Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado Computer Science Foundations

35

Standards in this Framework

17

Standards Mapped

48%

Mapped to Course

Standard Lessons
CSF.1
Perform safe practices within the classroom: a) Accurately read and interpret safety rules, including but not limited to rules pertaining to electrical safety, Occupational Safety and Health Administration (OSHA) guidelines, internet safety, and state and national code requirements, b) Identify and explain the intended use of safety equipment available in the classroom, c) Demonstrate how to properly inspect, use, and maintain safe operating procedures with tools and equipment, d) Incorporate safety procedure
  1. Fundamentals of Cybersecurity
  2. 16.4 Personal Safety
  3. Tennessee Cybersecurity I
  4. 11.4 Personal Safety
CSF.2
Identify various fields within information technology and their respective career opportunities: a) Recognize the work typically performed, tools and technology used, and nature of work environment, b) Identify potential certification opportunities, c) Find membership organizations associated with the careers, d) Understand the necessary education associated within the careers, e) Research security clearance requirements associated within the careers.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
  4. 16.1 Student Organizations
  5. Tennessee Cybersecurity I
  6. 11.1 Student Organizations
CSF.3
Demonstrate basic understanding of electrical circuits and devices.
CSF.4
Distinguish between the binary and hexadecimal counting systems: a) Use appropriate units, b) Provide examples of each system within the IT setting.
CSF.5
Explain the functions of gates in logistic circuits.
CSF.6
Identify basic hardware components and their functions: a) Hardware used for input and output, b) Hardware inside the computer case, c) Motherboard, d) Processor and the chipset, e) Storage devices, f) Expansion cards, g) Electrical system.
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
  3. 6.2 Lab: Computer Disassembly
  4. 6.3 Peripheral Devices
  5. 6.4 Storage Options
  6. 6.5 Network Devices
  7. Tennessee Cybersecurity I
  8. 5.1 Internal Components
  9. 5.2 Lab: Computer Disassembly
  10. 5.3 Peripheral Devices
CSF.7
Outline the evolution of the internet.
CSF.8
Explain basic web terminology and concepts: a) Server, b) Domain name system (DNS), c) Internet service provider (ISP), d) Hardware and software connective devices, e) Cloud computing, f) Remote access protocols, g) Map protocols, h) Content management systems (CMS), i) Cascading style sheets (CSS), j) Social networking terms.
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
  3. 5.6 Routing and Packets
  4. 5.7 How Do Websites Work?
  5. 5.8 OSI Model
  6. Tennessee Cybersecurity I
  7. 4.7 How Do Websites Work?
CSF.9
Compare and contrast the general capabilities of a variety of operating systems: a) Summarize the evolution of operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
  4. Tennessee Cybersecurity I
  5. 3.1 Operating Systems
CSF.10
Explain the types of networks and what a client-server environment is.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
  3. Tennessee Cybersecurity I
  4. 5.9 Network Administrator
CSF.11
Evolution of cloud computing.
CSF.12
Identify roles in cloud computing: a) Cloud computing customer, b) Cloud service provider, c) Cloud service partner.
CSF.13
Four main deployment models for cloud technology: a) Public, b) Private, c) Community, d) Hybrid.
CSF.14
Describe how virtualization, storage, networking, and databases in cloud technologies are used.
CSF.15
Internet of Things.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. 1.6 Cybersecurity Essentials
CSF.16
Databases, data collection systems, data analytics and other strategies that optimize statistical efficiency quality.
CSF.17
Explain the steps of the web design and development process.
CSF.18
Identify the specific activities involved at each step of the troubleshooting process.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
CSF.19
Create a flowchart that would guide code development that incorporates decisions and/or paths to solve a problem.
CSF.20
Explain various roles and responsibilities for members of a web design and development team.
CSF.21
Synthesize common principles and templates for successful project management.
CSF.22
Identify the skills that are required to communicate effectively with a client.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
CSF.23
Identify appropriate writing techniques and style for web publications.
  1. Fundamentals of Cybersecurity
  2. 7.3 Building a Knowledge Base
CSF.24
Given a specific client’s vision, create a simple website using a content management system.
CSF.25
Research various social, legal, and ethical issues encountered by IT professionals: a) Copyright laws, b) Open source software.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 4.7 Software Licenses
  4. Tennessee Cybersecurity I
  5. 1.4 Cyber Ethics and Laws
  6. 3.5 Software Licenses
CSF.26
Organization of Materials: a) Demonstrate effective use of file and folder management techniques to maintain directory structures for a website.
CSF.27
Determine security fundamentals on confidentiality, availability, and integrity.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
CSF.28
Identify various security breaches that can occur with the internet.
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
CSF.29
Enterprise-level security.
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business
  5. Tennessee Cybersecurity I
  6. 7.7 Risky Business
CSF.30
Encryption.
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
  5. Tennessee Cybersecurity I
  6. 2.2 Symmetric Encryption
  7. 2.3 Asymmetric Encryption
  8. 2.4 Authentication Methods
CSF.31
Protocols that can be implemented to secure websites.
  1. Tennessee Cybersecurity I
  2. 3.9 System Administration
CSF.32
Compare and contrast personal privacy issues versus employers’ rights to regulate computing resources.
CSF.33
Identify various security practices for computer and network systems: a) Controlled access to secure resources and computer resources, b) Encryption techniques, c) Basic input/output systems (BIOS) features, d) Strategies for dealing with malware.
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
  5. 4.10 System Administration
  6. Tennessee Cybersecurity I
  7. 2.2 Symmetric Encryption
  8. 2.3 Asymmetric Encryption
  9. 2.4 Authentication Methods
CSF.34
Explain why various languages exist.
CSF.35
Explain the steps involved in the software development life cycle and why it is iterative.