Course Modules

Week 1, December 4-8

Week 1, December 4-8
Module Completed Module In Progress Module Locked
Week 1, December 4-8 142017  
  • Assignment
    About Me Google Slide About Me Google Slide
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Module 0: Introduction to Cybersecurity Module 0: Introduction to Cybersecurity
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Module 1: What is Cybersecurity Module 1: What is Cybersecurity
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][What is Cybersecurity][01] Course Overview.pptx [Cybersecurity][What is Cybersecurity][01] Course Overview.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][What is Cybersecurity][02] What is Cybersecurity_.pptx [Cybersecurity][What is Cybersecurity][02] What is Cybersecurity_.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][What is Cybersecurity][03] Impact of Cybersecurity.pptx [Cybersecurity][What is Cybersecurity][03] Impact of Cybersecurity.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][What is Cybersecurity][04] The CIA Triad.pptx [Cybersecurity][What is Cybersecurity][04] The CIA Triad.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 2, December 11-15

Week 2, December 11-15
Module Completed Module In Progress Module Locked
Week 2, December 11-15 142019  
  • Assignment
    Module 2: Digital Citizenship and Cyber Hygiene Module 2: Digital Citizenship and Cyber Hygiene
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][01] Digital Footprint & Reputation.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][01] Digital Footprint & Reputation.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][02] Cyberbullying.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][02] Cyberbullying.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][03] Internet Safety.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][03] Internet Safety.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][04] Privacy & Security.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][04] Privacy & Security.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][05] Information Literacy.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][05] Information Literacy.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][06] Creative Credit and Copyright.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][06] Creative Credit and Copyright.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Digital Citizenship and Cyber Hygiene][07] Hacking Ethics.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][07] Hacking Ethics.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 3, December 18-22

Week 3, December 18-22
Module Completed Module In Progress Module Locked
Week 3, December 18-22 142021  
  • Assignment
    Module 3: Public Service Announcement Module 3: Public Service Announcement
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 4, January 8-12

Week 4, January 8-12
Module Completed Module In Progress Module Locked
Week 4, January 8-12 142023  
  • Assignment
    Module 4: Programming Fundamentals Module 4: Programming Fundamentals
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][1] Programming Concepts.pptx [Cybersecurity][Programming Fundamentals][1] Programming Concepts.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][2.2] Functions in Karel.pptx [Cybersecurity][Programming Fundamentals][2.2] Functions in Karel.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][2.1] Intro to Programming.pptx [Cybersecurity][Programming Fundamentals][2.1] Intro to Programming.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][3.1] For Loops in Karel.pptx [Cybersecurity][Programming Fundamentals][3.1] For Loops in Karel.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][3.2] While Loops in Karel.pptx [Cybersecurity][Programming Fundamentals][3.2] While Loops in Karel.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][4] If_Else Statements.pptx [Cybersecurity][Programming Fundamentals][4] If_Else Statements.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][5] Arrays and Objects.pptx [Cybersecurity][Programming Fundamentals][5] Arrays and Objects.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Programming Fundamentals][6] Organizational Techniques.pptx [Cybersecurity][Programming Fundamentals][6] Organizational Techniques.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 5, January 16-19

Week 5, January 16-19
Module Completed Module In Progress Module Locked
Week 5, January 16-19 142025  
  • Assignment
    Module 4: Programming Fundamentals Module 4: Programming Fundamentals
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Pop Quiz Pop Quiz
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 6, January 22-26

Week 6, January 22-26
Module Completed Module In Progress Module Locked
Week 6, January 22-26 142029  
  • Assignment
    Module 5: The ABCs of Cryptography Module 5: The ABCs of Cryptography
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][The ABCs of Cryptography][01.a] Cryptography, Cryptology, Cryptanalysis.pptx [Cybersecurity][The ABCs of Cryptography][01.a] Cryptography, Cryptology, Cryptanalysis.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][The ABCs of Cryptography][01.b] Why Encrypt.pptx [Cybersecurity][The ABCs of Cryptography][01.b] Why Encrypt.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][The ABCs of Cryptography][02] History of Cryptography.pptx [Cybersecurity][The ABCs of Cryptography][02] History of Cryptography.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][The ABCs of Cryptography][03-05] Basic Crypto Systems.pptx [Cybersecurity][The ABCs of Cryptography][03-05] Basic Crypto Systems.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 7, January 29-February 2

Week 7, January 29-February 2
Module Completed Module In Progress Module Locked
Week 7, January 29-February 2 142033  
  • Assignment
    Module 7: System Administration Module 7: System Administration
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [01] Operating Systems.pptx [Cybersecurity] [System Administration] [01] Operating Systems.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [02] Comparing Operating Systems.pptx [Cybersecurity] [System Administration] [02] Comparing Operating Systems.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [03] Compatibility.pptx [Cybersecurity] [System Administration] [03] Compatibility.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [04] Software and Applications.pptx [Cybersecurity] [System Administration] [04] Software and Applications.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [05] Software Licenses.pptx [Cybersecurity] [System Administration] [05] Software Licenses.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [06] Application Security.pptx [Cybersecurity] [System Administration] [06] Application Security.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [07] Browser Configuration.pptx [Cybersecurity] [System Administration] [07] Browser Configuration.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [08.a] System Administration I - User Accounts.pptx [Cybersecurity] [System Administration] [08.a] System Administration I - User Accounts.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [08.b] System Administration II - Host Security.pptx [Cybersecurity] [System Administration] [08.b] System Administration II - Host Security.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity] [System Administration] [09] Command Line Interface.pptx [Cybersecurity] [System Administration] [09] Command Line Interface.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 8, February 5-9

Week 8, February 5-9
Module Completed Module In Progress Module Locked
Week 8, February 5-9 142036  
  • Assignment
    Module 8: Software Security Module 8: Software Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][01] Inside Web Apps.pptx [Cybersecurity][Software Security][01] Inside Web Apps.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][02] Developer Tools.pptx [Cybersecurity][Software Security][02] Developer Tools.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][03] The Value of Data.pptx [Cybersecurity][Software Security][03] The Value of Data.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][04.a] Databases.pptx [Cybersecurity][Software Security][04.a] Databases.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][04.b] Parts of a Database.pptx [Cybersecurity][Software Security][04.b] Parts of a Database.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][05.a] Clients and Servers.pptx [Cybersecurity][Software Security][05.a] Clients and Servers.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][05.b] Clients and Servers.pptx [Cybersecurity][Software Security][05.b] Clients and Servers.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][06.a] Intro to SQL.pptx [Cybersecurity][Software Security][06.a] Intro to SQL.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][06.b] Structuring Data in SQL.pptx [Cybersecurity][Software Security][06.b] Structuring Data in SQL.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 9, February 12-16

Week 9, February 12-16
Module Completed Module In Progress Module Locked
Week 9, February 12-16 142039  
  • Assignment
    Module 8: Software Security Module 8: Software Security
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][07.a] The Select Statement.pptx [Cybersecurity][Software Security][07.a] The Select Statement.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][07.b] More Select Statement.pptx [Cybersecurity][Software Security][07.b] More Select Statement.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][08] The WHERE Clause.pptx [Cybersecurity][Software Security][08] The WHERE Clause.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][09.a] Common Security Problems.pptx [Cybersecurity][Software Security][09.a] Common Security Problems.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][09.b] Living in a Digital World.pptx [Cybersecurity][Software Security][09.b] Living in a Digital World.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][10.a]Types of SQLi.pptx [Cybersecurity][Software Security][10.a]Types of SQLi.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][10.b] Preventing SQL Injection.pptx [Cybersecurity][Software Security][10.b] Preventing SQL Injection.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Software Security][10]SQL Injection Overview.pptx [Cybersecurity][Software Security][10]SQL Injection Overview.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 10, February 26-March 1

Week 10, February 26-March 1
Module Completed Module In Progress Module Locked
Week 10, February 26-March 1 142043  
  • Assignment
    WBL Career Research WBL Career Research
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Assignment
    Module 10: Networking Fundamentals Module 10: Networking Fundamentals
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][01] Introduction to the Internet.pptx [Cybersecurity][Networking Fundamentals][01] Introduction to the Internet.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][02.a] Notational Systems I - Number Systems.pptx [Cybersecurity][Networking Fundamentals][02.a] Notational Systems I - Number Systems.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][02.b] Notational Systems II - Decimal to Binary.pptx [Cybersecurity][Networking Fundamentals][02.b] Notational Systems II - Decimal to Binary.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][03.a] Data Representation I - Hexadecimal.pptx [Cybersecurity][Networking Fundamentals][03.a] Data Representation I - Hexadecimal.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][03.b] Data Representation II - Encoding Text with Binary.pptx [Cybersecurity][Networking Fundamentals][03.b] Data Representation II - Encoding Text with Binary.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][04.a] Internet Hardware.pptx [Cybersecurity][Networking Fundamentals][04.a] Internet Hardware.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][04.b] Sending Information.pptx [Cybersecurity][Networking Fundamentals][04.b] Sending Information.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][06] Domain Name System (DNS).pptx [Cybersecurity][Networking Fundamentals][06] Domain Name System (DNS).pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][05] Internet Addresses.pptx [Cybersecurity][Networking Fundamentals][05] Internet Addresses.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][07] Routing.pptx [Cybersecurity][Networking Fundamentals][07] Routing.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][08.a]Packets.pptx [Cybersecurity][Networking Fundamentals][08.a]Packets.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][08.b]Protocols.pptx [Cybersecurity][Networking Fundamentals][08.b]Protocols.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][09] Viewing a Web Page.pptx [Cybersecurity][Networking Fundamentals][09] Viewing a Web Page.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][Networking Fundamentals][10]The Impact of the Internet.pptx [Cybersecurity][Networking Fundamentals][10]The Impact of the Internet.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 11, March 4-8

Week 11, March 4-8
Module Completed Module In Progress Module Locked
Week 11, March 4-8 142046  
  • Assignment
    Module 11: IT Infrastructure Module 11: IT Infrastructure
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][01] Internal Components.pptx [Cybersecurity][IT Infrastructure][01] Internal Components.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][02] Peripheral Devices.pptx [Cybersecurity][IT Infrastructure][02] Peripheral Devices.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][03] Network Devices.pptx [Cybersecurity][IT Infrastructure][03] Network Devices.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][04] Storage Options.pptx [Cybersecurity][IT Infrastructure][04] Storage Options.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][05] Network Options.pptx [Cybersecurity][IT Infrastructure][05] Network Options.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][06] Network Communication.pptx [Cybersecurity][IT Infrastructure][06] Network Communication.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
  • Attachment
    [Cybersecurity][IT Infrastructure][07] Network Management.pptx [Cybersecurity][IT Infrastructure][07] Network Management.pptx
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete

Week 12, March 11-15

Week 12, March 11-15
Module Completed Module In Progress Module Locked
Week 12, March 11-15 142049  
  • Assignment
    Final Exam Final Exam
    Score at least   Must score at least   to complete this module item Scored at least   Module item has been completed by scoring at least   Score at least  % Must score at least  % to complete this module item Scored at least  % Module item has been completed by scoring at least  % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
 
minimum score must view must submit must contribute