Please enable JavaScript to use CodeHS

California 9-12 Standards Mapping

to

Fundamentals of Cybersecurity

30 Standards in this Framework 18 Standards Mapped 60% Mapped to Course


Standard Lessons
9-12.AP.12 Design algorithms to solve computational problems using a combination of original and existing algorithms.
9-12.AP.13 Create more generalized computational solutions using collections instead of repeatedly using simple variables.
9-12.AP.14 Justify the selection of specific control structures by identifying tradeoffs associated with implementation, readability, and performance.
  1. 4.3 Looping
  2. 22.4 If Statements
  3. 22.5 For Loops in JavaScript
  4. 22.9 While Loops
  5. 22.10 Loop and a Half
9-12.AP.15 Iteratively design and develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
9-12.AP.16 Decompose problems into smaller subproblems through systematic analysis, using constructs such as procedures, modules, and/or classes.
9-12.AP.17 Create computational artifacts using modular design.
9-12.AP.18 Systematically design programs for broad audiences by incorporating feedback from users.
9-12.AP.19 Explain the limitations of licenses that restrict use of computational artifacts when using resources such as libraries.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
9-12.AP.20 Iteratively evaluate and refine a computational artifact to enhance its performance, reliability, usability, and accessibility.
9-12.AP.21 Design and develop computational artifacts working in team roles using collaborative tools.
  1. 3.1 Project: Public Service Announcement
9-12.AP.22 Document decisions made during the design process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
9-12.CS.1 Describe ways in which abstractions hide the underlying implementation details of computing systems to simplify user experiences.
  1. 4.1 Programming Concepts
  2. 7.1 Operating Systems
  3. 10.9 Viewing a Webpage
  4. 19.13 Viewing Websites
9-12.CS.2 Compare levels of abstraction and interactions between application software, system software, and hardware.
  1. 7.1 Operating Systems
  2. 10.9 Viewing a Webpage
  3. 11.1 Internal Components
  4. 19.13 Viewing Websites
9-12.CS.3 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
9-12.DA.10 Create data visualizations to help others better understand real-world phenomena.
9-12.DA.11 Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
9-12.DA.8 Translate between different representations of data abstractions of real-world phenomena, such as characters, numbers, and images.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
9-12.DA.9 Describe ​​tradeoffs​ associated with​ ​how​ ​data elements​ ​are​ ​organized​​ and ​stored.
  1. 8.4 Databases
  2. 11.4 Storage Options
9-12.IC.23 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 10.10 Impact of the Internet
9-12.IC.24 Identify impacts of bias and equity deficit on design and implementation of computational artifacts and apply appropriate processes for evaluating issues of bias.
9-12.IC.25 Demonstrate ways a given algorithm applies to problems across disciplines.
9-12.IC.26 Study, discuss, and think critically about the potential impacts and implications of emerging technologies on larger social, economic, and political structures, with evidence from credible sources.
  1. 7.9 Command Line Interface
  2. 10.10 Impact of the Internet
9-12.IC.27 Use collaboration tools and methods to increase connectivity with people of different cultures and careers.
  1. 3.1 Project: Public Service Announcement
9-12.IC.28 Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
9-12.IC.29 Explain the privacy concerns related to the collection and generation of data through automated processes.
  1. 2.4 Privacy & Security
  2. 7.7 Browser Configuration
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
9-12.IC.30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  1. 2.3 Internet Safety
9-12.NI.4 Describe issues that impact network functionality.
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
  3. 11.5 Network Options
9-12.NI.5 Describe the design characteristics of the Internet.
  1. 10.1 Introduction to the Internet
  2. 10.4 Internet Hardware and Sending Information
  3. 10.5 Internet Addresses
  4. 10.6 Domain Name System (DNS)
  5. 10.8 Packets & Protocols
  6. 11.3 Network Devices
9-12.NI.6 Compare and contrast security measures to address various security threats.
  1. 2.4 Privacy & Security
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
  4. 11.6 Network Communication
  5. 11.7 Network Management
9-12.NI.7 Compare and contrast cryptographic techniques to model the secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.5 Basic Crypto Systems: Vigenere Cipher