Please enable JavaScript to use CodeHS

FL Computer and Network Security Fundamentals Framework

Standards

Standard Description
19.01 Define cybersecurity. Lessons
19.02 Describe how information security evolved into cybersecurity and the impact of the Internet on the pace and nature of the evolution. Lessons
19.03 Describe the individual elements that comprise the CIA triad (i.e., Confidentiality, Integrity, Availability). Lessons
19.04 Define and explain the various types of hackers and the role each plays in cybersecurity. Lessons
19.05 Describe various methodologies used by hackers and the basis for their employment. Lessons
19.06 Describe the individual elements of the AAA model (Authentication, Authorization and Accounting). Lessons
20.01 Describe the role of the National Security Agency. Lessons
20.02 Describe current trends in cyberattacks and strategies for combating them. Lessons
20.03 Describe the legal implications of computer hacking and other forms of cyberattacks. Lessons
20.04 Understand the importance of the weekly bulletins distributed by the United States Computer Emergency Readiness Team (US-CERT). Lessons
20.05 Determine if any software or hardware on a given network has vulnerabilities outlined in the most recent US-CERT bulletin. Lessons
21.01 Differentiate between cybersecurity and information assurance. Lessons
21.02 Define confidentiality and give examples of security breaches. Lessons
21.03 Define integrity and give examples of security breaches. Lessons
21.04 Define authenticity and give examples of security breaches. Lessons
21.05 Define accountability (non-repudiation) and give examples of security breaches. Lessons
22.01 Describe the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). Lessons
22.02 Demonstrate and understanding of common computer and programming terminology. Lessons
22.03 Explain the physical and logical architecture of a microcomputer system. Lessons
22.04 Describe the file types used in the operation of a computer. Lessons
22.05 Compare and contrast memory technologies (e.g., RAM, ROM, virtual memory, memory management). Lessons
23.01 Compare operating system file naming conventions. Lessons
23.02 Describe the common elements that comprise the architecture of an operating system (e.g., kernel, file manager, memory manager, device manager, network manager). Lessons
23.03 Demonstrate proficiency with file management and structure (e.g., folder creation, file creation, backup, copy, delete, open, save). Lessons
23.04 Demonstrate a working knowledge of standard file formats. Lessons
23.05 Describe the purpose of various operating systems (e.g., Windows, Mac, iOS, Android and Linux). Lessons
23.06 Describe the difference between client and network operating systems. Lessons
23.07 Differentiate between different operating systems and applications and Macros. Lessons
23.08 Explain the basics of boot sequences, methods and startup utilities. Lessons
23.09 Compare and contrast open source and proprietary software. Lessons
23.10 Describe common system utilities used in performing computer maintenance. Lessons
24.01 Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. Lessons
24.02 Describe the purpose of the OSI model and each of its layers. Lessons
24.03 Explain specific functions belonging to each OSI model layer. Lessons
24.04 Understand how two network nodes communicate through the OSI model. Lessons
24.05 Discuss the structure and purpose of data packets and frames. Lessons
24.06 Describe the two types of addressing covered by the OSI model. Lessons
25.01 Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. Lessons
25.02 Describe the purpose of the TCP/IP model and each of its layers. Lessons
25.03 Explain specific functions belonging to each TCP/IP model layer. Lessons
25.04 Understand how two network nodes communicate through the TCP/IP model. Lessons
25.05 Describe the two types of addressing covered by the TCP/IP model. Lessons
26.01 Describe the services and protocols used in the OSI Application Layer (i.e., DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP). Lessons
26.02 Describe the services and protocols used in the OSI Transport Layer (i.e., TCP, TLS/SSL, UDP). Lessons
26.03 Describe the services and protocols used in the OSI Network Layer (i.e., IP, ICMP, IGMP, IPsec). Lessons
26.04 Describe the services and protocols used in the OSI Data Link Layer (i.e., ARP, OSPF, L2TP, PPP). Lessons
27.01 Define networking and describe the purpose of a network. Lessons
27.02 Describe the conceptual background of digital networks and cloud computing including terminology and basics. Lessons
27.03 Describe various types of networks and the advantages and disadvantages of each (e.g., peer to peer, client/server, server/thin client, ROI). Lessons
27.04 Describe the use, advantages, and disadvantages of various network media (e.g. coaxial, twisted pair, fiber optics). Lessons
27.05 Describe the function of various network devices (e.g., managed switch, switched hub or switch, router, bridge, gateway, access points, modem). Lessons
27.06 Describe how network devices are identified (i.e., IP addressing). Lessons
27.07 Explain the protocols commonly used in a network environment. Lessons
27.08 Differentiate between public and private IP addresses. Lessons
27.09 Describe the common ports and corresponding protocols used in a network. Lessons
27.10 Describe the difference between the Internet and intranet. Lessons
27.11 Compare and contrast IPv4 and IPv6. Lessons
27.12 Compare and contrast the different methods for network connectivity (e.g., broadband, wireless, Bluetooth, cellular). Lessons
27.13 Discuss the differences between Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Virtual Local Area Network (VLAN), and Virtual Private Network (VPN). Lessons
28.01 Describe the various types of cloud computing (IaaS, PaaS, SaaS) and modes of delivery (Public, Private, Community, Hybrid). Lessons
28.02 Describe practices that aid in protecting the Hybrid cloud model. Lessons
28.03 Describe the challenges and solutions associated with securing embedded devices. Lessons
29.01 Distinguish between vulnerability and a threat. Lessons
29.02 Discuss the different types of attacks (e.g., active, passive). Lessons
29.03 Define security policy and explain its role in cybersecurity. Lessons
29.04 Describe the basic methods of authentication (e.g., password, biometrics, smart cards. two-factor authentication, multifactor authentication). Lessons
29.05 Describe the various forms of encryption methodologies (e.g., symmetric, asymmetric, block cipher, stream cipher). Lessons
29.06 Describe hash functions and their role in authentication. Lessons
29.07 Describe various method of access control used in computer security (e.g., policies, groups, Access Control List (ACL)). Lessons
29.08 Understand the concept of malware (i.e., ransomware, worms, viruses, adware) and how attackers use it to steal sensitive or confidential information. Lessons
30.01 Define cybercrime and discuss the challenges facing law enforcement. Lessons
30.02 Identify the key legislative acts that impact cybersecurity. Lessons
30.03 Describe the Federal criminal code related to computers and give examples of cybercrimes and penalties, particularly those involving inappropriate access. Lessons
30.04 Discuss the concept of digital forensics and its place in cybercrime investigations and incident response. Lessons
30.05 Distinguish among the Intellectual Property Rights of trademark, patent, and copyright. Lessons
30.06 Explain digital rights management and the implications of the Digital Millennium Copyright Act (DMCA). Lessons
30.07 Describe the implications of various social media on the safeguarding of personal or sensitive information. Lessons
30.08 Describe various safeguards that can be employed to help ensure that sensitive or confidential information is not inadvertently divulged or obtained. Lessons
31.01 Define virtual computing. Lessons
31.02 Explain the benefits of virtual computing. Lessons
31.03 Differentiate between guest and host operating systems. Lessons
31.04 Install desktop virtualization software. Lessons
31.05 Describe the role of the hypervisor. Lessons
31.06 Create and upgrade a virtual machine. Lessons
31.07 Optimize the performance of a virtual machine. Lessons
31.08 Preserve the state of a virtual machine. Lessons
31.09 Clone, move and share virtual machines. Lessons
31.10 Use basic (static) and dynamic virtual disks and disk drives. Lessons
31.11 Configure a virtual network. Lessons
31.12 Connect devices to a virtual machine. Lessons
31.13 Enable security settings on a virtual machine. Lessons
32.01 Configure 802.1x authentication for a given scenario. Lessons
32.02 Connect clients to a VPN. Lessons
32.03 Understand Authentication, Authorization and Accounting (AAA) management. Lessons
32.04 Differentiate between TACACS+ (Terminal Access Controller Access Control System) and RADIUS. Lessons
32.05 Differentiate between Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) protocols as they apply to VPN options. Lessons
32.06 Implement the use of SSH (Secure Shell). Lessons
32.07 Implement the use of IPsec (Internet Protocol Security). Lessons
32.08 Identify vulnerabilities associated with authentication. Lessons
32.09 Understand ways to implement VoIP technologies. Lessons
32.10 Demonstrate the use and purpose of Kerberos. Lessons
33.01 Configure access controls including biometric devices, keypads and security tokens. Lessons
33.02 Recognize social engineering attempts. Lessons
33.03 Evaluate environmental controls (e.g., EMI shielding, temperature, humidity and fire suppression). Lessons
33.04 Develop a method of training users to recognize, report, and avoid social engineering attempts. Lessons
33.05 Identify components of physical security, including mantraps, motion detection, alarm systems, locks, video surveillance, and fences/barricades. Lessons
33.06 Install a camera for a video surveillance system. Lessons
33.07 Configure an alarm system including a keypad and motion detector. Lessons
33.08 Recognize vulnerabilities associated with physical security. Lessons
33.09 Explain how a mantrap is used as a counter measure against tailgating. Lessons
34.01 Configure and maintain software and hardware firewalls. Lessons
34.02 Configure and secure routers. Lessons
34.03 Apply security settings to switches. Lessons
34.04 Configure and secure wireless devices. Lessons
34.05 Secure a LAN connected to a DSL/cable modem. Lessons
34.06 Configure a RAS (Remote Access Server) for remote connectivity. Lessons
34.07 Securely deploy a PBX (Private Branch Exchange). Lessons
34.08 Explain the benefits of implementing a VPN (Virtual Private Network). Lessons
34.09 Deploy IDS (intrusion detection system) and IPS (intrusion prevention systems). Lessons
34.1 Analyze the performance, efficiency and security of the network based on network monitoring and diagnostic software. Lessons
34.11 Employ techniques used to lock down workstations. Lessons
34.12 Configure and secure servers for a given scenario. Lessons
34.13 Understand and assess the security of mobile devices including but not limited to those using the Android, iOS and Windows platforms. Lessons
35.01 Explain the security implications of the Internet of Things (IoT) (i.e., understand the efforts to address authentication and updates to IoT devices). Lessons
35.02 Explain societal and security challenges associated with robotics. Lessons
35.03 Explain security challenges associated with serverless computing. Lessons
35.04 Explain societal and security challenges associated with the implementation of 5G. Lessons
35.05 Describe and explain the security challenges of Autonomous vehicles (i.e., the significance of vehicular cybersecurity and its relation to: computer vision, artificial intelligence, machine learning and deep learning). Lessons
36.01 Understand access control as it applies to MAC (Mandatory Access Control). Lessons
36.02 Understand access control as it applies to DAC (Discretionary Access Control). Lessons
36.03 Understand access control as it applies to RBAC (Role Based Access Control). Lessons
37.01 Understand and identify security concerns with the use of Coaxial Cable. Lessons
37.02 The student should be able to identify and understand security concerns for UTP/STP (Unshielded Twisted Pair / Shielded Twisted Pair). Lessons
37.03 Identify and understand security concerns fiber optic cable. Lessons
37.04 Identify security concerns associated with removable media. Lessons
37.05 Address pitfalls associated with tape backups. Lessons
37.06 Apply drive encryption to hard drives. Lessons
37.07 Secure flash drives. Lessons
37.08 Smartcards and secure USB memory. Lessons
38.01 Determine Security Zones. Lessons
38.02 Point out vulnerabilities on a DMZ (Demilitarized Zone). Lessons
38.03 Explain the security benefits of using an intranet. Lessons
38.04 Explain the security benefits of using an extranet. Lessons
38.05 Secure a VLAN (Virtual Local Area Network). Lessons
38.06 Describe the security benefits associated with NAT (Network Address Translation). Lessons
38.07 Justify the implementation of tunneling, for security purpose. Lessons
39.01 Select and employ appropriate communication concepts and strategies to enhance oral and written communication in the workplace. Lessons
39.02 Locate, organize and reference written information from various sources. Lessons
39.03 Design, develop and deliver formal and informal presentations using appropriate media to engage and inform diverse audiences. Lessons
39.04 Interpret verbal and nonverbal cues/behaviors that enhance communication. Lessons
39.05 Apply active listening skills to obtain and clarify information. Lessons
39.06 Develop and interpret tables and charts to support written and oral communications. Lessons
39.07 Exhibit public relations skills that aid in achieving customer satisfaction. Lessons
40.01 Employ critical thinking skills independently and in teams to solve problems and make decisions. Lessons
40.02 Employ critical thinking and interpersonal skills to resolve conflicts. Lessons
40.03 Identify and document workplace performance goals and monitor progress toward those goals. Lessons
40.04 Conduct technical research to gather information necessary for decision-making. Lessons
41.01 Use personal information management (PIM) applications to increase workplace efficiency. Lessons
41.02 Employ technological tools to expedite workflow including word processing, databases, reports, spreadsheets, multimedia presentations, electronic calendar, contacts, email, and internet applications. Lessons
41.03 Employ computer operations applications to access, create, manage, integrate, and store information. Lessons
41.04 Employ collaborative/groupware applications to facilitate group work. Lessons
42.01 Describe the nature and types of business organizations. Lessons
42.02 Explain the effect of key organizational systems on performance and quality. Lessons
42.03 List and describe quality control systems and/or practices common to the workplace. Lessons
42.04 Explain the impact of the global economy on business organizations. Lessons
43.01 Evaluate and justify decisions based on ethical reasoning. Lessons
43.02 Evaluate alternative responses to workplace situations based on personal, professional, ethical, legal responsibilities, and employer policies. Lessons
43.03 Identify and explain personal and long-term consequences of unethical or illegal behaviors in the workplace. Lessons
43.04 Interpret and explain written organizational policies and procedures. Lessons
43.05 Display proficiency in using team-oriented collaboration and video teleconferencing software (e.g. Teams, Zoom). Lessons