Please enable JavaScript to use CodeHS


Advanced Cybersecurity

Lessons

  1. Advanced Cryptography

    1. 1.1 Welcome to Advanced Cybersecurity!

    2. Description
    3. Objective
    4. 1.2 Encryption Algorithms

    5. Description
    6. Objective
    7. 1.3 Advanced Cryptography

    8. Description
    9. Objective
    10. 1.4 Hash Functions

    11. Description
    12. Objective
    13. 1.5 Hash Function Development

    14. Description
    15. Objective
    16. 1.6 Asymmetric Encryption

    17. Description
    18. Objective
    19. 1.7 Digital Certificates

    20. Description
    21. Objective
    22. 1.8 Advanced Cryptography Quiz

    23. Description
    24. Objective
  2. Project: Steganography

    1. 2.1 Project: Steganography

    2. Description
    3. Objective
  3. Advanced Networking

    1. 3.1 Network Administrator

    2. Description
    3. Objective
    4. 3.2 Environmental Controls

    5. Description
    6. Objective
    7. 3.3 Protocols and Standards

    8. Description
    9. Objective
    10. 3.4 Private Networks

    11. Description
    12. Objective
    13. 3.5 Mobile Devices

    14. Description
    15. Objective
    16. 3.6 Access Control

    17. Description
    18. Objective
    19. 3.7 Advanced Networking Quiz

    20. Description
    21. Objective
  4. Project: IT Professional

    1. 4.1 Communication is Key!

    2. Description
    3. Objective
    4. 4.2 Building a Knowledge Base

    5. Description
    6. Objective
    7. 4.3 Star in a Video!

    8. Description
    9. Objective
  5. Cyber Defense

    1. 5.1 Network Attacks

    2. Description
    3. Objective
    4. 5.2 Malware Types and Prevention

    5. Description
    6. Objective
    7. 5.3 Common Network Attacks

    8. Description
    9. Objective
    10. 5.4 Additional Attacks

    11. Description
    12. Objective
    13. 5.5 Cross-site Scripting

    14. Description
    15. Objective
    16. 5.6 Internal Threats

    17. Description
    18. Objective
    19. 5.7 Cyber Defense Quiz

    20. Description
    21. Objective
  6. Project: Security Assessment Report

    1. 6.1 Project Security Assessment Report

    2. Description
    3. Objective
  7. Project: Put it in Writing!

    1. 7.1 Level 1: Entry Event

    2. Description
    3. Objective
    4. 7.2 Level 2: User Training

    5. Description
    6. Objective
    7. 7.3 Level 3: Incident Response

    8. Description
    9. Objective
    10. 7.4 Level 4: Data and Licenses

    11. Description
    12. Objective
    13. 7.5 Level 5: Change Management

    14. Description
    15. Objective
  8. Risk Management

    1. 8.1 Identifying Risks

    2. Description
    3. Objective
    4. 8.2 Assessing Risks

    5. Description
    6. Objective
    7. 8.3 Risk Response

    8. Description
    9. Objective
    10. 8.4 Penetration Testing

    11. Description
    12. Objective
    13. 8.5 Risk Management Quiz

    14. Description
    15. Objective
  9. Project: The Game of Risk

    1. 9.1 The Game of Risk

    2. Description
    3. Objective
  10. Midterm

    1. 10.1 Midterm

    2. Description
    3. Objective
  11. Final Exam

    1. 11.1 Final Exam

    2. Description
    3. Objective
  12. What's Next?

    1. 12.1 After Advanced Cybersecurity

    2. Description
    3. Objective
  13. Cryptocurrency

    1. 13.1 What is Currency?

    2. Description
    3. Objective
    4. 13.2 What is Cryptocurrency?

    5. Description
    6. Objective
    7. 13.3 Intro to Blockchain

    8. Description
    9. Objective
    10. 13.4 Hashing

    11. Description
    12. Objective
    13. 13.5 Proof of Work

    14. Description
    15. Objective
    16. 13.6 Advanced Blockchain

    17. Description
    18. Objective
    19. 13.7 Cryptocurrencies

    20. Description
    21. Objective
    22. 13.8 Bitcoin

    23. Description
    24. Objective
    25. 13.9 Pros, Cons, and Future of Cryptocurrencies

    26. Description
    27. Objective
    28. 13.10 Project: Cryptocurrency Expert Panel Talk

    29. Description
    30. Objective
    31. 13.11 Cryptocurrency Quiz

    32. Description
    33. Objective
  14. Web Development

    1. 14.1 Introduction to HTML

    2. Description
    3. Objective
    4. 14.2 Structure of an HTML Page

    5. Description
    6. Objective
    7. 14.3 Formatting Text

    8. Description
    9. Objective
    10. 14.4 Links

    11. Description
    12. Objective
    13. 14.5 Images

    14. Description
    15. Objective
    16. 14.6 HTML Lists

    17. Description
    18. Objective
    19. 14.7 HTML Tables

    20. Description
    21. Objective
    22. 14.8 HTML Styling

    23. Description
    24. Objective
    25. 14.9 Introduction to CSS

    26. Description
    27. Objective
    28. 14.10 CSS Select by Tag

    29. Description
    30. Objective
    31. 14.11 CSS Select by Class

    32. Description
    33. Objective
    34. 14.12 CSS Select by ID

    35. Description
    36. Objective
    37. 14.13 Viewing Websites

    38. Description
    39. Objective
    40. 14.14 Web Development Quiz

    41. Description
    42. Objective
    43. 14.15 Your First Website

    44. Description
    45. Objective
  15. SQL Part II: The SQL

    1. 15.1 More Filtering Practice

    2. Description
    3. Objective
    4. 15.2 Ordering Results

    5. Description
    6. Objective
    7. 15.3 Renaming Fields

    8. Description
    9. Objective
    10. 15.4 Joining Tables

    11. Description
    12. Objective
    13. 15.5 More Joining Tables

    14. Description
    15. Objective
  16. More Cyber Topics

    1. 16.1 Advanced Networking

    2. Description
    3. Objective
  17. Cybersecurity Labs

    1. 17.1 Labs

    2. Description
    3. Objective
    4. 17.2 Lab: Computer Disassembly

    5. Description
    6. Objective
    7. 17.3 Lab: SOHO Devices

    8. Description
    9. Objective
    10. 17.4 Lab: Windows Networking

    11. Description
    12. Objective
    13. 17.5 Lab: Mobile Device Connectivity

    14. Description
    15. Objective
  18. Cloud Computing

    1. 18.1 Different Types of Cloud Computing

    2. Description
    3. Objective
  19. Cybersecurity Level 2 Certification Practice

    1. 19.1 Practice #1: Advanced Cryptography

    2. Description
    3. Objective
    4. 19.2 Practice #2: Advanced Networking

    5. Description
    6. Objective
    7. 19.3 Practice #3: Cyber Defense

    8. Description
    9. Objective
    10. 19.4 Practice #4: Documentation & Risk Management

    11. Description
    12. Objective