Please enable JavaScript to use CodeHS

Arizona 7 Standards Mapping

to

Fundamentals of Cybersecurity

23 Standards in this Framework 13 Standards Mapped 56% Mapped to Course


Standard Lessons
7.CS.D.1 Identify some advantages, disadvantages, and consequences with the design of computer devices based on an analysis of how users interact with devices.
7.CS.HS.1 Design projects that combine hardware and software to collect and exchange data.
7.CS.T.1 Evaluate strategies to fix problems with computing devices and their components within a system.
  1. 12.1 Methodology
  2. 12.2 Support Practice
7.NI.C.1 Evaluate multiple methods of encryption for the secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
  3. 5.3 Basic Crypto Systems: Caesar Cipher
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
  6. 6.1 Project: Classic Cipher Newscast
7.NI.C.2 Explain how physical and digital security measures protect electronic information.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
  6. 8.9 Common Security Problems
  7. 8.10 SQL Injection Overview
  8. 8.11 Types of SQLi and Prevention
7.NI.NCO.1 Compare and contrast models to understand the many protocols used for data transmission.
  1. 10.8 Packets & Protocols
7.DA.CVT.1 Collect and analyze data using computational tools to create models that are meaningful and useful.
7.DA.S.1 Use multiple encoding schemes to represent data, including binary and ASCII.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
7.DA.IM.1 Use computational models and determine the reliability and validity of data they generate.
7.AP.A.1 Use planning strategies, such as flowcharts or pseudocode, to develop algorithms to address complex problems.
7.AP.V.1 Compare and contrast variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
  3. 22.1 Booleans
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.4 If Statements
7.AP.C.1 Design and develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
7.AP.M.1 Decompose problems into parts to facilitate the design, implementation, and review of programs.
  1. 21.1 Challenge Problems
7.AP.M.2 Use procedures with parameters to organize code and make it easier to reuse.
7.AP.PD.1 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
7.AP.PD.2 Incorporate existing code and media into programs, and give attribution.
7.AP.PD.3 Systematically test and refine programs using a range of possible inputs.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
  3. 22.4 If Statements
  4. 22.9 While Loops
7.AP.PD.4 Distribute and execute tasks while maintaining a project timeline when collaboratively developing computational artifacts.
7.AP.PD.5 Document programs to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
7.IC.C.1 Explain how some of the tradeoffs associated with computing technologies can affect people's everyday activities and career options.
  1. 2.1 Digital Footprint and Reputation
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 10.10 Impact of the Internet
7.IC.C.2 Discuss how bias and accessibility issues can impact the functionality of existing technologies.
7.IC.SI.1 Describe the process for creating a computational product by collaborating with others using digital technologies.
  1. 3.1 Project: Public Service Announcement
7.IC.SLE.1 Identify the benefits and risks associated with sharing information digitally.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention