Please enable JavaScript to use CodeHS

NCyTE Cybersecurity Concept Lessons (JavaScript)

Points

Activity Points Item Type
Caesar Cipher
1.1 Caesar Ciphers Lesson
1.1.1 Introduction to Caesar Ciphers 5 Connection
1.1.2 slides 5 Video
1.1.3 A Caesar Cipher 5 Connection
1.1.4 Encryption and Decryption 5 Free Response
1.1.5 Decryption Practice 4 Check for Understanding
1.1.6 Caesar Cipher Encryption 5 Exercise
1.2 Decrypting and Breaking Caesar Ciphers Lesson
1.2.1 Caesar Cipher Decryption 5 Exercise
1.2.2 Break Caesar's Cipher! 5 Exercise
1.2.3 Reflection: Caesar's Cipher 5 Free Response
1.2.4 Ethics Moment: Apple v. Barr 5 Connection
1.2.5 Reflection: Apple v. Barr 5 Free Response
The CIA Triad
2.1 Introduction to Cybersecurity Lesson
2.1.1 Warm-Up 5 Notes
2.1.2 Gone Phishing 5 Video
2.1.3 Deepfake Videos 5 Connection
2.1.4 Keeping Secrets 5 Free Response
2.1.5 Phishing Quiz 5 Connection
2.1.6 How is Your Phishing IQ? 5 Connection
2.1.7 Phishing Simulator 1 Example
2.1.8 Reflection: Phishing Emails 5 Free Response
2.1.9 Think-Pair-Share Activity 5 Free Response
2.2 CIA Triad Lesson
2.2.1 Warm-Up 5 Notes
2.2.2 CIA Triad 5 Video
2.2.3 Alice-Bob-Eve 5 Free Response
2.2.4 PII 5 Free Response
2.2.5 CIA Breach 5 Free Response
2.2.6 Identity Theft 5 Free Response
2.2.7 CIA and Phishing 5 Free Response
2.2.8 Challenge: Create a Phishing Email 5 Free Response
2.2.9 Challenge: Investigate Legalities 5 Free Response
CyberEthics
3.1 CyberEthics Lesson
3.1.1 Presentation 5 Video
3.1.2 Topics 5 Free Response
3.1.3 Problem Summary 5 Free Response
3.1.4 Pros and Cons 5 Free Response
3.1.5 Your Solution 5 Free Response
3.1.6 Writing an Introduction 5 Free Response
3.1.7 Developing your position 5 Free Response
3.1.8 Conclusion 5 Free Response
3.1.9 Position Paper 5 Free Response
Data Structures
4.1 Introduction to Lists Lesson
4.1.1 Intro to Lists 5 Video
4.1.2 List Introduction 9 Check for Understanding
4.2 Traversing a List Lesson
4.2.1 Traversing a List 5 Video
4.2.2 Traversing a List 11 Check for Understanding
4.3 Applying Iteration - Usernames and Passwords Lesson
4.3.1 Username and Password Creation 5 Video
4.3.2 Usernames and Passwords: Pseudocode 5 Free Response
4.3.3 Usernames and Passwords: JavaScript 5 Exercise
4.3.4 Username and Password Verification 10 Challenge
4.3.5 Ethics Moment: Facebook and AWS 5 Connection
4.3.6 Reflection: Facebook and AWS 5 Free Response
Identity, Authentication and Authorization
5.1 Identity Crisis Lesson
5.1.1 Warm Up 5 Notes
5.1.2 Identity Crisis 5 Video
5.1.3 Sharing Passwords 5 Connection
5.1.4 Reflect: Sharing Passwords 5 Free Response
5.1.5 What is your password? 5 Connection
5.1.6 Identity crisis activity 5 Free Response
5.1.7 World's Biggest Data Breaches 5 Free Response
5.1.8 Research: Types of Attacks 5 Free Response
5.1.9 You Can Be Tracked! 1 Example
5.2 Let Me In Lesson
5.2.1 Warm Up 5 Notes
5.2.2 Authenticate and Authorize 5 Video
5.2.3 How do you protect your data? 5 Free Response
5.2.4 Common Passwords 5 Free Response
5.2.5 Password Strength 1 Connection
5.2.6 Reflection: Password Strength 5 Free Response
5.2.7 What Makes a Password Strong? 5 Video
5.2.8 Multifactor Authentication 1 Example
5.2.9 One Pager: Password Security 5 Exercise
Input Validation & Conditionals
6.1 Applying Conditionals - Password Validation Lesson
6.1.1 Input Validation and Conditionals 5 Video
6.1.2 Conditional Pseudocode Activity 7 AP Practice
6.1.3 Password Checker 5 Exercise
6.1.4 How are passwords saved? 5 Connection
6.1.5 Reflect: How are passwords saved? 5 Free Response
6.2 Password Protection Lesson
6.2.1 Password Protection 5 Video
6.2.2 Create a password 5 Exercise
6.2.3 Ethics Moment: Impact of Code 5 Connection
6.2.4 Reflection: Impact of Code 5 Free Response
Iterative Process
7.1 Iterative Process Lesson
7.1.1 Iterations 5 Video
7.1.2 Iterative Pseudocode Activity - Part 1 9 AP Practice
7.1.3 Iterative Pseudocode Activity - Part 2 10 AP Practice
7.1.4 Verify the Password Length 5 Exercise
7.1.5 Making a Stronger Password 5 Exercise
7.1.6 Passwords with Letters and Numbers 5 Exercise
7.1.7 Ethics Moment: Sampling Music 5 Connection
7.1.8 Reflection: Sampling Music 5 Free Response
Secure Networking
8.1 Introduction to Networking Lesson
8.1.1 Warm Up 5 Notes
8.1.2 Ethics Moment: Equifax Data Breach 5 Connection
8.1.3 Reflection: Equifax Data Breach 5 Free Response
8.1.4 Muddy City 5 Exercise
8.1.5 Reflection: Muddy City 5 Free Response
8.2 OSI model activity Lesson
8.2.1 Introduction 5 Free Response
8.2.2 Event 1: Truck Payload Change 5 Free Response
8.2.3 Event 2: Truck Payload Change 5 Free Response
8.2.4 Event 3: Route Change 5 Free Response
8.2.5 Event 4: Envelopes Never Arrive 5 Free Response
8.2.6 Event 5: Missing One Box 5 Free Response
8.2.7 Event 6: Box Payload Change 5 Free Response
8.2.8 Organizing the Events 5 Free Response
8.2.9 Relating this to the Internet 5 Video
8.3 Network Attacks Lesson
8.3.1 Warm Up 5 Notes
8.3.2 One Pager: Network Attacks 5 Exercise
8.3.3 Reflection: Network Attacks 5 Free Response
Personal Data Vulnerabilities
9.1 Unintentional Data Sharing Lesson
9.1.1 Warm up 5 Notes
9.1.2 Personal Data Vulnerabilities 5 Video
9.1.3 Spokeo 5 Free Response
9.1.4 Cyber Insecurity 5 Connection
9.1.5 Who is this Person? 5 Free Response
9.1.6 Who is this Person? - Car 5 Free Response
9.1.7 Who is this Person? - Hobby 5 Free Response
9.1.8 What can you learn from ... 5 Free Response
9.1.9 Social Media Clean-up 1 Example
9.2 Metadata and Data Collection Lesson
9.2.1 Warm Up 5 Notes
9.2.2 Understanding Metadata 5 Video
9.2.3 Image Data Extraction 5 Free Response
9.2.4 Information about your images 5 Free Response
9.2.5 Security Vulnerability 5 Free Response
9.2.6 Ethics Moment: Collection of Data 5 Connection
9.2.7 Reflection: Collection of Data 5 Free Response
9.2.8 Online Privacy 5 Connection
Risk
10.1 Basic Cybersecurity Risk Concepts Lesson
10.1.1 Warm up 5 Notes
10.1.2 Basic Cybersecurity Risk, Part 1 5 Video
10.1.3 Personal Data Threats 5 Free Response
10.1.4 Basic Cybersecurity Risk, Part 2 5 Video
10.1.5 Risk and Consequences: Part 1 5 Free Response
10.1.6 Risk and Consequences: Part 2 5 Free Response
10.1.7 Digital Footprint 5 Free Response
10.2 Cybersecurity Risk Model-Assessing Risk Lesson
10.2.1 Warm up 5 Notes
10.2.2 Assessing Risk, Part 1 5 Video
10.2.3 Think, Pair, Share: Assets 5 Notes
10.2.4 Assessing Risk, Part 2 5 Video
10.2.5 Risk Scenario Assessment 1: Malware 5 Free Response
10.2.6 Risk Scenario Assessment 2: Identity Theft 5 Free Response
10.2.7 Risk Scenario Assessment 3: Ransomware 5 Free Response
10.2.8 Risk Scenario Assessment 4: Email Compromise 5 Free Response
10.2.9 Asset Identification Activity 5 Free Response
10.3 Cybersecurity Risk Model-Vulnerabilities Lesson
10.3.1 Warm up 5 Notes
10.3.2 Vulnerabilities 5 Video
10.3.3 National Vulnerability Database Activity 5 Check for Understanding
10.3.4 Exploring Vulnerabilities 5 Free Response
10.4 Cybersecurity Risk Model-Security Controls Lesson
10.4.1 Warm up 5 Notes
10.4.2 Internet of Things 5 Connection
10.4.3 Security Controls 5 Video
10.4.4 Defense in Depth 5 Free Response
10.4.5 Ethics Moment: The Risk of AI 5 Connection
10.4.6 Reflect: The Risk of AI 5 Free Response
Steganography
11.1 Introduction to Steganography Lesson
11.1.1 Introduction to Steganography 5 Connection
11.1.2 What is steganography? 5 Connection
11.1.3 Hide Text 1 Example
11.1.4 Steganography 5 Video
11.1.5 Creating a Secret Message 5 Free Response
11.1.6 Part 1: Loading images 5 Exercise
11.2 Ethics of Steganography Lesson
11.2.1 Steganography - Part 2 5 Video
11.2.2 Government Surveillance and Reality Winner 1 Connection
11.2.3 Government Surveillance and Reality Winner 5 Free Response
11.2.4 Ethics Moment: Government Surveillance 5 Connection
11.2.5 Reflection: Government Surveillance 5 Free Response
11.2.6 Upload your own photos 5 Exercise
11.2.7 Part 2: The encrypt function 5 Exercise
11.3 Steganography Exploration Lesson
11.3.1 Data Hiding and Extraction 1 Connection
11.3.2 Reflect: Data Hiding and Extraction 5 Free Response
11.3.3 Part 3: The decrypt function 5 Exercise
Symmetric and Public Key Encryption
12.1 Symmetric and Public Key Encryption Lesson
12.1.1 Symmetric and Public Key Encryption 5 Video
12.1.2 Diffie-Hellman Key Exchange 5 Connection
12.1.3 Diffie-Hellman Key Exchange 1 Example
12.1.4 Public Key Programming Exercise 5 Exercise
12.1.5 RSA Encryption: Step 1 5 Connection
12.1.6 RSA Encryption: Step 2 5 Connection
12.1.7 RSA Encryption: Step 3 5 Connection
12.1.8 RSA Encryption: Step 4 5 Connection
12.1.9 Public-Key Encryption Explorer 1 Notes
12.1.10 Public-Key Encryption Explorer Reflection 5 Free Response
12.1.11 Ethics Moment: Ransomware 5 Connection
12.1.12 Reflection: Ransomware 5 Free Response
Vigenère Cipher
13.1 Vigenère Cipher Lesson
13.1.1 Vigenère Cipher 5 Video
13.1.2 One-Time Pad Cipher 5 Connection
13.1.3 How a Vigenère Cipher Works 5 Connection
13.1.4 Vigenère Scavenger Hunt 5 Free Response
13.1.5 Vigenère Pseudocode 5 Free Response
13.1.6 Write your own Vigenère Cipher 5 Exercise
13.1.7 Reflection: Vigenère Cipher 5 Free Response
13.1.8 Ethics Moment: Cryptography and the NSA 5 Connection
13.1.9 Reflection: Cryptography and the NSA 5 Free Response