Please enable JavaScript to use CodeHS

Nevada Cybersecurity 2 Framework

Standards

Standard Description
8.1.1 Describe the steps of the cybersecurity lifecycle (e.g., people, process and tools) Lessons
8.1.2 Write a set of principles, rules, and practices to provide guidance and direction Lessons
8.1.3 Follow appropriate decision-making model to determine correct response procedures Lessons
8.2.1 Plan, prepare, and develop scope for a Cyber Incident Response Plan Lessons
8.2.2 Determine correct detection, mitigation, and reporting processes Lessons
8.2.3 Evaluate assessment and decision-making steps when handling an incident or event Lessons
8.2.4 Determine correct investigative procedures Lessons
8.2.5 Gather intelligence from a variety of sources including open source and others Lessons
8.2.6 Document intelligence gathering efforts including who, what, when, where, why, and how Lessons
8.2.7 Determine extent of event or incident scope including severity Lessons
8.2.8 Determine correct containment steps based on the type of incident or event encountered Lessons
8.2.9 Implement the correct eradication response and processes Lessons
8.2.10 Determine next steps post investigation (post breach) from legal, HR, news media response Lessons
8.3.1 Determine the appropriate security control, technique or process based on the property, system or data you are protecting Lessons
8.3.2 Explain the importance of security controls, techniques, and threat risk assessments Lessons
8.3.3 Select the appropriate solution to eliminate vulnerabilities and establish a security baseline Lessons
8.3.4 Develop plans to protect a variety of property, systems, or data Lessons
8.3.5 Implement the appropriate controls to ensure security of property, systems, or data Lessons
8.3.6 Compare and contrast alternative methods to mitigate security risks for data in transit and data at rest Lessons
8.4.1 Describe the digital chain of custody process for tracking data and equipment (legal evidence) Lessons
8.4.2 Describe all steps to capture and maintain evidence Lessons
8.4.3 Follow chain of custody procedures Lessons
8.4.4 Maintain detailed records (e.g., chain of custody forms, evidence collection forms, etc.) Lessons
8.4.5 Track digital evidence (e.g., how it has been gathered, tracked, and protected) Lessons
8.4.6 Describe a chain of custody Lessons
8.4.7 Develop a plan for data transport, encryption to avoid alteration of data and legal holds Lessons
8.4.8 Develop a plan for recovery, disposal of evidence, and follow up Lessons
8.4.9 Write a forensics summary report Lessons
9.1.1 Summarize basic forensic concepts and practices including eDiscovery, documentation, chain of custody, and data transport Lessons
9.1.2 Determine a first responder’s logical approach during an investigation with objective, evidence-based research Lessons
9.1.3 Review the First Responder steps and processes for proper documentation Lessons
9.1.4 Explain what eDiscovery is including the contextual process for electronic evidence collection (Electronically Stored Information ESI) Lessons
9.1.5 Observe and discuss legal restrictions, stipulations, regulatory compliance, and confidentiality when gathering evidence Lessons
9.1.6 Summarize Chain of Custody processes during investigations Lessons
9.2.1 Explain the proper use of penetration testing versus vulnerability scanning Lessons
9.2.2 Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters Lessons
9.2.3 Discover the common types of cyber threat actors including Cybercriminals, Attention-Seekers, Hacktivists, Jihadi Hackers, and Nation States Lessons
9.2.4 Explain and summarize the common cybersecurity attacks including the preferred tactics, techniques, and procedures (TTPS) of threat actors Lessons
9.2.5 Examine and summarize the targets of cyber threat actors including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications Lessons
9.2.6 Review and examine geopolitical flashpoints (e.g., U.S.-China Relations, Iranian Nuclear Accord, Economic Sanctions on Russia, Syrian Conflict, ISIS-related Activity, North Korean Policy, StateSponsored Cyber Activity, Cybersecurity Regulations) Lessons
9.3.1 Describe and demonstrate various methods and tools for threat detection and eDiscovery Lessons
9.3.2 Describe and demonstrate vulnerability management methods, practices, and scanning tools Lessons
9.3.3 Describe and demonstrate various practices, methods, and tools for penetration testing Lessons
9.3.4 Identify encryption methods and demonstrate tools to decipher encrypted data Lessons
9.3.5 Review basic cryptography concepts, methods, and its relationship to forensics Lessons
9.3.6 Identify Web application exploits, vulnerabilities Lessons
9.3.7 Describe and demonstrate Web Application Security and Scanning methods and tools Lessons
9.3.8 Identify methods or tools to eliminate cloud exploits and vulnerabilities Lessons
9.3.9 Describe and demonstrate a working knowledge of phishing attacks and mitigation steps Lessons
9.4.1 Explain what malware is including its history Lessons
9.4.2 Review and define the most common malware terminologies Lessons
9.4.3 Describe the ways and methods malware is spread Lessons
9.4.4 Review the types of malware specifically examining viruses, worms, trojan horses, rootkits ransomware, keyloggers, and grayware attack Lessons
9.4.5 Choose one malware scenario and select the appropriate type of mitigation and deterrent techniques Lessons
9.4.6 Use appropriate tools and techniques to eliminate malware from spreading Lessons
10.1.1 Explain Artificial Intelligence (AI), potential applications, concerns, and opportunities in relation to security issues Lessons
10.1.2 Describe machine learning and potential applications, concerns, and opportunities Lessons
10.1.3 Explain the role of ethics as it relates to security and emerging technologies Lessons
10.2.1 Describe job skills needed for potential careers in new and emerging technologies Lessons
10.2.2 Explore potential uses for and industries that may use emerging technologies Lessons