Please enable JavaScript to use CodeHS

Standards Mapping

for Arizona Network Security

89

Standards in this Framework

56

Standards Mapped

62%

Mapped to Course

Standard Lessons
1.1
Explain network security (e.g., the protection of data that is stored on the network or which is in transit across, into, and out of the network)
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
  5. 8.1 Data as a Resource
1.2
Describe the responsibilities of a network security technician (i.e., ensure the network works securely, test and configure software, provide IT support, troubleshoot the network or server, resolve infrastructure issues, etc.)
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
  4. Advanced Cybersecurity
  5. 4.1 Communication is Key!
1.3
Identify skills and ethical characteristics needed to be a successful network security technician (i.e., critical thinking, problem solving, prioritizing, reading, and interpreting network diagrams and technical schematics, preparing and presenting technical information verbally and in writing to different audiences, keeping up to date on network security, etc.)
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
  4. Advanced Cybersecurity
  5. 4.1 Communication is Key!
1.4
Describe education and training opportunities including industry certifications and licensures (i.e., CompTIA, CISCO, CISSP, CEH, etc.)
  1. Fundamentals of Cybersecurity
  2. 10.1 After Fundamentals of Cybersecurity
1.5
Identify career opportunities in network security
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
  4. Advanced Cybersecurity
  5. 4.1 Communication is Key!
2.1
Identify hazards and unsafe practices that can lead to serious accidents or injuries (i.e., electrostatic discharge hazards, poor ergonomic practices, etc.)
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
2.2
Describe OSHA and other state and national regulations designed to reduce safety risks and workplace injuries
2.3
Explain environmental considerations when disposing of computer/network components (i.e., disposing of batteries, devices with lithium batteries, etc.)
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
2.4
Use techniques to manage power consumption in the networked environment (i.e., test wattage usage, power control, explore green methods such as climate batteries and energy efficiency methods, cloud-based software, etc.)
2.5
Identify energy efficiencies and suggest ways to improve consumption (i.e., office environment AC units, thermostats, computer power settings, etc.)
2.6
Use, maintain, and store tools and equipment according to manufacturer’s standards
3.1
Define the number base systems in mathematics related to network technology
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
3.2
Perform decimal to binary and binary to decimal conversions (e.g., dotted decimal IPv4)
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
  3. 5.2 Bits, Text, and Numbers
3.3
Perform decimal to hexadecimal and hexadecimal to decimal conversions
3.4
Perform hexadecimal to binary and binary to hexadecimal conversions
3.5
Determine the appropriate method to perform conversions (e.g., paper-pencil and electronic resources)
3.6
Use basic Boolean logic for actions such as Google searches and scripting (e.g., and, not, and or)
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
4.1
Define a computer and describe its components and their basic functions (i.e., OSI Model and TCP/IP Model; Input Unit, Output Unit, and Central Processing Unit; displaying data, coding, transferring and processing data; programming programs; etc.)
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.8 OSI Model
  4. 6.1 Internal Components
  5. 6.3 Peripheral Devices
4.2
Discuss the evolution of computers and future trends in computer networking (i.e., ARPANET, Internet of Things (IoT), privacy, etc.) and societal impacts
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. 1.6 Cybersecurity Essentials
  4. 5.6 Routing and Packets
4.3
Discuss issues and controversies pertaining to the evolution of mobile computing and the dissemination and centralization of data and its societal impacts (i.e., IoT, Microsoft, Google, anticompetitive practices, privacy, etc.)
4.4
Explain an information system’s structure and components (e.g., applications, media, network devices, operating systems, and servers)
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.6 Software and Applications
  4. 6.4 Storage Options
  5. 6.5 Network Devices
4.5
Discuss recent advancements in cybersecurity technologies, threats, and the basics of artificial intelligence (AI) concerning network security
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
  3. 2.1 Cryptography: Then, Now, and Future
4.6
Discuss emerging problem-solving methodologies such as Zero Trust principles and AI-driven threat detection
  1. Advanced Cybersecurity
  2. 5.4 Additional Attacks
  3. 8.4 Penetration Testing
5.1
Explain the risk management process (i.e., define risk, determine risk level, identify methods to address risk, identify inventory assets that may be compromised, identify functionalities, etc.)
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
5.2
Define network threats to data availability, confidentiality, and integrity
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
5.3
Discuss and give examples of the severity of data loss to an individual and to an organization
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
5.4
Identify security threats related to computer data, hardware, and software (e.g., denial of service, eavesdropping, intrusion, unauthorized access, spoofing, tampering, etc.)
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 2.4 Authentication Methods
  4. Advanced Cybersecurity
  5. 5.4 Additional Attacks
5.5
Explain the importance of physical security of computer and network hardware following best practices (e.g., cameras, locks, USB port blocking, encryption, bit-locker for Windows, and LBM for Linux)
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
5.6
Describe network threats (e.g., denial of service, email spoofing, hacking/cracking, intrusion, malware, phishing, social engineering, spamming, etc.)
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
  3. Advanced Cybersecurity
  4. 5.2 Malware Types and Prevention
5.7
Describe best practices to protect against network threats of data at rest, data in transit, and data during processing (e.g., access control, antivirus software, awareness and training, encryption, firewalls, intrusion detection/prevention, network segmentation, port/service blocking, software updates, etc.)
  1. Fundamentals of Cybersecurity
  2. 8.1 Data as a Resource
  3. 8.6 Checking for Vulnerabilities
5.8
Describe password best practices (e.g., authentication, authorization, accountability, passphrases, physical keys, password managers, complexity, etc.)
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
5.9
Analyze authentication methods used to secure access to the network (e.g., biometrics, key cards, multi-factor authentication (MFA), single sign-on (SSO), two-factor authentication (2FA), etc.)
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
5.10
Identify best practices for access control (e.g., changing default passwords, disabling unused accounts, least privileges, role-based access control, etc.)
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
6.1
Explain the purpose of and types of network media (e.g., fiber optic cable, coaxial cable, ethernet, etc.)
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
6.2
Explain the purpose and types of topologies (e.g., bus, ring, tree, star, mesh, etc.)
6.3
Compare proper physical network topology
6.4
Identify appropriate connectors, media types, and uses for various networks
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
6.5
Compare physical and virtual networks (e.g., SD-WAN, VLAN, etc.)
  1. Fundamentals of Cybersecurity
  2. 5.4 What is the Internet?
6.6
Specify the characteristics of physical network technologies including cable types, length, speed, and topology
6.7
Specify the characteristics of wireless network technologies including frequency, speed, topology, and transmission (e.g., 5G, Bluetooth, IoT, etc.)
6.8
Describe the structure of the internet (network of networks)
  1. Fundamentals of Cybersecurity
  2. 5.4 What is the Internet?
6.9
Identify the features, functions, and purpose of commonly used network components (e.g., routers, modems, switches, NIC, etc.)
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
7.1
Define a network protocol and explain how it works (e.g., routing protocols)
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 5.8 OSI Model
7.2
Describe the characteristics and use of the four-layer TCP/IP model (e.g., Media Access Control (MAC))
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.8 OSI Model
7.3
Describe the characteristics and use of the seven layers of the OSI model
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
7.4
Explain the concept of ports and identify the port ranges used in networking services and protocols (e.g., dynamic/private, system, user)
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
7.5
Explain the purpose of dynamic and static routing protocols
7.6
Describe standard network ports and protocols (e.g., DNS, DHCP, FTP, HTTP, POP, SMTP, HTTPS, SFTP, VPN, SSH, ICMP/ARP, etc.)
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
7.7
Describe the applications and characteristics of TCP and UDP
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
7.8
Differentiate IPv4/IPv6 addresses and their corresponding subnet masks (e.g., classful networks, CIDR, private vs. public IP)
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
7.9
Summarize the basic characteristics and protocols of MAN, SD-WAN, and WAN technologies (e.g., frame relay, etc.)
7.10
Describe remote access protocols and services (e.g., RDP, terminal emulator, etc.)
7.11
Describe the function and purpose of security protocols (e.g., HTTPS, SFTP, VPN, PPTP, etc.)
7.12
Explain the importance of proper documentation according to industry standards
7.13
Discuss where RFCs (standards) are developed (e.g., IETF, IEEE, 3GPP, etc.)
7.14
Describe methods to determine priorities in establishing and maintaining a computer network
  1. Fundamentals of Cybersecurity
  2. 8.7 Risky Business
8.1
Design a network map with virtual and physical segments (e.g., logical network map)
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
8.2
Construct dynamic and static routes
8.3
Explain labeling according to industry standards (e.g., cable, device, rack, wall plates, etc.)
8.4
Describe the components needed and purpose to build fault tolerance into a network
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 6.7 Network Options
8.5
Describe the purpose of a disaster recovery plan for a network
8.6
Install and configure a physical and/or virtual networking system (e.g., Linux/UNIX, Windows)
8.7
Configure network cards, network settings, and an operating system that provides common services for computer programs
8.8
Configure and connect devices to the network (e.g., computers, printers, routers, switches, etc.)
8.9
Identify and use tools for diagnostic tasks or network repair (e.g., Traceroute, ipconfig, Ping, etc.)
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 6.11 Network Management
9.1
Explain how to harden the network against unauthorized access and abuse
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
9.2
Explain the difference among hardening, patching, and types of vulnerabilities (e.g., social, cognitive, environmental, etc.)
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
9.3
Identify common network threats (e.g., denial of service, eavesdropping, intrusion, etc.)
9.4
Identify physical network threats (e.g., disrupting media, environmental/power disruption, etc.)
9.5
Describe the benefits and purpose of segmenting networks (e.g., VLAN, DMZ, etc.)
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
9.6
Describe the benefits of enabling and disabling ports and network services
  1. Fundamentals of Cybersecurity
  2. 8.7 Risky Business
9.7
Describe techniques to secure a Wi-Fi network (e.g., WPA, WPA3, etc.)
9.8
Explain the principles of firewall rules and their importance in network hardening
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
9.9
Describe the benefits, disadvantages, and purposes of using a proxy service
  1. Fundamentals of Cybersecurity
  2. 4.9 Browser Configuration
9.10
Describe the benefits, disadvantages, and purposes of using network intrusion detection/prevention systems (e.g., IDS/IPS, SIEM, etc.)
  1. Advanced Cybersecurity
  2. 3.1 Network Administrator
10.1
Explain the troubleshooting process (e.g., define problem, identify probable cause, test hypothesis, create action, implement action plan, verify solution, and document)
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
10.2
Prepare a work/maintenance plan and prioritize and schedule network security tasks (e.g., Cron Jobs)
10.3
Describe the purpose and benefits of network utilities (e.g., netstat, nslookup, Ping, Traceroute, etc.)
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
10.4
Demonstrate the use of visual indicators and diagnostic utilities (e.g., Wireshark) to interpret problems
10.5
Identify connectivity issues in various node environments (e.g., smartphones, switches, tablets, Linux/UNIX, Windows, etc.)
10.6
Identify and resolve network issues (e.g., cable failure, connection failure, environmental, misconfigurations, power failure, user error, etc.)
10.7
Identify common tools and methods for monitoring a network (e.g., automation, scripting, AI tools, etc.)
10.8
Describe AI and Machine Learning-based tools for network maintenance and issue resolution
11.1
Research issues regarding intellectual property rights including software licensing and software duplication (e.g., Business Software Alliance, Creative Commons, Digital Right Management, EFF, and Intellectual Property Watch)
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
11.2
Differentiate among freeware, open source, proprietary, and shareware software relative to legal and ethical issues
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
11.3
Identify issues, laws, and trends affecting data and privacy (e.g., CNP, GDPR, HIPAA, PCI-DSS, SOX, FCC, FERPA)
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
11.4
Describe acceptable use of industry-related data, private and public networks, and social networking
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.2 Personal Data and Collection
11.5
Research how data privacy laws and regulations influence network security business practices
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
11.6
Discuss the responsibilities of network security professionals (e.g., protecting organizational assets, and maintaining consistent and equitable cyber practices) and explore consequences of unethical behavior to include personal legal liability
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws