
  4. The ABCs of Cryptography

    1. 4.1 Cryptography, Cryptology, Cryptanalysis

    2. Video 4.1.1 Cryptography, Cryptology, Cryptanalysis
    3. Check for Understanding 4.1.2 Cryptography, Cryptology, Cryptanalysis
    4. Example 4.1.3 Cryptogram Game!
    5. Video 4.1.4 Why encrypt?
    6. Check for Understanding 4.1.5 Why encrypt?
    7. Example 4.1.6 Encrypt/Decrypt
    8. 4.2 History of Cryptography

    9. Video 4.2.1 Cryptography: A Brief History
    10. Check for Understanding 4.2.2 Cryptography History Quiz
    11. Connection 4.2.3 How the Enigma Worked
    12. Free Response 4.2.4 How the Enigma Worked
    13. Connection 4.2.5 Unknown Languages and the Future of Cryptography
    14. Free Response 4.2.6 The Future of Cybersecurity
    15. 4.3 Basic Crypto Systems: Caesar Cipher

    16. Video 4.3.1 Caesar Cipher
    17. Check for Understanding 4.3.2 Caesar Cipher
    18. Example 4.3.3 Caesar Cipher Encryption
    19. Example 4.3.4 Decrypt Caesar's Cipher!
    20. 4.4 Basic Crypto Systems: Cracking Caesar

    21. Video 4.4.1 Cracking Caesar Cipher
    22. Check for Understanding 4.4.2 Cracking Caesar Cipher
    23. Example 4.4.3 Cracking Caesar with Brute Force
    24. Example 4.4.4 Letter Frequency and Caesar
    25. Free Response 4.4.5 Examining Caesar Cipher
    26. 4.5 Basic Crypto Systems: Vigenere Cipher

    27. Video 4.5.1 Vigenere Cipher
    28. Check for Understanding 4.5.2 Vigenere Cipher
    29. Example 4.5.3 Vigenere Cipher Example
    30. Example 4.5.4 Letter Frequency and Vigenere Cipher
    31. Free Response 4.5.5 Examining Vigenere Cipher
    32. Example 4.5.6 Improving Vigenere
    33. 4.6 Hash Functions

    34. Video 4.6.1 Hash Functions
    35. Check for Understanding 4.6.2 Hash Functions
    36. Connection 4.6.3 Google Shattered Crypto Algorithm
    37. Free Response 4.6.4 Hash Functions in the News
    38. Video 4.6.5 What is a Checksum?
    39. Connection 4.6.6 Using a Hash Generator
    40. Free Response 4.6.7 Hash Generator
    41. Connection 4.6.8 Password Salting
    42. Free Response 4.6.9 Password Salting
    43. 4.7 Hash Function Development

    44. Video 4.7.1 Hash Function Development
    45. Check for Understanding 4.7.2 Hash Function Development
    46. Example 4.7.3 Modulo Math Calculator
    47. Example 4.7.4 Understanding Modulo Math
    48. Example 4.7.5 Modulo Game!
    49. Exercise 4.7.6 Develop a Simple Hash Function
    50. 4.8 Digital Certificates

    51. Video 4.8.1 Symmetric vs Asymmetric Encryption
    52. Notes 4.8.2 RSA
    53. Video 4.8.3 Digital Certificates
    54. Check for Understanding 4.8.4 Digital Certificates
    55. Connection 4.8.5 SSL Explained
    56. Free Response 4.8.6 SSL Explained
    57. Free Response 4.8.7 SSL Connection
    58. Connection 4.8.8 In The News
    59. Free Response 4.8.9 In The News Response
    60. Free Response 4.8.10 Become a Certificate Authority!
    61. 4.9 The ABCs of Cryptography Quiz

    62. Unit Quiz 4.9.1 The ABCs of Cryptography Quiz
  5. Project: Classic Cipher Newscast

    1. 5.1 Project: Classic Cipher Newscast

    2. Notes 5.1.1 Overview
    3. Notes 5.1.2 Investigate a Classic Cipher
    4. Free Response 5.1.3 Write the Script and Rehearse
    5. Free Response 5.1.4 Newscast Presentation
  6. System Administration

    1. 6.1 Operating Systems

    2. Video 6.1.1 Operating Systems
    3. Check for Understanding 6.1.2 Operating Systems Quiz
    4. Example 6.1.3 Detect My OS
    5. Example 6.1.4 Windows OS Installation Simulation
    6. Free Response 6.1.5 Installing an OS
    7. Connection 6.1.6 Upgrading a Mac OS
    8. 6.2 Comparing Operating Systems

    9. Video 6.2.1 Comparing Operating Systems
    10. Check for Understanding 6.2.2 Comparing Operating Systems Quiz
    11. Example 6.2.3 Windows Simulation
    12. Example 6.2.4 MacOS Simulation
    13. Connection 6.2.5 Choose a Linux Distro!
    14. Free Response 6.2.6 Which would you choose?
    15. 6.3 Compatibility

    16. Video 6.3.1 Compatibility
    17. Check for Understanding 6.3.2 Compatibility Quiz
    18. Example 6.3.3 What Processor? Windows
    19. Example 6.3.4 What Processor? Mac
    20. Free Response 6.3.5 What Processor are you running?
    21. 6.4 Software and Applications

    22. Video 6.4.1 Software and Applications
    23. Check for Understanding 6.4.2 Software and Applications Quiz
    24. Example 6.4.3 Spreadsheet Simulation
    25. Example 6.4.4 Messaging Simulation
    26. Example 6.4.5 Kanban Board Simulation
    27. Free Response 6.4.6 Software Simulations
    28. 6.5 Software Licenses

    29. Video 6.5.1 Software Licenses
    30. Check for Understanding 6.5.2 Software Licenses Quiz
    31. Free Response 6.5.3 Do I need a Software License?
    32. Free Response 6.5.4 Is This Original?
    33. 6.6 Application Security

    34. Video 6.6.1 Application Security
    35. Check for Understanding 6.6.2 Application Security
    36. Example 6.6.3 Windows Updates
    37. Connection 6.6.4 Windows Defender Antivirus
    38. Free Response 6.6.5 Windows Defender Antivirus
    39. Free Response 6.6.6 CodeHS System Restore
    40. 6.7 Browser Configuration

    41. Video 6.7.1 Browser Configuration
    42. Check for Understanding 6.7.2 Browser Configuration
    43. Connection 6.7.3 Cached CodeHS
    44. Free Response 6.7.4 Cached CodeHS
    45. Example 6.7.5 Is Your Popup Blocker On?
    46. Free Response 6.7.6 Browser Extensions Lab
    47. 6.8 System Administration

    48. Video 6.8.1 User Accounts
    49. Check for Understanding 6.8.2 User Accounts Quiz
    50. Free Response 6.8.3 User Accounts
    51. Free Response 6.8.4 Shared Folders and Files
    52. Video 6.8.5 Host Security
    53. Check for Understanding 6.8.6 Host Security Quiz
    54. Free Response 6.8.7 Security Baseline
    55. 6.9 Command Line Interface

    56. Notes 6.9.1 Linux/MacOS vs. Windows
    57. Video 6.9.2 Command Line Interface
    58. Check for Understanding 6.9.3 Command Line Interface Quiz
    59. Resource 6.9.4 Command Equivalents
    60. Video 6.9.5 Windows Command Prompt
    61. Free Response 6.9.6 Windows Command Prompt
    62. Free Response 6.9.7 Directory Directions
    63. Connection 6.9.8 Neural Interface?
    64. Free Response 6.9.9 Neural Interface?
    65. 6.10 System Administration Quiz

    66. Survey 6.10.1 Mindsets
    67. Unit Quiz 6.10.2 System Administration Quiz
  7. Software Security

    1. 7.1 Clients and Servers

    2. Video 7.1.1 Clients and Servers
    3. Check for Understanding 7.1.2 Clients and Servers
    4. Connection 7.1.3 Inside a Google Data Center
    5. Free Response 7.1.4 Inside a Google Data Center
    6. Connection 7.1.5 Cloud Vulnerabilities
    7. Free Response 7.1.6 Cloud Vulnerabilities Response
    8. Video 7.1.7 Client-Server Model
    9. Check for Understanding 7.1.8 Client-Server Model
    10. Connection 7.1.9 The Future of User Privacy
    11. Free Response 7.1.10 The Future of User Privacy
    12. 7.2 What is SQL?

    13. Notes 7.2.1 What is SQL Overview
    14. Video 7.2.2 Intro to SQL
    15. Check for Understanding 7.2.3 Quiz: What is SQL?
    16. Video 7.2.4 How to Structure Data in SQL
    17. Check for Understanding 7.2.5 How to Structure Data in SQL
    18. Example 7.2.6 SQL Tables
    19. Free Response 7.2.7 SQL Tables Response
    20. 7.3 Basic Querying in SQL

    21. Video 7.3.1 The SELECT Statement
    22. Check for Understanding 7.3.2 Basic Querying in SQL
    23. Example 7.3.3 Our First SELECT Statement
    24. Exercise 7.3.4 Your First SELECT Statement
    25. Video 7.3.5 More SELECT Statement
    26. Check for Understanding 7.3.6 More SELECT Statement
    27. Example 7.3.7 Selecting Specific Columns
    28. Exercise 7.3.8 Harry Potter Names
    29. 7.4 Common Security Problems

    30. Video 7.4.1 Common Security Problems
    31. Check for Understanding 7.4.2 Common Security Problems
    32. Connection 7.4.3 Meet Security Engineers at Google
    33. Free Response 7.4.4 Security Engineering Reflection
    34. Video 7.4.5 Living in a Digital World
    35. Free Response 7.4.6 Living in a Digital World
    36. 7.5 SQL Injection Overview

    37. Video 7.5.1 SQL Injection Overview
    38. Check for Understanding 7.5.2 SQL Injection Overview
    39. Connection 7.5.3 Equifax Security Breach
    40. Connection 7.5.4 Equifax Exposed Millions
    41. Free Response 7.5.5 Equifax SQL Injection Attack
    42. Example 7.5.6 SQLi
    43. 7.6 Types of SQLi and Prevention

    44. Video 7.6.1 Types of SQLi
    45. Check for Understanding 7.6.2 Types of SQLi
    46. Video 7.6.3 Preventing SQLi
    47. Check for Understanding 7.6.4 Preventing SQLi
    48. Connection 7.6.5 Mitigating SQL Injection
    49. Free Response 7.6.6 Reflection: Mitigating SQL Injection
    50. Connection 7.6.7 SQL Injection
    51. 7.7 Software Security Quiz

    52. Unit Quiz 7.7.1 Software Security Quiz
  8. Networking Fundamentals

    1. 8.1 Introduction to the Internet

    2. Video 8.1.1 Welcome to the Internet
    3. Check for Understanding 8.1.2 Intro to the Internet
    4. Connection 8.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 8.1.4 Connectivity Lab Reflection
    6. 8.2 Notational Systems

    7. Video 8.2.1 Number Systems
    8. Check for Understanding 8.2.2 Number Systems Quiz
    9. Notes 8.2.3 Number Base Tool
    10. Video 8.2.4 Decimal to Binary
    11. Check for Understanding 8.2.5 Decimal to Binary Quiz
    12. Exercise 8.2.6 Binary Game
    13. 8.3 Data Representation

    14. Video 8.3.1 Hexadecimal
    15. Check for Understanding 8.3.2 Hexadecimal Quiz
    16. Exercise 8.3.3 Binary to Hex Game
    17. Video 8.3.4 Encoding Text with Binary
    18. Check for Understanding 8.3.5 Encoding Text with Binary Quiz
    19. Example 8.3.6 Custom Encoding
    20. Example 8.3.7 Bits to ASCII
    21. Exercise 8.3.8 Hello World in Bits
    22. 8.4 Internet Hardware and Sending Information

    23. Video 8.4.1 Internet Hardware
    24. Check for Understanding 8.4.2 Internet Hardware
    25. Video 8.4.3 Sending Information
    26. Check for Understanding 8.4.4 Sending Information
    27. Connection 8.4.5 The Internet is in the Ocean
    28. Free Response 8.4.6 Internet in the Ocean Reflection
    29. 8.5 Internet Addresses

    30. Video 8.5.1 Internet Addresses
    31. Check for Understanding 8.5.2 Internet Addresses
    32. Free Response 8.5.3 The Need for Addresses
    33. Connection 8.5.4 IPv4 vs. IPv6
    34. Free Response 8.5.5 Reflection: IPv4 vs IPv6
    35. 8.6 Domain Name System (DNS)

    36. Video 8.6.1 Domain Name System (DNS)
    37. Check for Understanding 8.6.2 Domain Name System
    38. Connection 8.6.3 How Does DNS Work?
    39. Free Response 8.6.4 How Does DNS Work?
    40. 8.7 Routing

    41. Video 8.7.1 Routing
    42. Check for Understanding 8.7.2 Routing
    43. Free Response 8.7.3 Redundancy
    44. 8.8 Packets & Protocols

    45. Video 8.8.1 Packets
    46. Check for Understanding 8.8.2 Packets
    47. Video 8.8.3 Protocols
    48. Check for Understanding 8.8.4 Protocols
    49. Connection 8.8.5 How the Internet Works
    50. Free Response 8.8.6 The Journey of an Image
    51. 8.9 Protocols and Standards

    52. Video 8.9.1 Protocols
    53. Check for Understanding 8.9.2 Protocols Quiz
    54. Video 8.9.3 Standards
    55. Check for Understanding 8.9.4 Standards Quiz
    56. Connection 8.9.5 The New Wireless Standard
    57. Connection 8.9.6 801.11ax
    58. Free Response 8.9.7 801.11ax FR
    59. 8.10 Viewing a Webpage

    60. Video 8.10.1 Viewing a Webpage
    61. Check for Understanding 8.10.2 Viewing a Webpage
    62. Free Response 8.10.3 Explaining a URL
    63. Connection 8.10.4 Net Neutrality Explained
    64. Connection 8.10.5 FCCs Net Neutrality Rules Officially Repealed
    65. Free Response 8.10.6 Take a Side on Net Neutrality
    66. Connection 8.10.7 Net Neutrality and Cybersecurity
    67. Free Response 8.10.8 Net Neutrality and Cybersecurity Research
    68. 8.11 Access Control

    69. Video 8.11.1 Access Control
    70. Check for Understanding 8.11.2 Access Control
    71. Example 8.11.3 Multifactor Authentication
    72. Example 8.11.4 Two Factor Authentication
    73. Free Response 8.11.5 Two Factor Authentication Reflection
    74. Connection 8.11.6 RADIUS Overview with AAA Protocol
    75. Connection 8.11.7 RADIUS Server Access Control
    76. Free Response 8.11.8 RADIUS Reflection
    77. 8.12 Impact of the Internet

    78. Video 8.12.1 Impact of the Internet
    79. Check for Understanding 8.12.2 Impact of the Internet
    80. Connection 8.12.3 What is the Digital Divide?
    81. Free Response 8.12.4 What is the Digital Divide?
    82. 8.13 Networking Fundamentals Quiz

    83. Survey 8.13.1 Mindsets
    84. Unit Quiz 8.13.2 Networking Fundamentals Quiz
  9. IT Infrastructure

    1. 9.1 Internal Components

    2. Video 9.1.1 Internal Components
    3. Check for Understanding 9.1.2 Internal Components
    4. Connection 9.1.3 Build a Computer
    5. Free Response 9.1.4 Build a Computer
    6. Example 9.1.5 Test Your Brain's RAM!
    7. Free Response 9.1.6 Test Your Brain's RAM! Reflection
    8. 9.2 Peripheral Devices

    9. Video 9.2.1 Peripheral Devices
    10. Check for Understanding 9.2.2 Peripheral Devices
    11. Free Response 9.2.3 Personalized Peripherals
    12. Free Response 9.2.4 IT Help
    13. Free Response 9.2.5 Your Ideal Computer Setup
    14. 9.3 Network Devices

    15. Video 9.3.1 Network Devices
    16. Check for Understanding 9.3.2 Network Devices
    17. Connection 9.3.3 Speed Test
    18. Free Response 9.3.4 Speed Test
    19. Connection 9.3.5 Fiber Optics Bend Light!
    20. Free Response 9.3.6 Fiber Optics Bend Light!
    21. Connection 9.3.7 Ethernet Standards
    22. Free Response 9.3.8 Ethernet Standards
    23. Free Response 9.3.9 Network Troubleshooting
    24. 9.4 Storage Options

    25. Video 9.4.1 Storage Options
    26. Check for Understanding 9.4.2 Storage Options Quiz
    27. Connection 9.4.3 Security of Cloud Storage
    28. Free Response 9.4.4 Security of Cloud Storage
    29. Free Response 9.4.5 Storage Suggestions
    30. 9.5 Network Options

    31. Video 9.5.1 Network Options
    32. Check for Understanding 9.5.2 Network Options Quiz
    33. Connection 9.5.3 What is an SSID?
    34. Free Response 9.5.4 What is an SSID?
    35. Connection 9.5.5 Wireless Threats
    36. Free Response 9.5.6 Wireless Threats
    37. Free Response 9.5.7 Wireless Network Setup
    38. 9.6 Network Communication

    39. Video 9.6.1 Network Communication
    40. Check for Understanding 9.6.2 Network Communication Quiz
    41. Example 9.6.3 Setting up a Firewall
    42. Free Response 9.6.4 iptables
    43. Notes 9.6.5 iptables simulation
    44. 9.7 Network Management

    45. Notes 9.7.1 Linux/MacOS vs. Windows
    46. Video 9.7.2 Network Management
    47. Check for Understanding 9.7.3 Network Management Quiz
    48. Example 9.7.4 MacOS Terminal Simulation
    49. Example 9.7.5 Windows Command Prompt Simulation
    50. Video 9.7.6 Windows Command Prompt Spy
    51. Free Response 9.7.7 Windows Command Prompt Spy
    52. 9.8 Private Networks

    53. Video 9.8.1 IP and MAC Addresses
    54. Check for Understanding 9.8.2 IP and MAC Addresses Quiz
    55. Example 9.8.3 Intranet Permissions
    56. Free Response 9.8.4 Coffee Shop: Design an Intranet
    57. Video 9.8.5 DMZs and VPNs
    58. Check for Understanding 9.8.6 DMZs and VPNs Quiz
    59. Connection 9.8.7 Protecting Privacy with VPNs
    60. Free Response 9.8.8 Protecting Privacy with VPNs
    61. Free Response 9.8.9 Coffee Shop: Network Plan
    62. Free Response 9.8.10 Coffee Shop: Network Diagram
    63. Video 9.8.11 SOHO Network
    64. Example 9.8.12 Network Topologies
    65. 9.9 IT Infrastructure Quiz

    66. Unit Quiz 9.9.1 IT Infrastructure Quiz
  10. Project: Troubleshooting

    1. 10.1 Methodology

    2. Notes 10.1.1 Troubleshooting Methodology
    3. Free Response 10.1.2 Identify the Problem
    4. Free Response 10.1.3 Research Solutions
    5. Free Response 10.1.4 Establish a Theory
    6. Free Response 10.1.5 Test the Theory
    7. Free Response 10.1.6 Fix the Problem!
    8. 10.2 Support Practice

    9. Exercise 10.2.1 Signal Strength
    10. Exercise 10.2.2 Interference
  11. Project: IT Professional

    1. 11.1 Building a Resume

    2. Connection 11.1.1 What is a Resume?
    3. Free Response 11.1.2 What is a Resume?
    4. Connection 11.1.3 Explore Resume Layouts
    5. Free Response 11.1.4 Explore Resume Layouts
    6. Free Response 11.1.5 Draft Your Resume
    7. 11.2 Communication is Key!

    8. Notes 11.2.1 Do you have what it takes?
    9. Free Response 11.2.2 Cybersecurity Careers
    10. Free Response 11.2.3 Internships Exploration
    11. Connection 11.2.4 Customer Service Skills
    12. Free Response 11.2.5 Customer Service Skills
    13. Free Response 11.2.6 Act it Out!
    14. 11.3 Building a Knowledge Base

    15. Connection 11.3.1 What is a Knowledge Base?
    16. Free Response 11.3.2 Draft a KB Article
    17. Free Response 11.3.3 Share your KB Article
    18. Free Response 11.3.4 Finalize your KB Article
    19. 11.4 Star in a Video!

    20. Connection 11.4.1 Instructional Videos
    21. Free Response 11.4.2 Instructional Video Plan
    22. Free Response 11.4.3 Write the Script
    23. Free Response 11.4.4 Create the Storyboard
    24. Free Response 11.4.5 Record Your Video
  12. Project: Digital Forensics

    1. 12.1 Digital Forensics

    2. Video 12.1.1 Digital Forensics
    3. Connection 12.1.2 Student Success Story
    4. Free Response 12.1.3 Student Success Story Response
    5. 12.2 Forensic Case 1: Logs

    6. Notes 12.2.1 Network Logs
    7. Example 12.2.2 Network Log Evidence
    8. Free Response 12.2.3 Network Logs Conclusion
    9. 12.3 Forensic Case 2: File Metadata

    10. Notes 12.3.1 File Metadata
    11. Example 12.3.2 File Metadata Evidence
    12. Free Response 12.3.3 File Metadata Conclusion
    13. 12.4 Forensic Case 3: Exif Data

    14. Notes 12.4.1 Photo Exif
    15. Connection 12.4.2 Exif Using Inspector
    16. Example 12.4.3 Exif Using the CLI
    17. Free Response 12.4.4 Photo Exif Conclusion
  13. Cyber Defense

    1. 13.1 Network Attacks

    2. Video 13.1.1 Network Attacks Overview
    3. Check for Understanding 13.1.2 Network Attacks Quiz
    4. Notes 13.1.3 Check for Vulnerabilities
    5. Connection 13.1.4 Bug Bounty Hunting
    6. Free Response 13.1.5 Bug Bounty Hunting
    7. Connection 13.1.6 Common Port Targets
    8. Example 13.1.7 Port Scanner Simulation
    9. Free Response 13.1.8 Open Port Reflection
    10. 13.2 Malware Types and Prevention

    11. Video 13.2.1 Malware Types and Prevention
    12. Check for Understanding 13.2.2 Malware Types and Prevention
    13. Connection 13.2.3 How Anti-malware Works
    14. Free Response 13.2.4 How Anti-malware Works
    15. Free Response 13.2.5 OS Malware Security
    16. Free Response 13.2.6 Reverse Engineering Malware
    17. Connection 13.2.7 Cyberterrorism
    18. Free Response 13.2.8 Cyberterrorism Response
    19. 13.3 Common Network Attacks

    20. Video 13.3.1 Common Network Attacks
    21. Check for Understanding 13.3.2 Network Attacks
    22. Connection 13.3.3 Social Engineering Hack
    23. Free Response 13.3.4 Social Engineering Reflection
    24. Connection 13.3.5 DDoS Attacks
    25. Example 13.3.6 DDoS Simulation
    26. Free Response 13.3.7 DDoS Reflection
    27. 13.4 Additional Attacks

    28. Video 13.4.1 Additional Attacks
    29. Check for Understanding 13.4.2 Additional Attacks Quiz
    30. Connection 13.4.3 Botnet Attacks - Mirai
    31. Connection 13.4.4 Botnet Attacks - 3ve
    32. Connection 13.4.5 Botnet Attacks - 3ve Video
    33. Free Response 13.4.6 Botnet Attacks - Reflection
    34. Connection 13.4.7 Zero-day Exploit: Stuxnet
    35. Notes 13.4.8 Zero-day Exploit: Stuxnet
    36. Free Response 13.4.9 Zero-day Exploit Reflection
    37. Free Response 13.4.10 US-CERT Current Activity
    38. 13.5 Cross-site Scripting

    39. Video 13.5.1 Cross-site Scripting
    40. Check for Understanding 13.5.2 Cross-site Scripting
    41. Connection 13.5.3 XSS Bug in Yahoo Mail
    42. Free Response 13.5.4 XSS Bug in Yahoo Mail
    43. Notes 13.5.5 XSS Demo Overview
    44. Connection 13.5.6 Hacksplaining XSS Demo
    45. Connection 13.5.7 Google's Tutorial for XSS
    46. Free Response 13.5.8 XSS Reflection
    47. 13.6 Internal Threats

    48. Video 13.6.1 Internal Threats
    49. Check for Understanding 13.6.2 Internal Threats
    50. Connection 13.6.3 BIOS/UEFI Attack Example
    51. Notes 13.6.4 Accessing BIOS/UEFI
    52. Connection 13.6.5 Causes of Data Breaches
    53. Free Response 13.6.6 Causes of Data Breaches
    54. Connection 13.6.7 Protecting Data at All Times
    55. Free Response 13.6.8 Protecting Data at All Times
    56. Connection 13.6.9 Air Gapped Computers
    57. Free Response 13.6.10 Air Gapped Computers Response
    58. 13.7 Cyber Defense Quiz

    59. Unit Quiz 13.7.1 Cyber Defense Quiz
  14. Project: Put it in Writing!

    1. 14.1 Level 1: Entry Event

    2. Free Response 14.1.1 Company Development
    3. Free Response 14.1.2 Level 1: Attack!
    4. Video 14.1.3 Level 1: Project Overview
    5. Connection 14.1.4 Put It In Writing! Rubric
    6. 14.2 Level 2: User Training

    7. Free Response 14.2.1 User Training Policy Development
    8. Free Response 14.2.2 Challenge: Employee Negligence 1
    9. Free Response 14.2.3 Challenge: Employee Negligence 2
    10. Free Response 14.2.4 Level 2 Debrief
    11. 14.3 Level 3: Incident Response

    12. Connection 14.3.1 Incident Response Plan Template
    13. Free Response 14.3.2 Incident Response Plan Link
    14. Free Response 14.3.3 Challenge: Cyber Attack!
    15. Free Response 14.3.4 Level 3 Debrief
    16. 14.4 Level 4: Data and Licenses

    17. Video 14.4.1 Data and Licenses
    18. Connection 14.4.2 FTC Data Security Guide
    19. Connection 14.4.3 Data Policy Template
    20. Free Response 14.4.4 Data Policy Link
    21. Free Response 14.4.5 Challenge: Data Breach 1
    22. Free Response 14.4.6 Challenge: Data Breach 2
    23. Free Response 14.4.7 Challenge: Data Breach 3
    24. Free Response 14.4.8 Level 4 Debrief
    25. 14.5 Level 5: Change Management

    26. Video 14.5.1 Change Management
    27. Connection 14.5.2 Change Management Plan
    28. Free Response 14.5.3 Change Management Plan Link
  15. Risk Management

    1. 15.1 Identifying Risks

    2. Video 15.1.1 Identifying Risks
    3. Check for Understanding 15.1.2 Identifying Risks Quiz
    4. Connection 15.1.3 What is a Honeypot?
    5. Connection 15.1.4 Honeypot Attacks
    6. Free Response 15.1.5 Honeypot Attacks
    7. Connection 15.1.6 Whois
    8. Free Response 15.1.7 Whois
    9. Connection 15.1.8 Packet Sniffing
    10. Free Response 15.1.9 Packet Sniffing Response
    11. Free Response 15.1.10 Breach Trends
    12. 15.2 Assessing Risks

    13. Notes 15.2.1 Assessing Risks
    14. Free Response 15.2.2 Malware Risk Assessment
    15. Free Response 15.2.3 Poor Password Assessment
    16. Free Response 15.2.4 Social Engineering Assessment
    17. Video 15.2.5 Assessing Risks
    18. Check for Understanding 15.2.6 Assessing Risks Quiz
    19. Connection 15.2.7 End-of-Life OS
    20. Free Response 15.2.8 End-of-Life Proposal
    21. Example 15.2.9 Input Handling
    22. Free Response 15.2.10 Input Handling Responses
    23. Example 15.2.11 Input Validation
    24. Free Response 15.2.12 Input Validation Responses
    25. 15.3 Risk Response

    26. Video 15.3.1 Risk Response
    27. Check for Understanding 15.3.2 Risk Response
    28. Free Response 15.3.3 Defense in Depth Risk Mitigation
    29. Connection 15.3.4 Sample Risk Assessment Report
    30. Free Response 15.3.5 Sample Risk Assessment Reflection
    31. Connection 15.3.6 Delta Outage Video
    32. Free Response 15.3.7 Delta Outage Reflection
    33. Connection 15.3.8 What Happens When Your Servers Go Down
    34. Free Response 15.3.9 What Happens When Your Servers Go Down Reflection
    35. Free Response 15.3.10 Server Upgrade Memo
    36. 15.4 Penetration Testing

    37. Video 15.4.1 Penetration Testing
    38. Check for Understanding 15.4.2 Penetration Testing
    39. Connection 15.4.3 Penetration Test Report
    40. Free Response 15.4.4 Penetration Test Report
    41. Notes 15.4.5 Chaos Engineering
    42. Free Response 15.4.6 Chaos Engineering Reflection
    43. Resource 15.4.7 Pen Test Simulation Handout
    44. Exercise 15.4.8 Pen Test Simulation: Active Recon
    45. Exercise 15.4.9 Pen Test Simulation: Exploit Vulnerabilities
    46. 15.5 Risk Management Quiz

    47. Unit Quiz 15.5.1 Risk Management Quiz
  16. Project: The Game of Risk

    1. 16.1 The Game of Risk

    2. Notes 16.1.1 Group Project Intro
    3. Free Response 16.1.2 Brainstorm: SLE
    4. Free Response 16.1.3 Brainstorm: Materials
    5. Free Response 16.1.4 Prototype Game and Instructions
    6. Free Response 16.1.5 Test Your Game!
    7. Resource 16.1.6 Testing Feedback Form
    8. Free Response 16.1.7 Create Your Final Version!
  17. Final Exam

    1. 17.1 Final Exam

    2. Final 17.1.1 Final Exam
  18. Introduction to Cybersecurity Pretest

    1. 18.1 Introduction to Cybersecurity Pretest

    2. Notes 18.1.1 About the Pretest
    3. Survey 18.1.2 Mindsets
    4. Quiz 18.1.3 Introduction to Cybersecurity Knowledge & Skills
  19. Introduction to Cybersecurity Posttest

    1. 19.1 Introduction to Cybersecurity Posttest

    2. Notes 19.1.1 About the Posttest
    3. Survey 19.1.2 Mindsets
    4. Quiz 19.1.3 Introduction to Cybersecurity Knowledge & Skills
  20. Programming Fundamentals

    1. 20.1 Programming Concepts

    2. Video 20.1.1 Programming Concepts
    3. Check for Understanding 20.1.2 Programming Concepts Quiz
    4. Connection 20.1.3 Compilers vs. Interpreters
    5. Free Response 20.1.4 Compilers vs. Interpreters
    6. Example 20.1.5 Variables in Action
    7. Example 20.1.6 Data Types using Typeof
    8. Example 20.1.7 Basic Variables
    9. Exercise 20.1.8 Daily Activities
    10. 20.2 Programming with Karel

    11. Notes 20.2.1 Learning to Program
    12. Video 20.2.2 Programming With Karel
    13. Check for Understanding 20.2.3 Quiz: Karel Commands
    14. Example 20.2.4 Our First Karel Program
    15. Exercise 20.2.5 Your First Karel Program
    16. Video 20.2.6 Functions in Karel
    17. Check for Understanding 20.2.7 Functions in Karel Quiz
    18. Example 20.2.8 Turn Around
    19. Example 20.2.9 Digging Karel
    20. Exercise 20.2.10 Backflip
    21. 20.3 Looping

    22. Video 20.3.1 For Loops
    23. Check for Understanding 20.3.2 For Loops Quiz
    24. Example 20.3.3 Take 'em All
    25. Example 20.3.4 For Loop Square
    26. Exercise 20.3.5 Lots of Hurdles
    27. Video 20.3.6 While Loops in Karel
    28. Check for Understanding 20.3.7 While Loops in Karel Quiz
    29. Example 20.3.8 Move to Wall
    30. Example 20.3.9 Big Tower
    31. Exercise 20.3.10 Follow The Yellow Ball Road
    32. 20.4 Branching

    33. Video 20.4.1 If/Else Statements
    34. Check for Understanding 20.4.2 If/Else Statements Quiz
    35. Example 20.4.3 If/Else Statements
    36. Example 20.4.4 One Ball in Each Spot
    37. Exercise 20.4.5 Right Side Up
    38. Badge 20.4.6 Programming with Karel Badge
    39. 20.5 Arrays and Objects

    40. Notes 20.5.1 More JS Topics
    41. Video 20.5.2 Arrays and Objects
    42. Check for Understanding 20.5.3 Arrays and Objects
    43. Example 20.5.4 Making an Array
    44. Exercise 20.5.5 List of Places to Travel
    45. Exercise 20.5.6 List of Prime Numbers
    46. Example 20.5.7 Phonebook
    47. Exercise 20.5.8 Sidekicks
    48. 20.6 Organizational Techniques

    49. Video 20.6.1 Organizational Techniques
    50. Check for Understanding 20.6.2 Organizational Techniques Quiz
    51. Example 20.6.3 Hurdle Karel
    52. Exercise 20.6.4 One Ball in Each Spot
    53. Exercise 20.6.5 The Two Towers
    54. Example 20.6.6 Interactive Sequence Diagram
    55. 20.7 Programming Fundamentals Quiz

    56. Survey 20.7.1 Mindsets
    57. Unit Quiz 20.7.2 Programming Fundamentals Quiz
  21. Cryptocurrency

    1. 21.1 What is Currency?

    2. Video 21.1.1 What is Currency?
    3. Check for Understanding 21.1.2 What is Currency?
    4. Connection 21.1.3 What Gives Paper Money Its Actual Value
    5. Free Response 21.1.4 What Gives Money Its Value
    6. Resource 21.1.5 Money: What is it Good For?
    7. 21.2 What is Cryptocurrency?

    8. Video 21.2.1 Cryptocurrency Basics
    9. Check for Understanding 21.2.2 Cryptocurrency Basics
    10. Video 21.2.3 Cryptocurrency Module Overview
    11. Connection 21.2.4 Cryptocurrencies Might Help Developing Countries
    12. Free Response 21.2.5 Cryptocurrencies are Helping Developing Countries
    13. Resource 21.2.6 Show Me the Money
    14. Free Response 21.2.7 American Currency Exhibit
    15. 21.3 Intro to Blockchain

    16. Video 21.3.1 Intro to Blockchain
    17. Check for Understanding 21.3.2 Intro to Blockchain
    18. Connection 21.3.3 CryptoKitties
    19. Free Response 21.3.4 CryptoKitties
    20. 21.4 Hashing

    21. Video 21.4.1 Hashing
    22. Check for Understanding 21.4.2 Hashing
    23. Connection 21.4.3 SHA256 Hash Generator
    24. Free Response 21.4.4 Using the SHA256 Hash Generator
    25. 21.5 Proof of Work

    26. Video 21.5.1 Proof of Work
    27. Check for Understanding 21.5.2 Proof of Work
    28. Video 21.5.3 Mining the Block
    29. Check for Understanding 21.5.4 Mining the Block
    30. Connection 21.5.5 PoW vs. Proof of Stake
    31. Free Response 21.5.6 PoW vs. PoS
    32. Resource 21.5.7 Checking Proof of Work
    33. 21.6 Advanced Blockchain

    34. Video 21.6.1 Advanced Blockchain (part 1)
    35. Check for Understanding 21.6.2 Advanced Blockchain (part 1)
    36. Connection 21.6.3 Blockchain Buzz
    37. Free Response 21.6.4 Blockchain Buzz
    38. Video 21.6.5 Advanced Blockchain (part 2)
    39. Free Response 21.6.6 Advanced Blockchain (part 2)
    40. Resource 21.6.7 Make a Blockchain
    41. Connection 21.6.8 SUPPLEMENTARY: How to TimeStamp a Document
    42. 21.7 Cryptocurrencies

    43. Video 21.7.1 Cryptocurrencies
    44. Check for Understanding 21.7.2 Cryptocurrencies
    45. Free Response 21.7.3 Shiny Toy Phenomenon
    46. Connection 21.7.4 Walmart Using Blockchain to Stop Spread of Disease
    47. Free Response 21.7.5 Walmart Use of Blockchain
    48. 21.8 Bitcoin

    49. Video 21.8.1 Bitcoin
    50. Check for Understanding 21.8.2 Bitcoin
    51. Connection 21.8.3 51% Attack Explained
    52. Free Response 21.8.4 51% Attack
    53. Connection 21.8.5 Why the Bitcoin Bubble will Burst in 2018
    54. Free Response 21.8.6 Bitcoin Bust
    55. Resource 21.8.7 Explore the Bitcoin Blockchain
    56. 21.9 Pros, Cons, and Future of Cryptocurrencies

    57. Video 21.9.1 Pros, Cons, and Future of Cryptocurrencies
    58. Check for Understanding 21.9.2 Pros, Cons and Future of Cryptocurrencies
    59. Free Response 21.9.3 Pros, Cons and future of Cryptocurrencies
    60. Connection 21.9.4 Cryptocurrency Pros and Cons
    61. Free Response 21.9.5 Crypto Pros and Cons
    62. Connection 21.9.6 What is HODL?
    63. Free Response 21.9.7 What is HODL?
    64. Free Response 21.9.8 Pros, Cons, and Future of Cryptocurrencies
    65. 21.10 Project: Cryptocurrency Expert Panel Talk

    66. Free Response 21.10.1 Overview
    67. Free Response 21.10.2 Preview Sample Expert Panels
    68. Free Response 21.10.3 Investigate a Cryptocurrency Topic
    69. Free Response 21.10.4 Write an Outline and Rehearse
    70. Free Response 21.10.5 Expert Panel Talk (Presentation)
    71. 21.11 Cryptocurrency Quiz

    72. Unit Quiz 21.11.1 Cryptocurrency Quiz
    73. Badge 21.11.2 Cryptocurrency Badge
  22. Final Course Project

    1. 22.1 Final Course Project

    2. Notes 22.1.1 Choose Your Own Adventure
    3. Free Response 22.1.2 Choose Your Adventure
    4. Free Response 22.1.3 Research
    5. Free Response 22.1.4 Choose Your Target Audience
    6. Free Response 22.1.5 Draft Your Presentation
    7. Free Response 22.1.6 Draft Your Flyer
    8. Free Response 22.1.7 Make Your Presentation with Handout!
  23. SQL Part II: The SQL

    1. 23.1 More Filtering Practice

    2. Exercise 23.1.1 Initials
    3. Exercise 23.1.2 Compound Queries with BETWEEN
    4. Exercise 23.1.3 Gryffindors With G Names
    5. Exercise 23.1.4 R First Names
    6. Exercise 23.1.5 FF Houses
    7. 23.2 Ordering Results

    8. Video 23.2.1 The ORDER BY Keyword
    9. Notes 23.2.2 ORDER BY
    10. Example 23.2.3 ORDER BY First Name
    11. Example 23.2.4 Reverse Order
    12. Example 23.2.5 Order By Multiple Fields
    13. Exercise 23.2.6 House Ordering
    14. Exercise 23.2.7 Sort the P Names
    15. 23.3 Renaming Fields

    16. Notes 23.3.1 Renaming Fields with AS
    17. Example 23.3.2 Renaming in the House Table
    18. Exercise 23.3.3 Changing Column Names
    19. 23.4 Joining Tables

    20. Video 23.4.1 The JOIN command
    21. Notes 23.4.2 Basic Joining
    22. Example 23.4.3 Letters and Numbers
    23. Example 23.4.4 Person and House
    24. Example 23.4.5 Person and House (Correct)
    25. Example 23.4.6 Person and House (with namespacing)
    26. Exercise 23.4.7 List All Gryffindors
    27. Video 23.4.8 JOIN With Yourself
    28. Notes 23.4.9 Renaming Tables
    29. Example 23.4.10 Quidditch Matchups
    30. Exercise 23.4.11 Quidditch Matchups: Ravenclaw Away Games
    31. 23.5 More Joining Tables

    32. Example 23.5.1 The Course Table
    33. Exercise 23.5.2 Courses and Professors
    34. Exercise 23.5.3 Courses, Professors, and Houses
    35. Exercise 23.5.4 Courses Taught By Gryffindors
    36. Example 23.5.5 The Enrollment Table
    37. Exercise 23.5.6 Students Taking Potions
    38. Exercise 23.5.7 Non-Slytherins Taking Potions
    39. Exercise 23.5.8 Defense Students by House
    40. Exercise 23.5.9 Neville's Courses
  24. Web Development

    1. 24.1 Introduction to HTML

    2. Video 24.1.1 Introduction to HTML
    3. Check for Understanding 24.1.2 Introduction to HTML Quiz
    4. Example 24.1.3 Our First HTML Page
    5. Exercise 24.1.4 Say Hello!
    6. 24.2 Structure of an HTML Page

    7. Video 24.2.1 Structure of an HTML Page
    8. Check for Understanding 24.2.2 Structure of an HTML Page Quiz
    9. Example 24.2.3 HTML Template
    10. Example 24.2.4 Hello World Page
    11. Exercise 24.2.5 The <title> Tag
    12. Exercise 24.2.6 Your First HTML Page
    13. Badge 24.2.7 Structure Badge
    14. 24.3 Formatting Text

    15. Video 24.3.1 Formatting Text
    16. Check for Understanding 24.3.2 Formatting Text Quiz
    17. Example 24.3.3 Dictionary
    18. Exercise 24.3.4 That's Bold
    19. Exercise 24.3.5 Artificial Intelligence
    20. Exercise 24.3.6 State Capitals
    21. 24.4 Links

    22. Video 24.4.1 Links
    23. Check for Understanding 24.4.2 Links Quiz
    24. Example 24.4.3 The <a> Tag
    25. Exercise 24.4.4 Simple Link
    26. Exercise 24.4.5 My Favorite Websites
    27. 24.5 Images

    28. Video 24.5.1 Images
    29. Check for Understanding 24.5.2 Images Quiz
    30. Example 24.5.3 The <img> Tag
    31. Example 24.5.4 Building the CodeHS Homepage
    32. Exercise 24.5.5 Collage on a Theme
    33. Exercise 24.5.6 Linking an Image
    34. Exercise 24.5.7 Personal Library
    35. Badge 24.5.8 Images Badge
    36. 24.6 HTML Lists

    37. Video 24.6.1 HTML Lists
    38. Check for Understanding 24.6.2 HTML Lists Quiz
    39. Example 24.6.3 Grocery Shopping
    40. Exercise 24.6.4 Favorite Things
    41. Exercise 24.6.5 To-Do List
    42. Exercise 24.6.6 List Article
    43. 24.7 HTML Tables

    44. Video 24.7.1 HTML Tables
    45. Check for Understanding 24.7.2 HTML Tables Quiz
    46. Example 24.7.3 Address Book
    47. Exercise 24.7.4 Favorite Songs
    48. Exercise 24.7.5 Calendar
    49. 24.8 HTML Styling

    50. Video 24.8.1 HTML Styling
    51. Check for Understanding 24.8.2 HTML Styling Quiz
    52. Example 24.8.3 Stylish Address Book
    53. Exercise 24.8.4 Background Colors
    54. Exercise 24.8.5 Style Your To-Do List
    55. 24.9 Introduction to CSS

    56. Video 24.9.1 Introduction to CSS
    57. Check for Understanding 24.9.2 Introduction to CSS Quiz
    58. Example 24.9.3 Styling Your H1s
    59. Exercise 24.9.4 First Style with CSS
    60. Exercise 24.9.5 List Styling
    61. 24.10 CSS Select by Tag

    62. Video 24.10.1 CSS Select by Tag
    63. Check for Understanding 24.10.2 CSS Select by Tag Quiz
    64. Example 24.10.3 Rainbow
    65. Example 24.10.4 Dog Styling
    66. Exercise 24.10.5 Restaurant Menu
    67. Exercise 24.10.6 Put Karel Together
    68. 24.11 CSS Select by Class

    69. Video 24.11.1 CSS Select by Class
    70. Check for Understanding 24.11.2 CSS Select by Class Quiz
    71. Example 24.11.3 Simple Checkerboard
    72. Exercise 24.11.4 Tic Tac Toe
    73. Exercise 24.11.5 Music Library
    74. 24.12 CSS Select by ID

    75. Video 24.12.1 CSS Select by ID
    76. Check for Understanding 24.12.2 CSS Select by ID Quiz
    77. Example 24.12.3 Logo
    78. Exercise 24.12.4 Favorite Dog
    79. Exercise 24.12.5 Bingo
    80. Badge 24.12.6 CSS Badge
    81. 24.13 Viewing Websites

    82. Video 24.13.1 Viewing Websites
    83. Check for Understanding 24.13.2 Viewing Websites Quiz
    84. Free Response 24.13.3 Explaining a URL
    85. 24.14 Web Development Quiz

    86. Unit Quiz 24.14.1 Web Development Quiz
    87. 24.15 Your First Website

    88. Challenge 24.15.1 Set Up Your codehs.me Website
    89. Challenge 24.15.2 Practice PT: Your First Website
    90. Badge 24.15.3 Website Badge
  25. Midterm

    1. 25.1 Midterm

    2. Midterm 25.1.1 Midterm
  26. Extra

    1. 26.1 Lesson 1

    2. Example 26.1.1 Compound Queries
  27. Embedded Correlations

    1. 27.1 Embedded Correlations

    2. Article 27.1.1 Embedded Correlations
  28. Cybersecurity Level 1 Certification Practice

    1. 28.1 Practice #1: Programming and Software Security

    2. Quiz 28.1.1 Quiz: Programming and Software Security
    3. Notes 28.1.2 Practice #1 Reflection
    4. 28.2 Practice #2: IT Infrastructure + Networks

    5. Quiz 28.2.1 Quiz: IT Infrastructure and Networks
    6. Notes 28.2.2 Practice #2 Reflection
    7. 28.3 Practice #3: Digital Citizenship + Cybersecurity

    8. Quiz 28.3.1 Quiz: Digital Citizenship + Cybersecurity
    9. Notes 28.3.2 Practice #3 Reflection
    10. 28.4 Practice #4: System Admin and Cryptography

    11. Quiz 28.4.1 Quiz: System Admin and Cryptography
    12. Notes 28.4.2 Practice #4 Reflection
    13. 28.5 Mixed Practice Test

    14. Notes 28.5.1 Important Note
    15. Quiz 28.5.2 Mixed Practice
    16. Notes 28.5.3 Mixed Practice Reflection