Please enable JavaScript to use CodeHS

Standards Mapping

for California Networking Pathway

39

Standards in this Framework

15

Standards Mapped

38%

Mapped to Course

Standard Lessons
B1.1
Define the terminology used in the design, assembly, configuration, and implementation of networks.
  1. 3.1 Network Administrator
  2. 3.2 Environmental Controls
  3. 3.4 Private Networks
B1.2
List the fundamental elements of the major networking models established by the industry standards of recognized organizations: the Open System Interconnect (OSI) or transmission-control/Internet protocol (TCP/IP) models.
  1. 5.1 Network Attacks
  2. 16.1 Advanced Networking
B1.3
Identify and explain how data, voice, and video/communications are carried through the most common network media.
B1.4
List the characteristics, advantages, and disadvantages of the various networking presentation functions, data formatting, data encryption, and data compression.
B1.5
Explain the characteristics of networking hardware and applications and the methods to deploy them.
B1.6
Design and document data/communication systems networks.
B2.1
Use appropriate wiring and wireless standards and plan, install, and maintain media (copper, fiber, and wireless) for a variety of network systems.
B2.2
Demonstrate standard procedures and practices for safely using tools and working safely around the electrical environment in various networking systems.
B2.3
Test and maintain wired and wireless network communications components and systems.
B3.1
Identify and describe the functions of various network devices, including network connectivity hardware.
B3.2
Describe the differences between various network environments: peer-to-peer, client-server, thin client, virtualized, internetworks, intranets, and extranets.
  1. 3.4 Private Networks
B3.3
Distinguish between the topologies and protocols of local area networks and those of wide area networks.
B3.4
Confirm operating parameters, apply test procedures, make necessary adjustments, and assemble the components of a network system or subsystem.
B3.5
Configure the major addressing and routing protocols used in networking.
  1. 3.3 Protocols and Standards
B3.6
Implement a functional wired and wireless network, including the installation and configuration of components, software, and plug-ins.
B3.7
Evaluate, select, and deploy a variety of network architectures, information and communication technologies, and protocols.
B4.1
Identify and use network tools to troubleshoot and verify network availability and performance.
B4.2
Identify common customer policies and procedures, including those for management of incidents.
B4.3
Identify the implications of major protocols and international standards and their impact on network management.
  1. 3.3 Protocols and Standards
B4.4
Apply appropriate technologies to improve network performance for data, voice, and video transmission.
B4.5
Apply the proper security patches, updates, and procedures necessary to maintain and support a network.
  1. 8.1 Identifying Risks
  2. 8.2 Assessing Risks
  3. 8.3 Risk Response
  4. 8.4 Penetration Testing
B4.6
Use common help-desk tools and resources, such as incident tracking, knowledge database, and staffing to administer and manage a network.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
B4.7
Apply known effective methods of disseminating information and instruction to users.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
B4.8
Use project management skills and tools for managing and maintaining various types of networks.
B4.9
Analyze network system interdependencies and constraints.
B5.1
Classify and use various electronic components, symbols, abbreviations, and media common to network topology diagrams.
B5.2
Interpret, organize, and communicate complex network diagrams by using information collected from detailed drawings.
  1. 3.1 Network Administrator
B6.1
Identify and document the appropriate uses of networking services, products, and applications.
B6.2
Evaluate the features of communications software products in terms of their appropriateness to organizational tasks.
B6.3
Configure compatible systems across various platforms and types of media.
B7.1
Describe the effective management of human, financial, and communications resources from the standpoints of the user and the provider.
B7.2
Diagram physical and logical layouts of networks that support information and communication technologies.
B7.3
Evaluate emerging products, services, and business models in relation to the creation, setup, and management of networks that support information and communication technologies.
B7.4
Evaluate, create, and process voice, video, and data transmissions.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
B8.1
Identify and define command network security threats: hackers, crackers, viruses, worms, and Trojan horses.
  1. 5.2 Malware Types and Prevention
  2. 8.1 Identifying Risks
B8.2
Describe the importance of classifying appropriate monitoring devices and procedures for quick identification and prevention of security violations.
  1. 3.6 Access Control
  2. 5.6 Internal Threats
B8.3
List the policies and procedures for routine administration, such as user agreement, incident reporting, and recovery for users.
  1. 7.1 Level 1: Entry Event
  2. 7.2 Level 2: User Training
  3. 7.3 Level 3: Incident Response
  4. 7.4 Level 4: Data and Licenses
  5. 7.5 Level 5: Change Management
B8.4
Identify common potential risks and entrance points, including internal and external risks, and the tools used to neutralize them: firewalls; monitoring; and antivirus, spyware, and spam protection.
  1. 3.1 Network Administrator
B8.5
Identify and apply common techniques for disaster prevention and recovery.
  1. 5.2 Malware Types and Prevention
  2. 6.1 Project Security Assessment Report
  3. 8.1 Identifying Risks
  4. 8.2 Assessing Risks
  5. 8.3 Risk Response