Please enable JavaScript to use CodeHS

Alaska 9-12 Standards Mapping

to

Fundamentals of Cybersecurity

61 Standards in this Framework 38 Standards Mapped 62% Mapped to Course


Standard Lessons
L1.CS.D.01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
L1.CS.HS.01 Explain the interactions between application software, system software, and hardware.
  1. 7.4 Software and Applications
  2. 11.1 Internal Components
L2.CS.HS.01 Identify the interactions of an operating system between software and hardware.
  1. 7.1 Operating Systems
  2. 11.1 Internal Components
L1.CS.T.01 Develop and apply criteria for systematic discovery of errors and strategies for correction in computing systems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
L1.NI.NCO.01 Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks and network protocols (e.g., routers, switches, servers, IP, DNS).
  1. 10.4 Internet Hardware and Sending Information
  2. 10.5 Internet Addresses
  3. 10.6 Domain Name System (DNS)
  4. 10.7 Routing
  5. 10.8 Packets & Protocols
  6. 11.6 Network Communication
L2.NI.NCO.01 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 10.5 Internet Addresses
  2. 10.6 Domain Name System (DNS)
  3. 10.7 Routing
  4. 11.5 Network Options
  5. 11.6 Network Communication
  6. 11.7 Network Management
L1.NI.C.01 Compare various security measures by evaluating tradeoffs between the usability and security of a computing system.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
L1.NI.C.02 Illustrate how sensitive data can be affected by attacks.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 8.4 Databases
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
L1.NI.C.03 Recommend security measures to address various scenarios based on the principles of information security
  1. 2.4 Privacy & Security
  2. 8.9 Common Security Problems
  3. 8.11 Types of SQLi and Prevention
L1.NI.C.04 Explain tradeoffs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government.
  1. 8.9 Common Security Problems
  2. 8.11 Types of SQLi and Prevention
L2.NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.
  1. 8.9 Common Security Problems
  2. 8.11 Types of SQLi and Prevention
L2.NI.C.02 Learn detection and prevention methods to respond to attacks on sensitive data. Develop a response plan that enables recovery from such attacks.
  1. 8.9 Common Security Problems
  2. 8.11 Types of SQLi and Prevention
L1.DA.S.01 Translate and compare different bit representations of real-world phenomena, such as characters, numbers, and images.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
L1.DA.S.02 Review different database types.
  1. 8.4 Databases
L2.DA.S.01 Evaluate and explain the various types of databases, with their specific benefits and limitation.
  1. 8.4 Databases
L1.DA.CVT.01 Use tools and techniques to locate, collect and create visualizations of small and large-scale data sets (e.g., paper surveys, online data sets, etc.).
  1. 8.3 The Value of Data
L2.DA.CVT.01 Use data analysis tools and techniques to identify patterns from complex real- world phenomena.
  1. 8.3 The Value of Data
L2.DA.CVT.02 Generate data sets that support a claim or communicates information using a variety of data collection tools and analysis techniques
L1.DA.IM.01 Use computational models such as data analysis, pattern recognition, and/or simulations to show the relationships between collected data elements.
  1. 8.3 The Value of Data
L2.DA.IM.01 Use models and simulations to help formulate, refine, and test scientific hypotheses.
L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.5 For Loops in JavaScript
  4. 22.6 General For Loops
  5. 22.7 For Loop Practice
  6. 22.9 While Loops
L2.AP.A.01 Describe how artificial intelligence drives many software and physical systems (e.g., autonomous robots, computer vision, pattern recognition, text analysis).
L2.AP.A.02 Develop an artificial intelligence algorithm to play a game against a human opponent or solve a common problem.
  1. 23.1 Control Structures Challenges
L2.AP.A.03 Critically examine and adapt classic algorithms (e.g. selection sort, insertion sort, etc.).
L2.AP.A.04 Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency, correctness, and clarity.
L1.AP.V.01 Demonstrate the use of lists to simplify solutions and to generalize computation problems instead of repeatedly using simple variables.
  1. 4.5 Arrays and Objects
L2.AP.V.01 Compare and contrast simple data structures and their uses (e.g., arrays, lists, stacks, queues, maps, trees, graphs, and databases).
  1. 4.5 Arrays and Objects
L1.AP.C.01 Justify the selection of specific control structures when trade-offs involve implementation, readability, and program performance
L1.AP.C.02 Develop an event-based program that will solve a practical problem, or allow self-expression
L2.AP.C.01 Trace the execution of recursive algorithms, illustrating output and changes in values of named variables.
L1.AP.M.01 Using systematic analysis and design, break down a solution into basic elements such as procedures, functions, or methods.
  1. 4.6 Organizational Techniques
L1.AP.M.02 Create computational artifacts by using common structures to organize, manipulate and/or process data.
L2.AP.M.01 Construct solutions to problems using student-created components, such as functions, procedures, modules, and/or objects
L2.AP.M.02 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution
L2.AP.M.03 Create programming solutions using code reuse and applied technique with appropriate attribution (e.g., libraries, APIs, collaboration software, and versioning software).
L1.AP.PD.01 Create software by analyzing a problem and/or process, developing a solution, testing outcomes, debug, documenting, and adapting the program for a variety of users.
L1.AP.PD.02 Classify and define a variety of software licensing schemes and discuss the advantages and disadvantages of the different schemes in software development (e.g. open source, freeware, commercial).
  1. 7.5 Software Licenses
L1.AP.PD.03 Evaluate and refine computational artifacts to make them more user- friendly, efficient and/or accessible.
L1.AP.PD.04 Design and develop a computational artifact while working in a team
  1. 3.1 Project: Public Service Announcement
L1.AP.PD.05 Using visual aids and documentation, illustrate the design elements and data flow of the development of a complex program (e.g. flowcharts, pseudocode, etc.).
  1. 4.6 Organizational Techniques
L2.AP.PD.01 Compare multiple programming languages and discuss features that make them useful for solving problems and developing systems.
  1. 4.1 Programming Concepts
L2.AP.PD.02 Using the software life cycle process, create software that will provide solutions for a variety of users.
L2.AP.PD.03 Design software in a project team environment using Agile Development methods (e.g., versioning and collaboration systems).
L2.AP.PD.04 Explain security issues that might lead to compromised computer programs.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 8.9 Common Security Problems
  5. 8.11 Types of SQLi and Prevention
L2.AP.PD.05 Develop programs for multiple computing platforms.
L2.AP.PD.06 Develop and use a series of test cases to verify that a program performs according to its design specifications.
L2.AP.PD.07 Through peer review systematically check code for correctness, usability, readability, efficiency, portability, and scalability (e.g. code review).
L2.AP.PD.08 Modify an existing program to add additional functionality and discuss intended and unintended implications with appropriate attribution.
L1.CGEI.C.01 Test and refine computational artifacts to reduce bias and equity deficits
L1.CGEI.C.02 Demonstrate how a given algorithm applies to problems across disciplines.
L2.CGEI.C.01 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 10.10 Impact of the Internet
L2.CGEI.C.02 Based on research, evaluate how computing has revolutionized an aspect of our culture and predict how it might evolve (e.g., education, healthcare, art/entertainment, and energy).
  1. 10.10 Impact of the Internet
L1.CGEI.SI.01 Demonstrate how computing increases connectivity to people in various cultures
  1. 10.10 Impact of the Internet
L1.CGEI.SLE.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation
  1. 2.6 Creative Credit & Copyright
L1.CGEI.SLE.2 Explain the privacy concerns related to the collection and large scale analysis of information about individuals that may not be evident to users (e.g., how businesses, social media, and the government collects and uses data).
  1. 8.3 The Value of Data
L1.CGEI.SLE.3 Evaluate the social and economics implications as related to privacy, data, property, information, and identity in the context of safety, law, or ethics.
  1. 8.4 Databases
L1.CGEI.SLE.4 Describe the beneficial and intrusive aspects of advancing and emerging technologies (e.g., artificial intelligent agents, IoT, robotics).
  1. 10.10 Impact of the Internet
L1.CGEI.SLE.5 Discuss diverse careers that are influenced by computer science and its availability to all regardless of background.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
  5. 10.10 Impact of the Internet
L2.CGEI.SLE.1 Debate laws and regulations that impact the development and use of software.
  1. 2.6 Creative Credit & Copyright
L2.CGEI.SLE.4 Identify the ethical and moral implications encountered in managing and curating knowledge (e.g., harvesting; information overload; knowledge management; reposting; sharing; summarizing).
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
L2.CGEI.SLE.5 Explain how cutting-edge technology may affect the way business is conducted in the future (e.g., eCommerce, entrepreneurship, payment methods, business responsibilities).