Please enable JavaScript to use CodeHS

Arizona 6 Standards Mapping

to

Fundamentals of Cybersecurity

23 Standards in this Framework 16 Standards Mapped 69% Mapped to Course


Standard Lessons
6.CS.D.1 Compare computing device designs based on how humans interact with them.
6.CS.HS.1 Explain how hardware and software can be used to collect and exchange data.
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 11.2 Peripheral Devices
6.CS.T.1 Identify problems that can occur in computing devices and their components within a system.
  1. 12.1 Methodology
  2. 12.2 Support Practice
6.NI.C.1 Identify multiple methods of encryption to secure the transmission of information.
  1. 5.2 History of Cryptography
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 6.1 Project: Classic Cipher Newscast
6.NI.C.2 Identify different physical and digital security measures that protect electronic information.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
6.NI.NCO.1 Discuss how protocols are used in transmitting data across networks and the Internet.
  1. 10.8 Packets & Protocols
6.DA.CVT.1 Compare different computational tools used to collect, analyze and present data that is meaningful and useful.
  1. 8.4 Databases
  2. 8.6 What is SQL?
  3. 8.7 Basic Querying in SQL
  4. 8.8 Filtering Queries in SQL
6.DA.S.1 Identify multiple encoding schemes used to represent data, including binary and ASCII.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6.DA.IM.1 Discuss the validity of a computational model based on the reliability of the data.
6.AP.A.1 Identify planning strategies such as flowcharts or pseudocode, to simulate algorithms that solve problems.
  1. 4.6 Organizational Techniques
6.AP.V.1 Identify variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
6.AP.C.1 Design programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
6.AP.M.1 Decompose problems into parts to facilitate the design, implementation, and review of programs.
  1. 21.1 Challenge Problems
6.AP.M.2 Use procedures to organize code and make it easier to reuse.
  1. 21.1 Challenge Problems
6.AP.PD.1 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6.AP.PD.2 Incorporate existing code into programs and give attribution.
6.AP.PD.3 Test programs using a range of inputs and identify expected outputs.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
  3. 22.4 If Statements
  4. 22.9 While Loops
6.AP.PD.4 Maintain a timeline with specific tasks while collaboratively developing computational artifacts.
6.AP.PD.5 Document programs in order to make them easier to follow, test, and debug
  1. 4.6 Organizational Techniques
6.IC.C.1 Identify some of the tradeoffs associated with computing technologies that can affect people's everyday activities and career options.
  1. 1.2 What is Cybersecurity?
  2. 2.1 Digital Footprint and Reputation
  3. 10.10 Impact of the Internet
6.IC.C.2 Identify issues of bias and accessibility in the design of existing technologies.
6.IC.SI.1 Identify the advantages of creating a computational product by collaborating with others using digital technologies.
6.IC.SLE.1 Describe how some digital information can be public or can be kept private and secure.
  1. 1.4 The CIA Triad
  2. 2.1 Digital Footprint and Reputation
  3. 2.4 Privacy & Security