Please enable JavaScript to use CodeHS

Standards Mapping

for Georgia Advanced Cybersecurity

76

Standards in this Framework

67

Standards Mapped

88%

Mapped to Course

Standard Lessons
IT-ACS-1.1
Communicate effectively through writing, speaking, listening, reading, and interpersonal abilities.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 9.1 The Game of Risk
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 6.1 Project Security Assessment Report
  11. 9.1 The Game of Risk
IT-ACS-1.2
Demonstrate creativity by asking challenging questions and applying innovative procedures and methods.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 9.1 The Game of Risk
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 6.1 Project Security Assessment Report
  11. 9.1 The Game of Risk
IT-ACS-1.3
Exhibit critical thinking and problem solving skills to locate, analyze and apply information in career planning and employment situations.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 9.1 The Game of Risk
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 6.1 Project Security Assessment Report
  11. 9.1 The Game of Risk
IT-ACS-1.4
Model work readiness traits required for success in the workplace including integrity, honesty, accountability, punctuality, time management, and respect for diversity.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 9.1 The Game of Risk
  6. Advanced Cybersecurity
  7. 4.1 Communication is Key!
  8. 4.2 Building a Knowledge Base
  9. 6.1 Project Security Assessment Report
  10. 9.1 The Game of Risk
IT-ACS-1.5
Apply the appropriate skill sets to be productive in a changing, technological, diverse workplace to be able to work independently and apply team work skills.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 9.1 The Game of Risk
  6. Advanced Cybersecurity
  7. 4.1 Communication is Key!
  8. 4.2 Building a Knowledge Base
  9. 6.1 Project Security Assessment Report
  10. 9.1 The Game of Risk
IT-ACS-1.6
Present a professional image through appearance, behavior and language.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 9.1 The Game of Risk
  6. Advanced Cybersecurity
  7. 4.1 Communication is Key!
  8. 4.2 Building a Knowledge Base
  9. 6.1 Project Security Assessment Report
  10. 9.1 The Game of Risk
IT-ACS-2.1
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
  3. 4.9 Browser Configuration
  4. 4.10 System Administration
  5. Advanced Cybersecurity
  6. 5.1 Network Attacks
  7. 5.2 Malware Types and Prevention
  8. 5.3 Common Network Attacks
  9. 5.4 Additional Attacks
  10. 5.5 Cross-site Scripting
  11. 5.6 Internal Threats
  12. 8.2 Assessing Risks
IT-ACS-2.2
Investigate potential abuse and unethical uses of computers and networks.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. Advanced Cybersecurity
  4. 5.1 Network Attacks
  5. 5.2 Malware Types and Prevention
  6. 5.3 Common Network Attacks
  7. 5.4 Additional Attacks
  8. 5.5 Cross-site Scripting
  9. 5.6 Internal Threats
  10. 8.2 Assessing Risks
IT-ACS-2.3
Explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices).
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
  3. Advanced Cybersecurity
  4. 7.4 Level 4: Data and Licenses
IT-ACS-2.4
Differentiate between freeware, shareware, and public domain software copyrights
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
  3. Advanced Cybersecurity
  4. 7.4 Level 4: Data and Licenses
IT-ACS-2.5
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. Advanced Cybersecurity
  4. 7.4 Level 4: Data and Licenses
IT-ACS-2.6
Identify netiquette including the use of e-mail, social networking, blogs, texting, and chatting.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 7.1 Communication is Key!
  4. 7.3 Building a Knowledge Base
  5. Advanced Cybersecurity
  6. 4.1 Communication is Key!
  7. 4.2 Building a Knowledge Base
IT-ACS-2.7
Explain proper netiquette, including the use of e-mail, social networking, blogs, texting, and chatting.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 7.1 Communication is Key!
  4. 7.3 Building a Knowledge Base
  5. Advanced Cybersecurity
  6. 4.1 Communication is Key!
  7. 4.2 Building a Knowledge Base
IT-ACS-2.8
Discuss the importance of cyber safety and the impact of cyber bullying.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.6 Cybersecurity Essentials
IT-ACS-3.1
Analyze and differentiate among types of malware.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. Advanced Cybersecurity
  4. 5.2 Malware Types and Prevention
IT-ACS-3.2
Identify malware code, including strings.
IT-ACS-3.3
Demonstrate skill in handling malware. [NICE 153]
  1. Advanced Cybersecurity
  2. 5.2 Malware Types and Prevention
IT-ACS-3.4
Demonstrate skill in preserving evidence integrity according to standard operating procedures or national standards. [NICE 217].
IT-ACS-4.1
Analyze and differentiate among types of network attacks (e.g., virus, worms, trojans, unpatched software, password cracking, advanced persistent threats, etc.).
  1. Advanced Cybersecurity
  2. 5.1 Network Attacks
  3. 5.3 Common Network Attacks
  4. 5.4 Additional Attacks
IT-ACS-4.2
Distinguish between different social engineering attacks (e.g., baiting, phishing/spear phishing, pretexting/ blagging, tailgating, quid pro quo, etc.).
  1. Advanced Cybersecurity
  2. 5.2 Malware Types and Prevention
  3. 5.4 Additional Attacks
  4. 8.4 Penetration Testing
IT-ACS-4.3
Distinguish between reconnaissance/footprinting, infiltration, network breach, network exploitation, and attack for effects (e.g., deceive, disrupt, degrade, and destroy).
  1. Advanced Cybersecurity
  2. 8.1 Identifying Risks
  3. 8.4 Penetration Testing
IT-ACS-4.4
Demonstrate an understanding of DoS/DDoS, session hijacking, HTTP spoofing, DNS attacks, switch attacks, man-in-the-middle (MITM) attacks, and cross site scripting, and drive-by-attacks.
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
  5. 5.1 Network Attacks
  6. 5.4 Additional Attacks
  7. 5.5 Cross-site Scripting
IT-ACS-5.1
Use and apply appropriate cryptographic tools and products.
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.4 Authentication Methods
  4. Advanced Cybersecurity
  5. 1.2 Encryption Algorithms
  6. 1.3 Advanced Cryptography
  7. 1.4 Hash Functions
  8. 1.5 Hash Function Development
  9. 1.6 Asymmetric Encryption
  10. 1.7 Digital Certificates
IT-ACS-5.2
Explain the core concepts of Public Key Infrastructure
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.3 Advanced Cryptography
  5. 1.6 Asymmetric Encryption
  6. 1.7 Digital Certificates
IT-ACS-5.3
Demonstrate knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]) and implement PKI, certificate management, and associated components. [NICE 79].
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.3 Advanced Cryptography
  5. 1.7 Digital Certificates
  6. 3.6 Access Control
IT-ACS-5.4
Install and configure Pretty Good Privacy (PGP) and send/receive PGP encrypted email.
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
IT-ACS-5.5
Install and view a digital certificate
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
IT-ACS-5.6
Understand and master process to enroll for digital certificates.
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
IT-ACS-5.7
Renew, revoke, backup, and restore public and private key certificates.
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
IT-ACS-5.8
Install and secure a Certificate Authority (CA)
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
IT-ACS-5.9
Backup and restore a Certificate Authority (CA).
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
IT-ACS-6.1
Implement wireless networks in a secure manner.
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
IT-ACS-6.2
Analyze and differentiate among types of wireless attacks.
  1. Advanced Cybersecurity
  2. 5.1 Network Attacks
IT-ACS-6.3
Configure a wireless Access Point (WPA, WPA-2).
IT-ACS-6.4
Demonstrate use of InSSIDer and Netstumbler on wireless communications.
IT-ACS-6.5
Change the power level of a Wireless Local Area Network (WLAN) Access Point.
IT-ACS-6.6
Demonstrate knowledge of Virtual Private Network (VPN) security and configure Virtual Private Network (VPN). [NICE 148]
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ACS-6.7
Demonstrate knowledge of remote access policy Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP).
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ACS-7.1
Explain the impact and proper use of environmental controls.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
  3. Advanced Cybersecurity
  4. 3.2 Environmental Controls
IT-ACS-7.2
Explain the importance of security-related awareness and training.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 5.6 Internal Threats
IT-ACS-7.3
Install environmental controls through Basic Input/Output System (BIOS).
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
  3. Advanced Cybersecurity
  4. 3.2 Environmental Controls
  5. 5.6 Internal Threats
IT-ACS-7.4
Write organizational security policies (email, wireless, etc.).
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
  3. Advanced Cybersecurity
  4. 7.1 Level 1: Entry Event
  5. 7.2 Level 2: User Training
  6. 7.3 Level 3: Incident Response
  7. 7.4 Level 4: Data and Licenses
  8. 7.5 Level 5: Change Management
IT-ACS-8.1
Demonstrate knowledge of incident response and handling methodologies. [NICE 61]
  1. Advanced Cybersecurity
  2. 7.3 Level 3: Incident Response
IT-ACS-8.2
Demonstrate knowledge of incident categories, incident responses, and timelines for responses and compare and contrast aspects of business continuity. [NICE 60]
  1. Fundamentals of Cybersecurity
  2. 8.7 Risky Business
  3. Advanced Cybersecurity
  4. 7.3 Level 3: Incident Response
IT-ACS-8.3
Execute disaster recovery plans and procedures
  1. Advanced Cybersecurity
  2. 7.3 Level 3: Incident Response
IT-ACS-8.4
Demonstrate the ability to capture volatile memory contents
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
IT-ACS-8.5
Perform imaging functions, such as operating system, network, and software configurations.
IT-ACS-8.6
Restore a machine from a known good backup.
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
IT-ACS-9.1
Analyze and differentiate among types of mitigation and deterrent techniques.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 8.3 Risk Response
IT-ACS-9.2
Implement assessment tools and techniques to discover security threats and vulnerabilities.
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business
  5. Advanced Cybersecurity
  6. 8.1 Identifying Risks
IT-ACS-9.3
Explain the proper use of penetration testing versus vulnerability scanning in the context of vulnerability assessments.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. Advanced Cybersecurity
  4. 8.4 Penetration Testing
IT-ACS-9.4
Demonstrate skill in conducting vulnerability scans and recognizing vulnerabilities in security systems (e.g., Nessus, Nmap, Retina). [NICE 3]
  1. Advanced Cybersecurity
  2. 8.1 Identifying Risks
IT-ACS-9.5
Conduct a security audit.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 6.1 Project Security Assessment Report
IT-ACS-9.6
View and modify an Address Resolution Protocol (ARP) table.
IT-ACS-9.7
Evaluate the patch status of a machine.
IT-ACS-9.8
Demonstrate knowledge of packet-level analysis in order to install and view packet sniffer. [NICE 93]
  1. Advanced Cybersecurity
  2. 8.1 Identifying Risks
IT-ACS-9.9
Perform secure data destruction (e.g., Secure Erase, BCWipe).
IT-ACS-10.1
Explain risk-related concepts.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. Advanced Cybersecurity
  4. 8.1 Identifying Risks
  5. 8.2 Assessing Risks
  6. 8.3 Risk Response
IT-ACS-10.2
Perform a risk assessment.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 8.1 Identifying Risks
  6. 8.2 Assessing Risks
  7. 8.3 Risk Response
IT-ACS-10.3
Identify mitigations for risks from risk assessment.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 8.2 Assessing Risks
  6. 8.3 Risk Response
IT-ACS-10.4
Conduct appropriate risk mitigation strategies.
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 8.2 Assessing Risks
  6. 8.3 Risk Response
IT-ACS-11.1
Apply and implement secure network administration principles.
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
  3. Advanced Cybersecurity
  4. 5.6 Internal Threats
IT-ACS-11.2
Demonstrate knowledge of how network services and protocols interact to provide network communications in order to securely implement and use common protocols. [NICE 50]
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
  3. Advanced Cybersecurity
  4. 3.3 Protocols and Standards
IT-ACS-11.3
Identify commonly used default network ports.
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
  3. Advanced Cybersecurity
  4. 3.3 Protocols and Standards
IT-ACS-11.4
Set up a Network Address Translation (NAT) device.
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ACS-11.5
Spoof a Media Access Control (MAC) address.
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ACS-11.6
Configure Virtual Private Network (VPN).
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ACS-11.7
Configure a remote access policy Layer 2 Tunneling Protocol (L2TP) and Point-toPoint Tunneling Protocol (PPTP).
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ACS-11.8
Demonstrate knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol (TCP/IP), Dynamic Host Configuration Protocol (DHCP) and directory services (e.g., Domain Name System (DNS) by setting up common protocols, e.g., Secure Shell (SSH), netstat, Simple Mail Transfer Protocol (SMTP), nslookup, Telnet, DNS/Bind, FTP, IIS/Web Pages, DHCP/DNS server. [NICE 81]
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
  3. 6.11 Network Management
  4. Advanced Cybersecurity
  5. 3.3 Protocols and Standards
IT-ACS-11.9
Locate open ports by completing a port scan.
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
  3. Advanced Cybersecurity
  4. 8.1 Identifying Risks
IT-ACS-11.10
Demonstrate the knowledge and use of network statistics (netstat), a command purpose.
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
IT-ACS-12.1
Explain the goals, mission and objectives of Future Business Leaders of America.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
IT-ACS-12.2
Explore the impact and opportunities a student organization (FBLA) can develop to bring business and education together in a positive working relationship through innovative leadership and career development programs.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
IT-ACS-12.3
Explore the local, state, and national opportunities available to students through participation in related student organization (FBLA) including but not limited to conferences, competitions, community service, philanthropy, and other FBLA activities.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. 16.2 Alternative Learning Opportunities
IT-ACS-12.4
Explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. 16.2 Alternative Learning Opportunities
IT-ACS-12.5
Explore the competitive events related to the content of this course and the required competencies, skills, and knowledge for each related event for individual, team, and chapter competitions.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. 16.2 Alternative Learning Opportunities