Please enable JavaScript to use CodeHS

Virginia Cybersecurity Fundamentals Framework


Standard Description
1 Demonstrate creativity and innovation. Lessons
2 Demonstrate critical thinking and problem solving. Lessons
3 Demonstrate initiative and self-direction. Lessons
4 Demonstrate integrity. Lessons
5 Demonstrate work ethic. Lessons
6 Demonstrate conflict-resolution skills. Lessons
7 Demonstrate listening and speaking skills. Lessons
8 Demonstrate respect for diversity. Lessons
9 Demonstrate customer service skills. Lessons
10 Collaborate with team members. Lessons
11 Demonstrate big-picture thinking. Lessons
12 Demonstrate career- and life-management skills. Lessons
13 Demonstrate continuous learning and adaptability. Lessons
14 Manage time and resources. Lessons
15 Demonstrate information-literacy skills. Lessons
16 Demonstrate an understanding of information security. Lessons
17 Maintain working knowledge of current information-technology (IT) systems. Lessons
18 Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. Lessons
19 Apply mathematical skills to job-specific tasks. Lessons
20 Demonstrate professionalism. Lessons
21 Demonstrate reading and writing skills. Lessons
22 Demonstrate workplace safety. Lessons
23 Examine aspects of planning within an industry/organization. Lessons
24 Examine aspects of management within an industry/organization. Lessons
25 Examine aspects of financial responsibility within an industry/organization. Lessons
26 Examine technical and production skills required of workers within an industry/organization. Lessons
27 Examine principles of technology that underlie an industry/organization. Lessons
28 Examine labor issues related to an industry/organization. Lessons
29 Examine community issues related to an industry/organization. Lessons
30 Examine health, safety, and environmental issues related to an industry/organization. Lessons
31 Identify the purposes and goals of the student organization. Lessons
32 Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. Lessons
33 Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. Lessons
34 Identify Internet safety issues and procedures for complying with acceptable use standards. Lessons
35 Identify the types of work-based learning (WBL) opportunities. Lessons
36 Reflect on lessons learned during the WBL experience. Lessons
37 Explore career opportunities related to the WBL experience. Lessons
38 Participate in a WBL experience, when appropriate. Lessons
39 Describe Cybersecurity Lessons
40 Define information assurance Lessons
41 Describe the critical factors of information security Lessons
42 Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration Lessons
43 Define risk Lessons
44 Identify the concepts of cybersecurity risk management Lessons
45 Describe cybersecurity threats to an organization Lessons
46 Explain why organizations need to manage risk Lessons
47 Discuss national or industry standards/regulations that relate to cybersecurity Lessons
48 Describe the cyberattack surface of various organizations Lessons
49 Analyze risks affecting critical infrastructure Lessons
50 Describe a network Lessons
51 Describe a wired/cabled network Lessons
52 Describe a wireless network Lessons
53 Compare cabled/wired and wireless networks Lessons
54 Compare networking conceptual models Lessons
55 Discuss services, their relationship to the OSI model, and potential vulnerabilities Lessons
56 Differentiate among network types Lessons
57 Examine the concept of the Internet as a network of connected systems Lessons
58 Identify networking protocols Lessons
59 Describe the difference between a cyber threat and a vulnerability Lessons
60 Describe types of cyber threats Lessons
61 Analyze types of current cyber threats Lessons
62 Identify the perpetrators of different types of malicious hacking Lessons
63 Describe the characteristics of vulnerabilities Lessons
64 Identify the prevention of and protection against cyber threats Lessons
65 Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks Lessons
66 Differentiate between ethics and laws Lessons
67 Distinguish among types of ethical concerns Lessons
68 Define cyberbullying Lessons
69 Identify actions that constitute cyberbullying Lessons
70 Identify possible warning signs of someone being cyberbullied Lessons
71 Identify laws applicable to cybersecurity Lessons
72 Explain the concept of “personally identifiable information” Lessons
73 Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it Lessons
74 Identify ways to control and protect personal data Lessons
75 Demonstrate net etiquette (netiquette) as it relates to cybersecurity Lessons
76 Analyze the social and legal significance of the ongoing collection of personal digital information Lessons
77 Distinguish between data, information, and knowledge Lessons
78 Identify the most common ways data is collected Lessons
79 Identify the most common ways data can be stored Lessons
80 Explain the difference between data at rest, data in transit, and data being processed Lessons
81 Identify the most common ways data is used Lessons
82 Discuss how data can be compromised, corrupted, or lost Lessons
83 Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) Lessons
84 Define the function of a computer operating system Lessons
85 Identify the components of an operating system Lessons
86 List types of operating systems Lessons
87 Evaluate the potential vulnerabilities, threats, and common exploits to an operating system Lessons
88 Identify best practices for protecting operating systems Lessons
89 Describe the concept of malware and techniques to guard against it Lessons
90 Evaluate critical operating system security parameters Lessons
91 Describe security and auditing logs Lessons
92 Describe the role of a system backup Lessons
93 Define virtualization technology Lessons
94 Identify advantages and disadvantages of using virtual machines Lessons
95 Define programming in the context of cybersecurity Lessons
96 Differentiate between computer programming languages Lessons
97 Evaluate common programming flaws that lead to vulnerabilities Lessons
98 Identify best practices in secure coding and design Lessons
99 Identify ubiquitous computing Lessons
100 Discuss security and privacy implications of ubiquitous computing Lessons
101 Research career opportunities for cybersecurity professionals Lessons
102 Identify the educational pathways for emerging cybersecurity professionals Lessons
103 Identify the educational pathways for emerging cybersecurity professionals Lessons
104 Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters Lessons
105 Research the cyber threats and security measures related to career pathways Lessons
106 Identify testing skills/strategies for a certification examination Lessons
107 Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course Lessons
108 Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) Lessons
109 Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) Lessons