Please enable JavaScript to use CodeHS

Standards Framework

for FL Fundamentals of Cybersecurity


Standards in this Framework

Standard Description
1.01 Describe and use current and emerging computer technology and software to perform personal and business related tasks.
1.02 Describe the types of communications and networking systems used in workplace environments.
1.03 Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals.
1.04 Troubleshoot problems with computer hardware peripherals.
1.05 Describe ethical, privacy, and security issues and problems associated with computers and information systems.
1.06 Demonstrate proficiency in using the basic features of GUI browsers.
1.07 Configure computer systems to protect against various low-level attacks.
2.01 Identify the most common computer operating systems.
2.02 Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems.
2.03 Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save).
2.04 Demonstrate a working knowledge of standard file formats.
2.05 Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux).
2.06 Differentiate between different operating systems and applications.
2.07 Compare and contrast open source and proprietary software.
2.08 Explain how system utilities are used to maintain computer performance.
2.09 Evaluate criteria for selecting an operating system.
2.10 Configure various operating systems from their default settings to low, medium, and high security level settings.
3.01 Explain how information technology impacts the operation and management of business and society.
3.02 Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile).
3.03 Describe how digital technologies (social media) are changing both work and personal lifestyles.
3.04 Demonstrate an understanding of configuring social media used for business to meet various business requirements.
3.05 Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry.
4.01 Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security.
4.02 Explain the need for, and use of, peripherals and how they can compromise security.
4.03 Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks.
4.04 Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security.
5.01 Explain the need for and use of compilers.
5.02 Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented).
5.03 Compare the various types or classes of programming languages (e.g., compiled, interpretive).
5.04 Differentiate among source code, machine code, interpreters, and compilers.
5.05 Characterize the major categories of programming languages and how they are used.
5.06 Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO.
5.07 Describe the stages in the software development life cycle and explain how to successfully implement them.
5.08 Compare security and vulnerabilities of various programming languages.
6.01 Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI).
6.02 Adhere to published best practices for protecting personal identifiable information when using the Internet.
6.03 Identify trends related to the secure use of information technology in people’s personal and professional lives.
6.04 Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security.
7.01 Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software.
7.02 Describe the purpose of the OSI model and each of its layers.
7.03 Explain specific functions belonging to each OSI model layer.
7.04 Understand how two network nodes communicate through the OSI model.
7.05 Discuss the structure and purpose of data packets and frames.
7.06 Describe the two types of addressing covered by the OSI model.
8.01 Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software.
8.02 Describe the purpose of the TCP/IP model and each of its layers.
8.03 Explain specific functions belonging to each TCP/IP model layer.
8.04 Understand how two network nodes communicate through the TCP/IP model.
8.05 Describe the two types of addressing covered by the TCP/IP model.
9.01 Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling).
9.02 Use common computer and programming terminology.
10.01 Identify and describe web terminology.
10.02 Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh).
10.03 Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil).
10.04 Demonstrate proficiency using search engines, including Boolean search strategies.
10.05 Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF).
10.06 Compare and contrast the roles of web servers and web browsers.
10.07 Compare and contrast MS Web Servers and Linux Web Servers.
11.01 Describe cyber-bullying and its impact on perpetrators and victims.
11.02 Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection.
11.03 Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses.
11.04 Describe the risks associated with online gaming and ways to reduce these risks.
11.05 Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet.
11.06 Describe various risks associated with social networking sites and ways to reduce these risks.
11.07 Describe the risks associated with various conferencing programs and ways to reduce these risks.
11.08 Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites.
12.01 Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music).
12.02 Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music).
13.01 Describe email capabilities and functions.
13.02 Identify components of an email message.
13.03 Identify the components of an email address.
13.04 Identify when to use different email options.
13.05 Attach a file to an email message.
13.06 Forward an email message.
13.07 Use an address book if an address book is available via the school’s Outlook server for the student to use.
13.08 Reply to an email message.
13.09 Use the Internet to perform email activities.
13.10 Identify the appropriate use of email and demonstrate related email etiquette.
13.11 Recognize a fraudulent email and deal with it appropriately.
13.12 Identify common problems associated with widespread use of email.
13.13 Create folders to organize email.
14.01 Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology.
14.02 Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance.
14.03 Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers).
14.04 Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles.
14.05 Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web.
15.01 Determine work priorities, the audience, project budgets, project specifications, and the production schedule.
15.02 Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks.
15.03 Present and defend design projects.
16.01 Locate, comprehend and evaluate key elements of oral and written information.
16.02 Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals).
16.03 Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention.
17.01 Demonstrate knowledge of arithmetic operations.
17.02 Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity.
17.03 Demonstrate an understanding of binary numbers and ASCII characters.
18.01 Discuss the role of creativity in constructing scientific questions, methods and explanations.
18.02 Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings.