Activity | Points | Item Type |
---|---|---|
Advanced Cryptography | ||
1.1 Welcome to Advanced Cybersecurity! | Lesson | |
1.1.1 Course Introduction | 1 | Notes |
1.1.2 Cybersecurity 101 | 1 | Connection |
1.1.3 Cyber Heat Map | 5 | Free Response |
1.1.4 Career Pathways | 5 | Free Response |
1.1.5 Starting with Cryptography | 1 | Connection |
1.1.6 Course Goals | 5 | Free Response |
1.2 Encryption Algorithms | Lesson | |
1.2.1 Symmetric Encryption | 1 | Video |
1.2.2 Ciphers Quiz | 2 | Check for Understanding |
1.2.3 Enhanced Caesar Cipher | 5 | Free Response |
1.2.4 Mixed Alphabet Cipher | 5 | Free Response |
1.2.5 Pigpen Encoder | 1 | Example |
1.2.6 Pigpen Cipher | 5 | Free Response |
1.2.7 Rail Fence Cipher | 5 | Free Response |
1.2.8 Encryption Standards | 1 | Video |
1.2.9 Encryption Standards Quiz | 3 | Check for Understanding |
1.3 Advanced Cryptography | Lesson | |
1.3.1 Advanced Cryptography | 1 | Video |
1.3.2 Advanced Cryptography | 3 | Check for Understanding |
1.3.3 Public Key Cryptography for Non-Geeks | 1 | Connection |
1.3.4 Examining Public Key Cryptography | 5 | Free Response |
1.3.5 Public Key Cryptography | 1 | Connection |
1.3.6 Public Key Cryptography | 5 | Free Response |
1.4 Hash Functions | Lesson | |
1.4.1 Hash Functions | 1 | Video |
1.4.2 Hash Functions | 3 | Check for Understanding |
1.4.3 Google Shattered Crypto Algorithm | 1 | Connection |
1.4.4 Hash Functions in the News | 5 | Free Response |
1.4.5 Using a Hash Generator | 1 | Connection |
1.4.6 Hash Generator | 5 | Free Response |
1.4.7 Password Salting | 1 | Connection |
1.4.8 Password Salting | 5 | Free Response |
1.5 Hash Function Development | Lesson | |
1.5.1 Hash Function Development | 1 | Video |
1.5.2 Hash Function Development | 2 | Check for Understanding |
1.5.3 Modulo Math Calculator | 1 | Example |
1.5.4 Understanding Modulo Math | 1 | Example |
1.5.5 Modulo Game! | 1 | Example |
1.5.6 Develop a Simple Hash Function | 5 | Exercise |
1.6 Asymmetric Encryption | Lesson | |
1.6.1 Asymmetric Encryption | 1 | Video |
1.6.2 Asymmetric Encryption Quiz | 5 | Check for Understanding |
1.6.3 Diffie-Hellman Key Exchange | 1 | Example |
1.6.4 Affine Cipher | 5 | Free Response |
1.6.5 Trapdoor Functions | 5 | Free Response |
1.6.6 Public-Key Encryption Explorer | 1 | Notes |
1.6.7 Public-Key Encryption Explorer Reflection | 5 | Free Response |
1.7 Digital Certificates | Lesson | |
1.7.1 Digital Certificates | 1 | Video |
1.7.2 Digital Certificates | 4 | Check for Understanding |
1.7.3 SSL Explained | 1 | Connection |
1.7.4 SSL Explained Response | 5 | Free Response |
1.7.5 Digital Certificate Connection | 5 | Free Response |
1.7.6 In The News | 1 | Connection |
1.7.7 In The News Response | 5 | Free Response |
1.7.8 Become a Certificate Authority! | 10 | Free Response |
1.8 Advanced Cryptography Quiz | Lesson | |
1.8.1 Advanced Cryptography Quiz | 20 | Unit Quiz |
Project: Steganography | ||
2.1 Project: Steganography | Lesson | |
2.1.1 What is Steganography? | 1 | Video |
2.1.2 Government Surveillance and Reality Winner | 1 | Connection |
2.1.3 Government Surveillance and Reality Winner | 5 | Free Response |
2.1.4 Data Hiding and Extraction | 1 | Connection |
2.1.5 Reflect: Data Hiding and Extraction | 5 | Free Response |
2.1.6 Hide Text | 1 | Example |
2.1.7 Hidden Message | 1 | Example |
2.1.8 Your turn: Encryption Algorithm | 5 | Free Response |
2.1.9 Your turn: Image Creation | 10 | Challenge |
2.1.10 Final Algorithm and Partner Decode | 5 | Free Response |
2.1.11 Final Reflection | 5 | Free Response |
Advanced Networking | ||
3.1 Network Administrator | Lesson | |
3.1.1 Advanced Devices | 1 | Video |
3.1.2 Advanced Devices Quiz | 5 | Check for Understanding |
3.1.3 Network Administrator Career | 1 | Connection |
3.1.4 Network Administrator Career | 5 | Free Response |
3.1.5 Choosing the Best Devices | 5 | Free Response |
3.1.6 Network Diagram | 5 | Free Response |
3.2 Environmental Controls | Lesson | |
3.2.1 Environmental Controls | 1 | Video |
3.2.2 Environmental Controls Quiz | 5 | Check for Understanding |
3.2.3 Infographic | 1 | Connection |
3.2.4 Infographic FR | 5 | Free Response |
3.2.5 Your Security Systems | 5 | Free Response |
3.2.6 Security Design | 10 | Free Response |
3.3 Protocols and Standards | Lesson | |
3.3.1 Protocols | 1 | Video |
3.3.2 Protocols Quiz | 3 | Check for Understanding |
3.3.3 Standards | 1 | Video |
3.3.4 Standards Quiz | 2 | Check for Understanding |
3.3.5 The New Wireless Standard | 1 | Connection |
3.3.6 801.11ax | 1 | Connection |
3.3.7 801.11ax FR | 5 | Free Response |
3.4 Private Networks | Lesson | |
3.4.1 IP and MAC Addresses | 1 | Video |
3.4.2 IP and MAC Addresses Quiz | 2 | Check for Understanding |
3.4.3 Intranet Permissions | 1 | Example |
3.4.4 Coffee Shop: Design an Intranet | 5 | Free Response |
3.4.5 DMZs and VPNs | 1 | Video |
3.4.6 DMZs and VPNs Quiz | 3 | Check for Understanding |
3.4.7 Protecting Privacy with VPNs | 1 | Connection |
3.4.8 Protecting Privacy with VPNs | 5 | Free Response |
3.4.9 Coffee Shop: Network Plan | 5 | Free Response |
3.4.10 Coffee Shop: Network Diagram | 5 | Free Response |
3.4.11 SOHO Network | 1 | Video |
3.4.12 Network Topologies | 1 | Example |
3.5 Mobile Devices | Lesson | |
3.5.1 Mobile Devices | 1 | Video |
3.5.2 Mobile Devices Quiz | 5 | Check for Understanding |
3.5.3 How Apple FaceID Works | 1 | Connection |
3.5.4 How Apple FaceID Works Response | 5 | Free Response |
3.5.5 Biometric Data Debate | 5 | Free Response |
3.5.6 BYOD and MDM Concept Map | 1 | Connection |
3.5.7 BYOD and MDM Conclusions | 5 | Free Response |
3.6 Access Control | Lesson | |
3.6.1 Access Control | 1 | Video |
3.6.2 Access Control | 4 | Check for Understanding |
3.6.3 Multifactor Authentication | 1 | Example |
3.6.4 Two Factor Authentication | 1 | Example |
3.6.5 Two Factor Authentication Reflection | 5 | Free Response |
3.6.6 RADIUS Overview with AAA Protocol | 1 | Connection |
3.6.7 RADIUS Server Access Control | 1 | Connection |
3.6.8 RADIUS Reflection | 5 | Free Response |
3.7 Advanced Networking Quiz | Lesson | |
3.7.1 Advanced Networking Quiz | 20 | Unit Quiz |
Project: IT Professional | ||
4.1 Communication is Key! | Lesson | |
4.1.1 IT Professional | 5 | Notes |
4.1.2 Cybersecurity Careers | 5 | Free Response |
4.1.3 Customer Service Skills | 1 | Connection |
4.1.4 Customer Service Skills | 5 | Free Response |
4.1.5 Act it Out! | 15 | Free Response |
4.2 Building a Knowledge Base | Lesson | |
4.2.1 What is a Knowledge Base? | 1 | Connection |
4.2.2 Draft a KB Article | 5 | Free Response |
4.2.3 Share your KB Article | 5 | Free Response |
4.2.4 Finalize your KB Article | 15 | Free Response |
4.3 Star in a Video! | Lesson | |
4.3.1 Instructional Videos | 1 | Connection |
4.3.2 Example Tutorial | 1 | Connection |
4.3.3 Instructional Video Plan | 5 | Free Response |
4.3.4 Write the Script | 5 | Free Response |
4.3.5 Create the Storyboard | 5 | Free Response |
4.3.6 Record Your Video | 5 | Free Response |
Cyber Defense | ||
5.1 Network Attacks | Lesson | |
5.1.1 Network Attacks Overview | 1 | Video |
5.1.2 Network Attacks Quiz | 4 | Check for Understanding |
5.1.3 Check for Vulnerabilities | 1 | Notes |
5.1.4 Bug Bounty Hunting | 1 | Connection |
5.1.5 Bug Bounty Hunting | 5 | Free Response |
5.1.6 Common Port Targets | 1 | Connection |
5.1.7 Port Scanner Simulation | 1 | Example |
5.1.8 Open Port Reflection | 5 | Free Response |
5.2 Malware Types and Prevention | Lesson | |
5.2.1 Malware Types and Prevention | 1 | Video |
5.2.2 Malware Types and Prevention | 5 | Check for Understanding |
5.2.3 How Anti-malware Works | 1 | Connection |
5.2.4 How Anti-malware Works | 5 | Free Response |
5.2.5 OS Malware Security | 5 | Free Response |
5.2.6 Reverse Engineering Malware | 5 | Free Response |
5.3 Common Network Attacks | Lesson | |
5.3.1 Common Network Attacks | 1 | Video |
5.3.2 Network Attacks | 3 | Check for Understanding |
5.3.3 Social Engineering Hack | 1 | Connection |
5.3.4 Social Engineering Reflection | 5 | Free Response |
5.3.5 DDoS Attacks | 1 | Connection |
5.3.6 DDoS Simulation | 1 | Example |
5.3.7 DDoS Reflection | 5 | Free Response |
5.4 Additional Attacks | Lesson | |
5.4.1 Additional Attacks | 1 | Video |
5.4.2 Additional Attacks Quiz | 5 | Check for Understanding |
5.4.3 Botnet Attacks - Mirai | 1 | Connection |
5.4.4 Botnet Attacks - 3ve | 1 | Connection |
5.4.5 Botnet Attacks - 3ve Video | 1 | Connection |
5.4.6 Botnet Attacks - Reflection | 5 | Free Response |
5.4.7 Zero-day Exploit: Stuxnet | 5 | Connection |
5.4.8 Zero-day Exploit: Stuxnet | 5 | Notes |
5.4.9 Zero-day Exploit Reflection | 5 | Free Response |
5.4.10 US-CERT Current Activity | 5 | Free Response |
5.5 Cross-site Scripting | Lesson | |
5.5.1 Cross-site Scripting | 1 | Video |
5.5.2 Cross-site Scripting | 2 | Check for Understanding |
5.5.3 XSS Bug in Yahoo Mail | 1 | Connection |
5.5.4 XSS Bug in Yahoo Mail | 5 | Free Response |
5.5.5 Hacksplaining XSS Demo | 1 | Connection |
5.5.6 Google's Tutorial for XSS | 1 | Connection |
5.5.7 XSS Reflection | 5 | Free Response |
5.6 Internal Threats | Lesson | |
5.6.1 Internal Threats | 1 | Video |
5.6.2 Internal Threats | 5 | Check for Understanding |
5.6.3 BIOS/UEFI Attack Example | 1 | Connection |
5.6.4 Accessing BIOS/UEFI | 1 | Notes |
5.6.5 Causes of Data Breaches | 5 | Connection |
5.6.6 Causes of Data Breaches | 5 | Free Response |
5.6.7 Protecting Data at All Times | 1 | Connection |
5.6.8 Protecting Data at All Times | 5 | Free Response |
5.7 Cyber Defense Quiz | Lesson | |
5.7.1 Cyber Defense Quiz | 20 | Unit Quiz |
Project: Security Assessment Report | ||
6.1 Project Security Assessment Report | Lesson | |
6.1.1 Project Requirements | 1 | Notes |
6.1.2 Supercar Showdown Website | 1 | Connection |
6.1.3 Cross-site Scripting Testing | 5 | Free Response |
6.1.4 Cross-site Scripting Handout | 1 | Resource |
6.1.5 Security Assessment Report | 15 | Free Response |
6.1.6 Project Reflection | 5 | Free Response |
Project: Put it in Writing! | ||
7.1 Level 1: Entry Event | Lesson | |
7.1.1 Company Development | 5 | Free Response |
7.1.2 Level 1: Attack! | 5 | Free Response |
7.1.3 Level 1: Project Overview | 1 | Video |
7.1.4 Put It In Writing! Rubric | 5 | Connection |
7.2 Level 2: User Training | Lesson | |
7.2.1 User Training Policy Development | 5 | Free Response |
7.2.2 Challenge: Employee Negligence 1 | 5 | Free Response |
7.2.3 Challenge: Employee Negligence 2 | 5 | Free Response |
7.2.4 Level 2 Debrief | 5 | Free Response |
7.3 Level 3: Incident Response | Lesson | |
7.3.1 Incident Response Plan Template | 5 | Connection |
7.3.2 Incident Response Plan Link | 5 | Free Response |
7.3.3 Challenge: Cyber Attack! | 5 | Free Response |
7.3.4 Level 3 Debrief | 5 | Free Response |
7.4 Level 4: Data and Licenses | Lesson | |
7.4.1 Data and Licenses | 5 | Video |
7.4.2 FTC Data Security Guide | 5 | Connection |
7.4.3 Data Policy Template | 5 | Connection |
7.4.4 Data Policy Link | 5 | Free Response |
7.4.5 Challenge: Data Breach 1 | 5 | Free Response |
7.4.6 Challenge: Data Breach 2 | 5 | Free Response |
7.4.7 Challenge: Data Breach 3 | 5 | Free Response |
7.4.8 Level 4 Debrief | 5 | Free Response |
7.5 Level 5: Change Management | Lesson | |
7.5.1 Change Management | 5 | Video |
7.5.2 Change Management Plan | 5 | Connection |
7.5.3 Change Management Plan Link | 5 | Free Response |
Risk Management | ||
8.1 Identifying Risks | Lesson | |
8.1.1 Identifying Risks | 1 | Video |
8.1.2 Identifying Risks Quiz | 5 | Check for Understanding |
8.1.3 What is a Honeypot? | 1 | Connection |
8.1.4 Honeypot Attacks | 1 | Connection |
8.1.5 Honeypot Attacks | 5 | Free Response |
8.1.6 Whois | 5 | Free Response |
8.1.7 Packet Sniffing | 1 | Connection |
8.1.8 Packet Sniffing Response | 5 | Free Response |
8.1.9 Breach Trends | 5 | Free Response |
8.2 Assessing Risks | Lesson | |
8.2.1 Assessing Risks | 1 | Notes |
8.2.2 Malware Risk Assessment | 5 | Free Response |
8.2.3 Poor Password Assessment | 5 | Free Response |
8.2.4 Social Engineering Assessment | 5 | Free Response |
8.2.5 Assessing Risks | 1 | Video |
8.2.6 Assessing Risks Quiz | 5 | Check for Understanding |
8.2.7 End-of-Life OS | 1 | Connection |
8.2.8 End-of-Life Proposal | 5 | Free Response |
8.2.9 Input Handling | 1 | Example |
8.2.10 Input Handling Responses | 5 | Free Response |
8.2.11 Input Validation | 1 | Example |
8.2.12 Input Validation Responses | 5 | Free Response |
8.3 Risk Response | Lesson | |
8.3.1 Risk Response | 1 | Video |
8.3.2 Risk Response | 5 | Check for Understanding |
8.3.3 Defense in Depth Risk Mitigation | 5 | Free Response |
8.3.4 Sample Risk Assessment Report | 5 | Connection |
8.3.5 Sample Risk Assessment Reflection | 5 | Free Response |
8.3.6 Delta Outage Video | 5 | Connection |
8.3.7 Delta Outage Reflection | 5 | Free Response |
8.3.8 What Happens When Your Servers Go Down | 5 | Connection |
8.3.9 What Happens When Your Servers Go Down Reflection | 5 | Free Response |
8.3.10 Server Upgrade Memo | 5 | Free Response |
8.4 Penetration Testing | Lesson | |
8.4.1 Penetration Testing | 1 | Video |
8.4.2 Penetration Testing | 5 | Check for Understanding |
8.4.3 Penetration Test Report | 5 | Connection |
8.4.4 Penetration Test Report | 5 | Free Response |
8.4.5 Chaos Engineering | 5 | Notes |
8.4.6 Chaos Engineering Reflection | 5 | Free Response |
8.4.7 Pen Test Simulation Handout | 5 | Resource |
8.4.8 Pen Test Simulation: Active Recon | 5 | Exercise |
8.4.9 Pen Test Simulation: Exploit Vulnerabilities | 5 | Exercise |
8.5 Risk Management Quiz | Lesson | |
8.5.1 Risk Management Quiz | 20 | Unit Quiz |
Project: The Game of Risk | ||
9.1 The Game of Risk | Lesson | |
9.1.1 Group Project Intro | 1 | Notes |
9.1.2 Brainstorm: Type of Game | 5 | Free Response |
9.1.3 Brainstorm: SLE | 5 | Free Response |
9.1.4 Brainstorm: Materials | 5 | Free Response |
9.1.5 Prototype Game and Instructions | 5 | Free Response |
9.1.6 Test Your Game! | 5 | Free Response |
9.1.7 Testing Feedback Form | 1 | Resource |
9.1.8 Create Your Final Version! | 20 | Free Response |
Midterm | ||
10.1 Midterm | Lesson | |
10.1.1 Midterm | 15 | Midterm |
Final Exam | ||
11.1 Final Exam | Lesson | |
11.1.1 Final Exam | 15 | Final |
What's Next? | ||
12.1 After Advanced Cybersecurity | Lesson | |
12.1.1 Cybersecurity Pathways | 1 | Notes |
12.1.2 CodeHS Programming Courses | 1 | Connection |
12.1.3 College Pathway | 1 | Notes |
12.1.4 Certification Pathway | 1 | Connection |
12.1.5 Career Spotlight | 1 | Connection |
12.1.6 My Pathway | 5 | Free Response |
Cryptocurrency | ||
13.1 What is Currency? | Lesson | |
13.1.1 What is Currency? | 1 | Video |
13.1.2 What is Currency? | 2 | Check for Understanding |
13.1.3 What Gives Paper Money Its Actual Value | 1 | Connection |
13.1.4 What Gives Money Its Value | 5 | Free Response |
13.1.5 Money: What is it Good For? | 1 | Resource |
13.2 What is Cryptocurrency? | Lesson | |
13.2.1 Cryptocurrency Basics | 1 | Video |
13.2.2 Cryptocurrency Basics | 5 | Check for Understanding |
13.2.3 Cryptocurrency Module Overview | 1 | Video |
13.2.4 Cryptocurrencies Might Help Developing Countries | 1 | Connection |
13.2.5 Cryptocurrencies are Helping Developing Countries | 5 | Free Response |
13.2.6 Show Me the Money | 1 | Resource |
13.2.7 American Currency Exhibit | 5 | Free Response |
13.3 Intro to Blockchain | Lesson | |
13.3.1 Intro to Blockchain | 1 | Video |
13.3.2 Intro to Blockchain | 3 | Check for Understanding |
13.3.3 CryptoKitties | 1 | Connection |
13.3.4 CryptoKitties | 5 | Free Response |
13.4 Hashing | Lesson | |
13.4.1 Hashing | 1 | Video |
13.4.2 Hashing | 3 | Check for Understanding |
13.4.3 SHA256 Hash Generator | 1 | Connection |
13.4.4 Using the SHA256 Hash Generator | 5 | Free Response |
13.5 Proof of Work | Lesson | |
13.5.1 Proof of Work | 1 | Video |
13.5.2 Proof of Work | 3 | Check for Understanding |
13.5.3 Mining the Block | 1 | Video |
13.5.4 Mining the Block | 3 | Check for Understanding |
13.5.5 PoW vs. Proof of Stake | 1 | Connection |
13.5.6 PoW vs. PoS | 5 | Free Response |
13.5.7 Checking Proof of Work | 1 | Resource |
13.6 Advanced Blockchain | Lesson | |
13.6.1 Advanced Blockchain (part 1) | 1 | Video |
13.6.2 Advanced Blockchain (part 1) | 3 | Check for Understanding |
13.6.3 Blockchain Buzz | 1 | Connection |
13.6.4 Blockchain Buzz | 5 | Free Response |
13.6.5 Advanced Blockchain (part 2) | 1 | Video |
13.6.6 Advanced Blockchain (part 2) | 5 | Free Response |
13.6.7 Make a Blockchain | 1 | Resource |
13.6.8 SUPPLEMENTARY: How to TimeStamp a Document | 1 | Connection |
13.7 Cryptocurrencies | Lesson | |
13.7.1 Cryptocurrencies | 1 | Video |
13.7.2 Cryptocurrencies | 3 | Check for Understanding |
13.7.3 Shiny Toy Phenomenon | 5 | Free Response |
13.7.4 Walmart Using Blockchain to Stop Spread of Disease | 1 | Connection |
13.7.5 Walmart Use of Blockchain | 5 | Free Response |
13.8 Bitcoin | Lesson | |
13.8.1 Bitcoin | 1 | Video |
13.8.2 Bitcoin | 3 | Check for Understanding |
13.8.3 51% Attack Explained | 1 | Connection |
13.8.4 51% Attack | 5 | Free Response |
13.8.5 Why the Bitcoin Bubble will Burst in 2018 | 1 | Connection |
13.8.6 Bitcoin Bust | 5 | Free Response |
13.8.7 Explore the Bitcoin Blockchain | 1 | Resource |
13.9 Pros, Cons, and Future of Cryptocurrencies | Lesson | |
13.9.1 Pros, Cons, and Future of Cryptocurrencies | 1 | Video |
13.9.2 Pros, Cons and Future of Cryptocurrencies | 3 | Check for Understanding |
13.9.3 Pros, Cons and future of Cryptocurrencies | 5 | Free Response |
13.9.4 Cryptocurrency Pros and Cons | 1 | Connection |
13.9.5 Crypto Pros and Cons | 5 | Free Response |
13.9.6 What is HODL? | 1 | Connection |
13.9.7 What is HODL? | 5 | Free Response |
13.9.8 Pros, Cons, and Future of Cryptocurrencies | 5 | Free Response |
13.10 Project: Cryptocurrency Expert Panel Talk | Lesson | |
13.10.1 Overview | 5 | Free Response |
13.10.2 Preview Sample Expert Panels | 5 | Free Response |
13.10.3 Investigate a Cryptocurrency Topic | 5 | Free Response |
13.10.4 Write an Outline and Rehearse | 5 | Free Response |
13.10.5 Expert Panel Talk (Presentation) | 5 | Free Response |
13.11 Cryptocurrency Quiz | Lesson | |
13.11.1 Cryptocurrency Quiz | 10 | Unit Quiz |
13.11.2 Cryptocurrency Badge | 0 | Badge |
Web Development | ||
14.1 Introduction to HTML | Lesson | |
14.1.1 Introduction to HTML | 1 | Video |
14.1.2 Introduction to HTML Quiz | 1 | Check for Understanding |
14.1.3 Our First HTML Page | 1 | Example |
14.1.4 Say Hello! | 5 | Exercise |
14.2 Structure of an HTML Page | Lesson | |
14.2.1 Structure of an HTML Page | 1 | Video |
14.2.2 Structure of an HTML Page Quiz | 1 | Check for Understanding |
14.2.3 HTML Template | 1 | Example |
14.2.4 Hello World Page | 1 | Example |
14.2.5 The <title> Tag | 5 | Exercise |
14.2.6 Your First HTML Page | 5 | Exercise |
14.2.7 Structure Badge | 1 | Badge |
14.3 Formatting Text | Lesson | |
14.3.1 Formatting Text | 1 | Video |
14.3.2 Formatting Text Quiz | 1 | Check for Understanding |
14.3.3 Dictionary | 1 | Example |
14.3.4 That's Bold | 5 | Exercise |
14.3.5 Artificial Intelligence | 5 | Exercise |
14.3.6 State Capitals | 5 | Exercise |
14.4 Links | Lesson | |
14.4.1 Links | 1 | Video |
14.4.2 Links Quiz | 1 | Check for Understanding |
14.4.3 The <a> Tag | 1 | Example |
14.4.4 Simple Link | 5 | Exercise |
14.4.5 My Favorite Websites | 5 | Exercise |
14.5 Images | Lesson | |
14.5.1 Images | 1 | Video |
14.5.2 Images Quiz | 1 | Check for Understanding |
14.5.3 The <img> Tag | 1 | Example |
14.5.4 Building the CodeHS Homepage | 1 | Example |
14.5.5 Collage on a Theme | 5 | Exercise |
14.5.6 Linking an Image | 5 | Exercise |
14.5.7 Personal Library | 5 | Exercise |
14.5.8 Images Badge | 1 | Badge |
14.6 HTML Lists | Lesson | |
14.6.1 HTML Lists | 1 | Video |
14.6.2 HTML Lists Quiz | 1 | Check for Understanding |
14.6.3 Grocery Shopping | 1 | Example |
14.6.4 Favorite Things | 5 | Exercise |
14.6.5 To-Do List | 5 | Exercise |
14.6.6 List Article | 5 | Exercise |
14.7 HTML Tables | Lesson | |
14.7.1 HTML Tables | 1 | Video |
14.7.2 HTML Tables Quiz | 3 | Check for Understanding |
14.7.3 Address Book | 1 | Example |
14.7.4 Favorite Songs | 5 | Exercise |
14.7.5 Calendar | 5 | Exercise |
14.8 HTML Styling | Lesson | |
14.8.1 HTML Styling | 1 | Video |
14.8.2 HTML Styling Quiz | 1 | Check for Understanding |
14.8.3 Stylish Address Book | 1 | Example |
14.8.4 Background Colors | 5 | Exercise |
14.8.5 Style Your To-Do List | 5 | Exercise |
14.9 Introduction to CSS | Lesson | |
14.9.1 Introduction to CSS | 1 | Video |
14.9.2 Introduction to CSS Quiz | 2 | Check for Understanding |
14.9.3 Styling Your H1s | 1 | Example |
14.9.4 First Style with CSS | 5 | Exercise |
14.9.5 List Styling | 5 | Exercise |
14.10 CSS Select by Tag | Lesson | |
14.10.1 CSS Select by Tag | 1 | Video |
14.10.2 CSS Select by Tag Quiz | 1 | Check for Understanding |
14.10.3 Rainbow | 1 | Example |
14.10.4 Dog Styling | 1 | Example |
14.10.5 Restaurant Menu | 5 | Exercise |
14.10.6 Put Karel Together | 5 | Exercise |
14.11 CSS Select by Class | Lesson | |
14.11.1 CSS Select by Class | 1 | Video |
14.11.2 CSS Select by Class Quiz | 1 | Check for Understanding |
14.11.3 Simple Checkerboard | 1 | Example |
14.11.4 Tic Tac Toe | 5 | Exercise |
14.11.5 Music Library | 5 | Exercise |
14.12 CSS Select by ID | Lesson | |
14.12.1 CSS Select by ID | 1 | Video |
14.12.2 CSS Select by ID Quiz | 1 | Check for Understanding |
14.12.3 Logo | 1 | Example |
14.12.4 Favorite Dog | 5 | Exercise |
14.12.5 Bingo | 5 | Exercise |
14.12.6 CSS Badge | 1 | Badge |
14.13 Viewing Websites | Lesson | |
14.13.1 Viewing Websites | 1 | Video |
14.13.2 Viewing Websites Quiz | 5 | Check for Understanding |
14.13.3 Explaining a URL | 5 | Free Response |
14.14 Web Development Quiz | Lesson | |
14.14.1 Web Development Quiz | 15 | Unit Quiz |
14.15 Your First Website | Lesson | |
14.15.1 Set Up Your codehs.me Website | 10 | Challenge |
14.15.2 Practice PT: Your First Website | 10 | Challenge |
14.15.3 Website Badge | 1 | Badge |
SQL Part II: The SQL | ||
15.1 More Filtering Practice | Lesson | |
15.1.1 Initials | 5 | Exercise |
15.1.2 Compound Queries with BETWEEN | 5 | Exercise |
15.1.3 Gryffindors With G Names | 5 | Exercise |
15.1.4 R First Names | 5 | Exercise |
15.1.5 FF Houses | 5 | Exercise |
15.2 Ordering Results | Lesson | |
15.2.1 The ORDER BY Keyword | 1 | Video |
15.2.2 ORDER BY | 1 | Notes |
15.2.3 ORDER BY First Name | 1 | Example |
15.2.4 Reverse Order | 1 | Example |
15.2.5 Order By Multiple Fields | 1 | Example |
15.2.6 House Ordering | 5 | Exercise |
15.2.7 Sort the P Names | 5 | Exercise |
15.3 Renaming Fields | Lesson | |
15.3.1 Renaming Fields with AS | 1 | Notes |
15.3.2 Renaming in the House Table | 1 | Example |
15.3.3 Changing Column Names | 5 | Exercise |
15.4 Joining Tables | Lesson | |
15.4.1 The JOIN command | 1 | Video |
15.4.2 Basic Joining | 1 | Notes |
15.4.3 Letters and Numbers | 1 | Example |
15.4.4 Person and House | 1 | Example |
15.4.5 Person and House (Correct) | 1 | Example |
15.4.6 Person and House (with namespacing) | 1 | Example |
15.4.7 List All Gryffindors | 5 | Exercise |
15.4.8 JOIN With Yourself | 1 | Video |
15.4.9 Renaming Tables | 1 | Notes |
15.4.10 Quidditch Matchups | 1 | Example |
15.4.11 Quidditch Matchups: Ravenclaw Away Games | 5 | Exercise |
15.5 More Joining Tables | Lesson | |
15.5.1 The Course Table | 1 | Example |
15.5.2 Courses and Professors | 5 | Exercise |
15.5.3 Courses, Professors, and Houses | 5 | Exercise |
15.5.4 Courses Taught By Gryffindors | 5 | Exercise |
15.5.5 The Enrollment Table | 1 | Example |
15.5.6 Students Taking Potions | 5 | Exercise |
15.5.7 Non-Slytherins Taking Potions | 5 | Exercise |
15.5.8 Defense Students by House | 5 | Exercise |
15.5.9 Neville's Courses | 5 | Exercise |
More Cyber Topics | ||
16.1 Advanced Networking | Lesson | |
16.1.1 Air Gapped Computers | 1 | Connection |
16.1.2 Air Gapped Computers Response | 5 | Free Response |
16.1.3 Cyberterrorism | 1 | Connection |
16.1.4 Cyberterrorism Response | 5 | Free Response |
16.1.5 What is Virtualization? | 1 | Connection |
16.1.6 Virtualization Response | 5 | Free Response |
16.1.7 The OSI Model and Network Attacks | 1 | Connection |
16.1.8 The OSI Model and Network Attacks Response | 5 | Free Response |
16.1.9 The Machine Instruction Cycle | 5 | Connection |
Cybersecurity Labs | ||
17.1 Labs | Lesson | |
17.1.1 Lab: Configuring a Computer | 1 | Resource |
17.1.2 Lab: Design a Distribution Frame | 5 | Resource |
17.2 Lab: Computer Disassembly | Lesson | |
17.2.1 Lab: Computer Disassembly | 5 | Resource |
17.2.2 Video: Disassemble a Computer | 1 | Connection |
17.2.3 Article: Disassemble a Computer | 5 | Connection |
17.3 Lab: SOHO Devices | Lesson | |
17.3.1 SOHO Devices | 1 | Notes |
17.3.2 Lab: Printer Settings | 1 | Resource |
17.3.3 Sharing Devices | 5 | Free Response |
17.4 Lab: Windows Networking | Lesson | |
17.4.1 Lab: Windows Networking | 1 | Resource |
17.4.2 Lab: Windows Networking w/Simulation | 1 | Resource |
17.4.3 Windows Networking | 1 | Example |
17.5 Lab: Mobile Device Connectivity | Lesson | |
17.5.1 Mobile Device Features | 1 | Connection |
17.5.2 Mobile Device Simulator | 1 | Notes |
17.5.3 Lab: Mobile Device Connectivity | 5 | Resource |
Cloud Computing | ||
18.1 Different Types of Cloud Computing | Lesson | |
18.1.1 SaaS, IaaS, and PaaS | 5 | Connection |
18.1.2 Research Project: Cloud Computing Types | 5 | Free Response |
Cybersecurity Level 2 Certification Practice | ||
19.1 Practice #1: Advanced Cryptography | Lesson | |
19.1.1 Quiz: Advanced Cryptography | 7 | Quiz |
19.1.2 Practice #1 Reflection | 5 | Notes |
19.2 Practice #2: Advanced Networking | Lesson | |
19.2.1 Quiz: Advanced Networking | 10 | Quiz |
19.2.2 Practice #2 Reflection | 5 | Notes |
19.3 Practice #3: Cyber Defense | Lesson | |
19.3.1 Quiz: Cyber Defense | 10 | Quiz |
19.3.2 Practice #3 Reflection | 5 | Notes |
19.4 Practice #4: Documentation & Risk Management | Lesson | |
19.4.1 Quiz: Documentation & Risk Management | 6 | Quiz |
19.4.2 Practice #4 Reflection | 5 | Notes |
Sign up for a free teacher account to get access to curriculum, teacher tools and teacher resources.
Teacher SignupSign up as a student if you are in a school and have a class code given to you by your teacher.
Student Signup