Course Modules
No modules have been defined for this course.
Week 1, December 4-8
Week 1, December 4-8 Week 1, December 4-8
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 1, December 4-8
142017
-
AssignmentAbout Me Google Slide About Me Google Slide 1 1assignment 857772 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
AssignmentModule 0: Introduction to Cybersecurity Module 0: Introduction to Cybersecurity 5 2assignment 857782 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
AssignmentModule 1: What is Cybersecurity Module 1: What is Cybersecurity 5 3assignment 857783 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][What is Cybersecurity][01] Course Overview.pptx [Cybersecurity][What is Cybersecurity][01] Course Overview.pptx 4attachment 861408 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][What is Cybersecurity][02] What is Cybersecurity_.pptx [Cybersecurity][What is Cybersecurity][02] What is Cybersecurity_.pptx 5attachment 861409 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][What is Cybersecurity][03] Impact of Cybersecurity.pptx [Cybersecurity][What is Cybersecurity][03] Impact of Cybersecurity.pptx 6attachment 861410 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][What is Cybersecurity][04] The CIA Triad.pptx [Cybersecurity][What is Cybersecurity][04] The CIA Triad.pptx 7attachment 861411 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 2, December 11-15
Week 2, December 11-15 Week 2, December 11-15
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 2, December 11-15
142019
-
AssignmentModule 2: Digital Citizenship and Cyber Hygiene Module 2: Digital Citizenship and Cyber Hygiene 5 1assignment 857784 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][01] Digital Footprint & Reputation.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][01] Digital Footprint & Reputation.pptx 2attachment 861412 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][02] Cyberbullying.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][02] Cyberbullying.pptx 3attachment 861414 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][03] Internet Safety.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][03] Internet Safety.pptx 4attachment 861413 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][04] Privacy & Security.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][04] Privacy & Security.pptx 5attachment 861415 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][05] Information Literacy.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][05] Information Literacy.pptx 6attachment 861416 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][06] Creative Credit and Copyright.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][06] Creative Credit and Copyright.pptx 7attachment 861417 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Digital Citizenship and Cyber Hygiene][07] Hacking Ethics.pptx [Cybersecurity][Digital Citizenship and Cyber Hygiene][07] Hacking Ethics.pptx 8attachment 861418 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 3, December 18-22
Week 3, December 18-22 Week 3, December 18-22
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 3, December 18-22
142021
-
AssignmentModule 3: Public Service Announcement Module 3: Public Service Announcement 5 1assignment 857785 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 4, January 8-12
Week 4, January 8-12 Week 4, January 8-12
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 4, January 8-12
142023
-
AssignmentModule 4: Programming Fundamentals Module 4: Programming Fundamentals 5 1assignment 857943 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][1] Programming Concepts.pptx [Cybersecurity][Programming Fundamentals][1] Programming Concepts.pptx 2attachment 861430 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][2.2] Functions in Karel.pptx [Cybersecurity][Programming Fundamentals][2.2] Functions in Karel.pptx 3attachment 861426 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][2.1] Intro to Programming.pptx [Cybersecurity][Programming Fundamentals][2.1] Intro to Programming.pptx 4attachment 861424 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][3.1] For Loops in Karel.pptx [Cybersecurity][Programming Fundamentals][3.1] For Loops in Karel.pptx 5attachment 861425 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][3.2] While Loops in Karel.pptx [Cybersecurity][Programming Fundamentals][3.2] While Loops in Karel.pptx 6attachment 861427 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][4] If_Else Statements.pptx [Cybersecurity][Programming Fundamentals][4] If_Else Statements.pptx 7attachment 861428 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][5] Arrays and Objects.pptx [Cybersecurity][Programming Fundamentals][5] Arrays and Objects.pptx 8attachment 861429 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Programming Fundamentals][6] Organizational Techniques.pptx [Cybersecurity][Programming Fundamentals][6] Organizational Techniques.pptx 10attachment 861431 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 5, January 16-19
Week 5, January 16-19 Week 5, January 16-19
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 5, January 16-19
142025
-
AssignmentModule 4: Programming Fundamentals Module 4: Programming Fundamentals 5 1assignment 857956 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
AssignmentPop Quiz Pop Quiz 5 2assignment 857958 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 6, January 22-26
Week 6, January 22-26 Week 6, January 22-26
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 6, January 22-26
142029
-
AssignmentModule 5: The ABCs of Cryptography Module 5: The ABCs of Cryptography 5 1assignment 857944 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][The ABCs of Cryptography][01.a] Cryptography, Cryptology, Cryptanalysis.pptx [Cybersecurity][The ABCs of Cryptography][01.a] Cryptography, Cryptology, Cryptanalysis.pptx 3attachment 861869 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][The ABCs of Cryptography][01.b] Why Encrypt.pptx [Cybersecurity][The ABCs of Cryptography][01.b] Why Encrypt.pptx 4attachment 861866 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][The ABCs of Cryptography][02] History of Cryptography.pptx [Cybersecurity][The ABCs of Cryptography][02] History of Cryptography.pptx 5attachment 861867 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][The ABCs of Cryptography][03-05] Basic Crypto Systems.pptx [Cybersecurity][The ABCs of Cryptography][03-05] Basic Crypto Systems.pptx 6attachment 861868 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 7, January 29-February 2
Week 7, January 29-February 2 Week 7, January 29-February 2
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 7, January 29-February 2
142033
-
AssignmentModule 7: System Administration Module 7: System Administration 5 1assignment 857945 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [01] Operating Systems.pptx [Cybersecurity] [System Administration] [01] Operating Systems.pptx 3attachment 861870 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [02] Comparing Operating Systems.pptx [Cybersecurity] [System Administration] [02] Comparing Operating Systems.pptx 4attachment 861872 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [03] Compatibility.pptx [Cybersecurity] [System Administration] [03] Compatibility.pptx 5attachment 861871 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [04] Software and Applications.pptx [Cybersecurity] [System Administration] [04] Software and Applications.pptx 6attachment 861875 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [05] Software Licenses.pptx [Cybersecurity] [System Administration] [05] Software Licenses.pptx 7attachment 861873 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [06] Application Security.pptx [Cybersecurity] [System Administration] [06] Application Security.pptx 8attachment 861874 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [07] Browser Configuration.pptx [Cybersecurity] [System Administration] [07] Browser Configuration.pptx 9attachment 861876 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [08.a] System Administration I - User Accounts.pptx [Cybersecurity] [System Administration] [08.a] System Administration I - User Accounts.pptx 10attachment 861877 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [08.b] System Administration II - Host Security.pptx [Cybersecurity] [System Administration] [08.b] System Administration II - Host Security.pptx 11attachment 861879 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity] [System Administration] [09] Command Line Interface.pptx [Cybersecurity] [System Administration] [09] Command Line Interface.pptx 12attachment 861878 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 8, February 5-9
Week 8, February 5-9 Week 8, February 5-9
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 8, February 5-9
142036
-
AssignmentModule 8: Software Security Module 8: Software Security 5 1assignment 857955 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][01] Inside Web Apps.pptx [Cybersecurity][Software Security][01] Inside Web Apps.pptx 2attachment 861880 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][02] Developer Tools.pptx [Cybersecurity][Software Security][02] Developer Tools.pptx 3attachment 861885 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][03] The Value of Data.pptx [Cybersecurity][Software Security][03] The Value of Data.pptx 4attachment 861881 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][04.a] Databases.pptx [Cybersecurity][Software Security][04.a] Databases.pptx 5attachment 861882 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][04.b] Parts of a Database.pptx [Cybersecurity][Software Security][04.b] Parts of a Database.pptx 6attachment 861883 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][05.a] Clients and Servers.pptx [Cybersecurity][Software Security][05.a] Clients and Servers.pptx 7attachment 861884 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][05.b] Clients and Servers.pptx [Cybersecurity][Software Security][05.b] Clients and Servers.pptx 8attachment 861886 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][06.a] Intro to SQL.pptx [Cybersecurity][Software Security][06.a] Intro to SQL.pptx 9attachment 861887 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][06.b] Structuring Data in SQL.pptx [Cybersecurity][Software Security][06.b] Structuring Data in SQL.pptx 10attachment 861888 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 9, February 12-16
Week 9, February 12-16 Week 9, February 12-16
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 9, February 12-16
142039
-
AssignmentModule 8: Software Security Module 8: Software Security 5 1assignment 857954 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][07.a] The Select Statement.pptx [Cybersecurity][Software Security][07.a] The Select Statement.pptx 2attachment 861890 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][07.b] More Select Statement.pptx [Cybersecurity][Software Security][07.b] More Select Statement.pptx 3attachment 861889 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][08] The WHERE Clause.pptx [Cybersecurity][Software Security][08] The WHERE Clause.pptx 4attachment 861891 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][09.a] Common Security Problems.pptx [Cybersecurity][Software Security][09.a] Common Security Problems.pptx 5attachment 861892 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][09.b] Living in a Digital World.pptx [Cybersecurity][Software Security][09.b] Living in a Digital World.pptx 6attachment 861893 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][10.a]Types of SQLi.pptx [Cybersecurity][Software Security][10.a]Types of SQLi.pptx 7attachment 861894 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][10.b] Preventing SQL Injection.pptx [Cybersecurity][Software Security][10.b] Preventing SQL Injection.pptx 8attachment 861895 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Software Security][10]SQL Injection Overview.pptx [Cybersecurity][Software Security][10]SQL Injection Overview.pptx 9attachment 861896 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 10, February 26-March 1
Week 10, February 26-March 1 Week 10, February 26-March 1
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 10, February 26-March 1
142043
-
AssignmentWBL Career Research WBL Career Research 0 1assignment 878392 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
AssignmentModule 10: Networking Fundamentals Module 10: Networking Fundamentals 5 2assignment 857952 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][01] Introduction to the Internet.pptx [Cybersecurity][Networking Fundamentals][01] Introduction to the Internet.pptx 3attachment 861899 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][02.a] Notational Systems I - Number Systems.pptx [Cybersecurity][Networking Fundamentals][02.a] Notational Systems I - Number Systems.pptx 4attachment 861898 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][02.b] Notational Systems II - Decimal to Binary.pptx [Cybersecurity][Networking Fundamentals][02.b] Notational Systems II - Decimal to Binary.pptx 5attachment 861900 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][03.a] Data Representation I - Hexadecimal.pptx [Cybersecurity][Networking Fundamentals][03.a] Data Representation I - Hexadecimal.pptx 6attachment 861901 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][03.b] Data Representation II - Encoding Text with Binary.pptx [Cybersecurity][Networking Fundamentals][03.b] Data Representation II - Encoding Text with Binary.pptx 7attachment 861902 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][04.a] Internet Hardware.pptx [Cybersecurity][Networking Fundamentals][04.a] Internet Hardware.pptx 8attachment 861903 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][04.b] Sending Information.pptx [Cybersecurity][Networking Fundamentals][04.b] Sending Information.pptx 9attachment 861904 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][06] Domain Name System (DNS).pptx [Cybersecurity][Networking Fundamentals][06] Domain Name System (DNS).pptx 10attachment 861906 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][05] Internet Addresses.pptx [Cybersecurity][Networking Fundamentals][05] Internet Addresses.pptx 11attachment 861905 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][07] Routing.pptx [Cybersecurity][Networking Fundamentals][07] Routing.pptx 12attachment 861907 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][08.a]Packets.pptx [Cybersecurity][Networking Fundamentals][08.a]Packets.pptx 13attachment 861908 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][08.b]Protocols.pptx [Cybersecurity][Networking Fundamentals][08.b]Protocols.pptx 14attachment 861909 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][09] Viewing a Web Page.pptx [Cybersecurity][Networking Fundamentals][09] Viewing a Web Page.pptx 15attachment 861910 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][Networking Fundamentals][10]The Impact of the Internet.pptx [Cybersecurity][Networking Fundamentals][10]The Impact of the Internet.pptx 16attachment 861911 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 11, March 4-8
Week 11, March 4-8 Week 11, March 4-8
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 11, March 4-8
142046
-
AssignmentModule 11: IT Infrastructure Module 11: IT Infrastructure 5 1assignment 857951 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][01] Internal Components.pptx [Cybersecurity][IT Infrastructure][01] Internal Components.pptx 2attachment 861912 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][02] Peripheral Devices.pptx [Cybersecurity][IT Infrastructure][02] Peripheral Devices.pptx 3attachment 861913 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][03] Network Devices.pptx [Cybersecurity][IT Infrastructure][03] Network Devices.pptx 4attachment 861914 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][04] Storage Options.pptx [Cybersecurity][IT Infrastructure][04] Storage Options.pptx 5attachment 861915 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][05] Network Options.pptx [Cybersecurity][IT Infrastructure][05] Network Options.pptx 6attachment 861918 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][06] Network Communication.pptx [Cybersecurity][IT Infrastructure][06] Network Communication.pptx 7attachment 861917 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
-
Attachment[Cybersecurity][IT Infrastructure][07] Network Management.pptx [Cybersecurity][IT Infrastructure][07] Network Management.pptx 8attachment 861916 0Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
Week 12, March 11-15
Week 12, March 11-15 Week 12, March 11-15
Prerequisites:
Module Completed
Module In Progress
Module Locked
Week 12, March 11-15
142049
-
AssignmentFinal Exam Final Exam 5 1assignment 857950 1Score at least Must score at least to complete this module item Scored at least Module item has been completed by scoring at least Score at least % Must score at least % to complete this module item Scored at least % Module item has been completed by scoring at least % View Must view in order to complete this module item Viewed Module item has been viewed and is complete Mark done Must mark this module item done in order to complete Marked done Module item marked as done and is complete Contribute Must contribute to this module item to complete it Contributed Contributed to this module item and is complete Submit Must submit this module item to complete it Submitted Module item submitted and is complete
0 In Progress 0 Complete
Will unlock
0
Score at least
Must score at least to complete this module item
Scored at least
Module item has been completed by scoring at least
Score at least %
Must score at least % to complete this module item
Scored at least %
Module item has been completed by scoring at least %
View
Must view in order to complete this module item
Viewed
Module item has been viewed and is complete
Mark done
Must mark this module item done in order to complete
Marked done
Module item marked as done and is complete
Contribute
Must contribute to this module item to complete it
Contributed
Contributed to this module item and is complete
Submit
Must submit this module item to complete it
Submitted
Module item submitted and is complete