Please enable JavaScript to use CodeHS

CompTIA IT Fundamentals Standards Mapping

to

Fundamentals of Cybersecurity

33 Standards in this Framework 33 Standards Mapped 100% Mapped to Course


Standard Lessons
1.1 Compare and contrast notational systems.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
1.2 Compare and contrast fundamental data types and their characteristics.
  1. 4.1 Programming Concepts
1.3 Illustrate the basics of computing and processing.
  1. 11.2 Peripheral Devices
  2. 11.4 Storage Options
1.4 Explain the value of data and information.
  1. 2.6 Creative Credit & Copyright
  2. 8.3 The Value of Data
1.5 Compare and contrast common units of measure.
  1. 7.2 Comparing Operating Systems
  2. 7.3 Compatibility
1.6 Explain the troubleshooting methodology.
  1. 12.1 Methodology
  2. 12.2 Support Practice
2.1 Classify common types of input/output device interfaces.
  1. 11.2 Peripheral Devices
  2. 11.3 Network Devices
2.2 Given a scenario, set up and install common peripheral devices to a laptop/PC.
  1. 11.2 Peripheral Devices
2.3 Explain the purpose of common internal computing components.
  1. 7.2 Comparing Operating Systems
  2. 7.3 Compatibility
  3. 11.1 Internal Components
2.4 Compare and contrast common Internet service types.
  1. 11.3 Network Devices
  2. 11.5 Network Options
2.5 Compare and contrast storage types.
  1. 11.4 Storage Options
2.6 Compare and contrast common computing devices and their purposes.
  1. 1.2 What is Cybersecurity?
2.7 Explain basic networking concepts.
  1. 11.3 Network Devices
  2. 11.5 Network Options
2.8 Given a scenario, install, configure and secure a basic wireless network.
  1. 11.5 Network Options
  2. 12.2 Support Practice
3.1 Explain the purpose of operating systems.
  1. 7.1 Operating Systems
3.2 Compare and contrast components of an operating system.
  1. 7.2 Comparing Operating Systems
  2. 7.3 Compatibility
3.3 Explain the purpose and proper use of software.
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
3.4 Explain methods of application architecture and delivery models.
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
3.5 Given a scenario, configure and use web browsers.
  1. 7.7 Browser Configuration
3.6 Compare and contrast general application concepts and uses.
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
4.1 Compare and contrast programming language categories.
  1. 4.1 Programming Concepts
4.2 Given a scenario, use programming organizational techniques and interpret logic.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 4.6 Organizational Techniques
4.3 Explain the purpose and use of programming concepts.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
5.1 Explain database concepts and the purpose of a database.
  1. 8.4 Databases
  2. 8.6 What is SQL?
  3. 8.7 Basic Querying in SQL
  4. 8.8 Filtering Queries in SQL
5.2 Compare and contrast various database structures.
  1. 8.7 Basic Querying in SQL
  2. 8.8 Filtering Queries in SQL
  3. 8.10 SQL Injection Overview
  4. 8.11 Types of SQLi and Prevention
5.3 Summarize methods used to interface with databases.
  1. 8.4 Databases
  2. 8.7 Basic Querying in SQL
  3. 8.8 Filtering Queries in SQL
6.1 Summarize confidentiality, integrity and availability concerns.
  1. 1.4 The CIA Triad
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
6.2 Explain methods to secure devices and best practices.
  1. 7.6 Application Security
6.3 Summarize behavioral security concepts.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
6.4 Compare and contrast authentication, authorization, accounting and non-repudiation concepts.
  1. 1.4 The CIA Triad
  2. 7.8 System Administration
6.5 Explain password best practices.
  1. 2.4 Privacy & Security
6.6 Explain common uses of encryption.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
  3. 6.1 Project: Classic Cipher Newscast
6.7 Explain business continuity concepts.
  1. 10.7 Routing
  2. 11.4 Storage Options