Please enable JavaScript to use CodeHS

Delaware 2 Standards Mapping

to

Fundamentals of Cybersecurity

23 Standards in this Framework 15 Standards Mapped 65% Mapped to Course


Standard Lessons
2-AP-10 Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.6 Organizational Techniques
2-AP-11 Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 6.1 Project: Classic Cipher Newscast
  3. 22.1 Booleans
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.4 If Statements
  7. 22.5 For Loops in JavaScript
  8. 22.6 General For Loops
  9. 22.7 For Loop Practice
  10. 22.8 Random Numbers
  11. 22.9 While Loops
  12. 22.10 Loop and a Half
2-AP-12 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 4.4 Branching
2-AP-13 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
2-AP-14 Create procedures with parameters to organize code and make it easier to reuse.
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
  3. 22.6 General For Loops
  4. 22.7 For Loop Practice
  5. 22.8 Random Numbers
  6. 22.9 While Loops
  7. 22.10 Loop and a Half
2-AP-15 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
2-AP-16 Incorporate existing code, media, and libraries into original programs, and give attribution.
2-AP-17 Systematically test and refine programs using a range of test cases.
  1. 4.3 Looping
  2. 4.4 Branching
2-AP-18 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
2-AP-19 Document programs in order to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
  2. 6.1 Project: Classic Cipher Newscast
  3. 22.1 Booleans
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.4 If Statements
  7. 22.5 For Loops in JavaScript
  8. 22.6 General For Loops
  9. 22.7 For Loop Practice
  10. 22.8 Random Numbers
  11. 22.9 While Loops
  12. 22.10 Loop and a Half
2-CS-01 Recommend improvements to the design of computing devices, based on an analysis of how users interact with the devices.
2-CS-02 Design projects that combine hardware and software components to collect and exchange data.
2-CS-03 Systematically identify and fix problems with computing devices and their components.
  1. 12.1 Methodology
  2. 12.2 Support Practice
2-DA-07 Represent data using multiple encoding schemes.
  1. 9.1 Project: Security Assessment Report
  2. 10.2 Notational Systems
  3. 10.3 Data Representation
  4. 10.8 Packets & Protocols
  5. 10.9 Viewing a Webpage
2-DA-08 Collect data using computational tools and transform the data to make it more useful and reliable.
2-DA-09 Refine computational models based on the data they have generated.
  1. 8.7 Basic Querying in SQL
  2. 8.8 Filtering Queries in SQL
  3. 9.1 Project: Security Assessment Report
2-IC-20 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 1.1 Module Overview - Cybersecurity
  2. 1.2 What is Cybersecurity?
  3. 1.3 Impact of Cybersecurity
  4. 2.1 Digital Footprint and Reputation
  5. 2.2 Cyberbullying
  6. 2.3 Internet Safety
  7. 2.4 Privacy & Security
  8. 2.5 Information Literacy
  9. 2.6 Creative Credit & Copyright
  10. 2.7 Hacking Ethics
  11. 3.1 Project: Public Service Announcement
  12. 5.1 Cryptography, Cryptology, Cryptanalysis
  13. 5.2 History of Cryptography
  14. 6.1 Project: Classic Cipher Newscast
  15. 8.9 Common Security Problems
  16. 9.1 Project: Security Assessment Report
  17. 10.10 Impact of the Internet
2-IC-21 Discuss issues of bias and accessibility in the design of existing technologies.
  1. 2.2 Cyberbullying
  2. 3.1 Project: Public Service Announcement
  3. 10.10 Impact of the Internet
2-IC-22 Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
2-IC-23 Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.4 The CIA Triad
  4. 2.1 Digital Footprint and Reputation
  5. 2.2 Cyberbullying
  6. 2.3 Internet Safety
  7. 2.4 Privacy & Security
  8. 2.6 Creative Credit & Copyright
  9. 3.1 Project: Public Service Announcement
  10. 5.2 History of Cryptography
  11. 6.1 Project: Classic Cipher Newscast
  12. 7.6 Application Security
  13. 8.9 Common Security Problems
  14. 8.11 Types of SQLi and Prevention
  15. 9.1 Project: Security Assessment Report
  16. 10.10 Impact of the Internet
2-NI-04 Model the role of protocols in transmitting data across networks and the Internet.
  1. 10.5 Internet Addresses
  2. 10.8 Packets & Protocols
  3. 10.9 Viewing a Webpage
  4. 11.6 Network Communication
2-NI-05 Explain how physical and digital security measures protect electronic information.
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
  3. 2.7 Hacking Ethics
  4. 3.1 Project: Public Service Announcement
  5. 5.1 Cryptography, Cryptology, Cryptanalysis
  6. 5.2 History of Cryptography
  7. 6.1 Project: Classic Cipher Newscast
  8. 7.6 Application Security
  9. 8.9 Common Security Problems
  10. 8.11 Types of SQLi and Prevention
  11. 9.1 Project: Security Assessment Report
  12. 10.7 Routing
  13. 10.8 Packets & Protocols
  14. 10.9 Viewing a Webpage
2-NI-06 Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 6.1 Project: Classic Cipher Newscast