Please enable JavaScript to use CodeHS

FL Fundamentals of Cybersecurity Standards Mapping

to

Fundamentals of Cybersecurity

97 Standards in this Framework 51 Standards Mapped 52% Mapped to Course


Standard Lessons
1.01 Describe and use current and emerging computer technology and software to perform personal and business related tasks.
  1. 7.4 Software and Applications
1.02 Describe the types of communications and networking systems used in workplace environments.
  1. 10.7 Routing
  2. 11.5 Network Options
1.03 Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals.
  1. 12.1 Methodology
1.04 Troubleshoot problems with computer hardware peripherals.
  1. 11.2 Peripheral Devices
  2. 12.1 Methodology
1.05 Describe ethical, privacy, and security issues and problems associated with computers and information systems.
  1. 2.4 Privacy & Security
  2. 2.7 Hacking Ethics
  3. 7.5 Software Licenses
  4. 7.6 Application Security
  5. 8.3 The Value of Data
1.06 Demonstrate proficiency in using the basic features of GUI browsers.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
1.07 Configure computer systems to protect against various low-level attacks.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
2.01 Identify the most common computer operating systems.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
2.02 Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems.
  1. 7.1 Operating Systems
2.03 Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save).
  1. 7.8 System Administration
2.04 Demonstrate a working knowledge of standard file formats.
  1. 7.3 Compatibility
2.05 Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux).
  1. 7.2 Comparing Operating Systems
2.06 Differentiate between different operating systems and applications.
  1. 7.2 Comparing Operating Systems
  2. 7.4 Software and Applications
2.07 Compare and contrast open source and proprietary software.
  1. 7.4 Software and Applications
2.08 Explain how system utilities are used to maintain computer performance.
  1. 7.9 Command Line Interface
  2. 11.7 Network Management
2.09 Evaluate criteria for selecting an operating system.
  1. 7.2 Comparing Operating Systems
2.10 Configure various operating systems from their default settings to low, medium, and high security level settings.
  1. 7.2 Comparing Operating Systems
  2. 7.6 Application Security
3.01 Explain how information technology impacts the operation and management of business and society.
  1. 10.10 Impact of the Internet
3.02 Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile).
  1. 10.1 Introduction to the Internet
  2. 10.4 Internet Hardware and Sending Information
  3. 11.1 Internal Components
3.03 Describe how digital technologies (social media) are changing both work and personal lifestyles.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 10.10 Impact of the Internet
3.04 Demonstrate an understanding of configuring social media used for business to meet various business requirements.
  1. 2.1 Digital Footprint and Reputation
3.05 Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry.
4.01 Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security.
4.02 Explain the need for, and use of, peripherals and how they can compromise security.
  1. 11.2 Peripheral Devices
4.03 Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks.
  1. 11.2 Peripheral Devices
4.04 Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security.
  1. 7.6 Application Security
5.01 Explain the need for and use of compilers.
  1. 4.1 Programming Concepts
5.02 Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented).
5.03 Compare the various types or classes of programming languages (e.g., compiled, interpretive).
  1. 4.1 Programming Concepts
5.04 Differentiate among source code, machine code, interpreters, and compilers.
5.05 Characterize the major categories of programming languages and how they are used.
  1. 4.1 Programming Concepts
5.06 Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO.
5.07 Describe the stages in the software development life cycle and explain how to successfully implement them.
5.08 Compare security and vulnerabilities of various programming languages.
6.01 Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI).
6.02 Adhere to published best practices for protecting personal identifiable information when using the Internet.
  1. 2.3 Internet Safety
6.03 Identify trends related to the secure use of information technology in people’s personal and professional lives.
6.04 Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security.
7.01 Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software.
7.02 Describe the purpose of the OSI model and each of its layers.
7.03 Explain specific functions belonging to each OSI model layer.
7.04 Understand how two network nodes communicate through the OSI model.
7.05 Discuss the structure and purpose of data packets and frames.
7.06 Describe the two types of addressing covered by the OSI model.
8.01 Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software.
8.02 Describe the purpose of the TCP/IP model and each of its layers.
8.03 Explain specific functions belonging to each TCP/IP model layer.
8.04 Understand how two network nodes communicate through the TCP/IP model.
8.05 Describe the two types of addressing covered by the TCP/IP model.
9.01 Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling).
  1. 11.1 Internal Components
9.02 Use common computer and programming terminology.
  1. 4.1 Programming Concepts
  2. 4.3 Looping
  3. 4.5 Arrays and Objects
10.01 Identify and describe web terminology.
  1. 8.1 Inside Web Apps
  2. 10.6 Domain Name System (DNS)
  3. 10.8 Packets & Protocols
10.02 Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh).
  1. 10.5 Internet Addresses
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
10.03 Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil).
  1. 2.5 Information Literacy
10.04 Demonstrate proficiency using search engines, including Boolean search strategies.
  1. 2.5 Information Literacy
10.05 Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF).
10.06 Compare and contrast the roles of web servers and web browsers.
  1. 10.1 Introduction to the Internet
10.07 Compare and contrast MS Web Servers and Linux Web Servers.
11.01 Describe cyber-bullying and its impact on perpetrators and victims.
  1. 2.2 Cyberbullying
11.02 Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection.
  1. 1.3 Impact of Cybersecurity
  2. 7.6 Application Security
11.03 Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses.
  1. 2.3 Internet Safety
11.04 Describe the risks associated with online gaming and ways to reduce these risks.
11.05 Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet.
  1. 2.6 Creative Credit & Copyright
11.06 Describe various risks associated with social networking sites and ways to reduce these risks.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
11.07 Describe the risks associated with various conferencing programs and ways to reduce these risks.
11.08 Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
12.01 Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music).
  1. 7.4 Software and Applications
12.02 Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music).
  1. 7.4 Software and Applications
13.01 Describe email capabilities and functions.
13.02 Identify components of an email message.
  1. 1.3 Impact of Cybersecurity
13.03 Identify the components of an email address.
  1. 1.3 Impact of Cybersecurity
13.04 Identify when to use different email options.
13.05 Attach a file to an email message.
13.06 Forward an email message.
13.07 Use an address book if an address book is available via the school’s Outlook server for the student to use.
13.08 Reply to an email message.
13.09 Use the Internet to perform email activities.
  1. 1.3 Impact of Cybersecurity
13.10 Identify the appropriate use of email and demonstrate related email etiquette.
13.11 Recognize a fraudulent email and deal with it appropriately.
  1. 1.3 Impact of Cybersecurity
13.12 Identify common problems associated with widespread use of email.
13.13 Create folders to organize email.
14.01 Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology.
14.02 Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance.
14.03 Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers).
14.04 Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles.
14.05 Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web.
15.01 Determine work priorities, the audience, project budgets, project specifications, and the production schedule.
15.02 Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks.
15.03 Present and defend design projects.
16.01 Locate, comprehend and evaluate key elements of oral and written information.
16.02 Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals).
16.03 Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention.
  1. 3.1 Project: Public Service Announcement
  2. 9.1 Project: Security Assessment Report
17.01 Demonstrate knowledge of arithmetic operations.
  1. 10.2 Notational Systems
17.02 Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity.
  1. 8.3 The Value of Data
17.03 Demonstrate an understanding of binary numbers and ASCII characters.
  1. 10.3 Data Representation
18.01 Discuss the role of creativity in constructing scientific questions, methods and explanations.
18.02 Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings.