Please enable JavaScript to use CodeHS

Standards Mapping

for Georgia Introduction to Cybersecurity

86

Standards in this Framework

48

Standards Mapped

55%

Mapped to Course

Standard Lessons
IT-ICS-1.1
Communicate effectively through writing, speaking, listening, reading, and interpersonal abilities.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 11.1 Methodology
  4. 11.2 Support Practice
  5. 14.1 Project: Security Assessment Report
IT-ICS-1.2
Demonstrate creativity by asking challenging questions and applying innovative procedures and methods.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 11.1 Methodology
  4. 11.2 Support Practice
  5. 14.1 Project: Security Assessment Report
IT-ICS-1.3
Exhibit critical thinking and problem solving skills to locate, analyze and apply information in career planning and employment situations.
  1. 11.1 Methodology
  2. 11.2 Support Practice
  3. 14.1 Project: Security Assessment Report
IT-ICS-1.4
Model work readiness traits required for success in the workplace including integrity, honesty, accountability, punctuality, time management, and respect for diversity.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 11.1 Methodology
  4. 11.2 Support Practice
  5. 14.1 Project: Security Assessment Report
IT-ICS-1.5
Apply the appropriate skill sets to be productive in a changing, technological, diverse workplace to be able to work independently and apply team work skills.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 11.1 Methodology
  4. 11.2 Support Practice
  5. 14.1 Project: Security Assessment Report
IT-ICS-1.6
Present a professional image through appearance, behavior and language.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 11.1 Methodology
  4. 11.2 Support Practice
  5. 14.1 Project: Security Assessment Report
IT-ICS-2.1
Explain the importance of data security
  1. 8.3 The Value of Data
  2. 8.9 Common Security Problems
IT-ICS-2.2
Explain the concepts of confidentiality, integrity, availability, authentication, and nonrepudiation. [NICE 63]
  1. 1.4 The CIA Triad
IT-ICS-2.3
Research current events on breaches; focus on particular Information Assurance (IA) areas that were compromised. [NICE 165]
  1. 1.3 Impact of Cybersecurity
IT-ICS-2.4
Explain the importance of physical security.
  1. 2.4 Privacy & Security
IT-ICS-3.1
Define and identify the different types of LANs.
  1. 9.1 Introduction to the Internet
  2. 10.5 Network Options
IT-ICS-3.2
Identify and describe the purpose for a perimeter network.
  1. 10.6 Network Communication
IT-ICS-3.3
Identify the different network topologies to include client/server and peer-to-peer distributed networks.
  1. 8.5 Clients and Servers
IT-ICS-3.4
Define and describe Ethernet standards.
  1. 10.5 Network Options
IT-ICS-3.5
Identify twisted-pair cable, cabling tools, cabling testers and describe what can interfere with twisted-pair cabling, and how to avoid it.
  1. 10.3 Network Devices
IT-ICS-3.6
Identify wireless devices, wireless settings and configurations, wireless standards, and encryption protocols.
  1. 10.3 Network Devices
  2. 10.5 Network Options
IT-ICS-3.7
Explain the differences between static and dynamic routing
IT-ICS-3.8
Explain how to install and configure Routing and Remote Access Service (RRAS) to function as a network router and how to install the Routing Information Protocol
IT-ICS-3.9
Explain the basics about various other wide area networking technologies
  1. 10.5 Network Options
IT-ICS-3.10
Explain different personal and small business Internet connectivity types
IT-ICS-4.1
Explain the Open Systems Interconnection (OSI) model by defining each of the layers and their functions.
IT-ICS-4.2
Explain the differences and operation of layer 2 and layer 3 switches.
IT-ICS-4.3
Differentiate between the OSI model and the TCP model.
IT-ICS-4.4
Demonstrate how to categorize IPv4 addresses using the Class A, B, and C classifications
IT-ICS-4.5
Identify the default gateway and Domain Name System (DNS) server and explain how to configure within a network adapter’s Transmission Control Protocol/Internet Protocol (TCP/IP) properties dialog box
  1. 9.6 Domain Name System (DNS)
IT-ICS-4.6
Demonstrate how to define advanced TCP/IP concepts, such as Network Address Translation (NAT) and sub-nets, and how to create a sub-netted network.
IT-ICS-4.7
Demonstrate the basics of IPv6 and how to configure IPv6 in the command line and define dual stack and tunneling technologies.
  1. 9.5 Internet Addresses
IT-ICS-4.8
Implement Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to client computers demonstrating an understanding of the four-step process known as DORA (discover, offer, request, acknowledgment).
IT-ICS-4.9
Implement Terminal Services so that client computers can connect remotely to a server and take control of it in the Graphical User Interface (GUI)
IT-ICS-4.10
Implement Network Policy Service (NPS) as a LAN router and define IPsec and the various types of protocols, including Security Associations (SA), Authentication Header (AH), and Encapsulating Security Payload (ESP).
IT-ICS-4.11
Explain the function of Domain Name System (DNS) and Windows Internet Name Service (WINS) and explain how to install in Windows Server 2008, as well as how to create forward-lookup zones.
  1. 9.6 Domain Name System (DNS)
IT-ICS-5.1
Manipulate and explain the command prompt as an administrator.
  1. 7.9 Command Line Interface
  2. 10.7 Network Management
IT-ICS-5.2
Demonstrate basic TCP/IP commands such as ipconfig and ping to analyze and test a network.
  1. 10.7 Network Management
IT-ICS-5.3
Demonstrate more advanced commands such as netstat, nbtstat, tracert, pathping, route, and netsh to fully examine a computer and configure it in the command line.
  1. 10.7 Network Management
IT-ICS-5.4
Manipulate the Net command in an effort to find out more information about a system, start and stop services, and work with the network configuration.
  1. 10.7 Network Management
IT-ICS-6.1
Differentiate between the Internet, Intranets, and Extranets.
IT-ICS-6.2
Demonstrate how to set up a virtual private network (VPN).
IT-ICS-6.3
Explain firewalls and how to initiate port scans on them to see whether they are locked down.
  1. 10.6 Network Communication
IT-ICS-6.4
Explain other perimeter devices and zones, such as proxy servers, internet content filters, Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS), and Demilitarized Zones (DMZ).
IT-ICS-7.1
Explain the security function and purpose of network devices and technologies (e.g., Intrusion Detection System (IDS) tools and applications and IDS hardware and software, including open source tools, and their capabilities. [NICE 3, 59 and 146]
IT-ICS-7.2
Distinguish and differentiate between network design elements and compounds.
IT-ICS-7.3
Securely install cabling.
IT-ICS-7.4
Configure firewalls.
  1. 10.6 Network Communication
IT-ICS-7.5
Configure secure network connections (in Windows or Linux).
IT-ICS-7.6
Justify the use of basic Windows or Linux commands to configure communications (e.g. ipconfig/ifconfig).
  1. 10.7 Network Management
IT-ICS-7.7
Design a basic secure network topology demonstrating knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies. [NICE 66]
IT-ICS-8.1
Compare and contrast common operating systems, e.g., Windows, Linux, OS X.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
IT-ICS-8.2
Compare and contrast common file systems
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
IT-ICS-8.3
Explain the importance of application security.
  1. 7.6 Application Security
IT-ICS-8.4
Demonstrate knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). [NICE 105]
  1. 7.6 Application Security
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
IT-ICS-8.5
Install and configure anti-virus software
  1. 7.6 Application Security
IT-ICS-8.6
Perform command line exercises specific to operating systems.
  1. 7.9 Command Line Interface
  2. 10.7 Network Management
IT-ICS-8.7
Demonstrate knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities and how to differentiate between types of application attacks. [NICE 150]
IT-ICS-8.8
Justify the need and implement Active X and Java Security.
IT-ICS-8.9
Discuss protection from buffer overflow attacks.
IT-ICS-8.10
Prevent input validation attacks and scripting attacks.
  1. 8.11 Types of SQLi and Prevention
  2. 14.1 Project: Security Assessment Report
IT-ICS-8.11
Justify the need for and implement secure cookies.
IT-ICS-9.1
Implement appropriate procedures to establish host security
  1. 7.8 System Administration
IT-ICS-9.2
Secure operating systems (OS), user profiles, and computer permissions.
  1. 7.8 System Administration
IT-ICS-9.3
Secure firewalls and Web browsers.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 10.6 Network Communication
IT-ICS-9.4
Establish a secure baseline for host OS.
  1. 7.8 System Administration
IT-ICS-9.5
Install and manage MS Windows
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
IT-ICS-9.6
Analyze security using Microsoft Baseline Security Analyzer (MBSA).
IT-ICS-9.7
Demonstrate knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools such as Microsoft (MS) Backup/Restore. [NICE 29]
  1. 7.6 Application Security
IT-ICS-9.8
Methodically examine and conduct a security audit to review system performance and settings in Windows and Linux.
IT-ICS-9.9
Demonstrate the ability to select and set both file and folder permissions in Windows and Linux.
  1. 7.3 Compatibility
  2. 7.8 System Administration
IT-ICS-9.10
Set up shared documents and folders.
  1. 7.8 System Administration
IT-ICS-9.11
View and edit Windows services (disable services).
IT-ICS-9.12
Enable Extended File System (EFS).
IT-ICS-9.13
View and change the backup archive bit in order to change the backup file status.
IT-ICS-9.14
Secure DNS/BIND, web, email, messaging, FTP servers.
IT-ICS-9.15
Secure directory services, Dynamic Host Configuration Protocol (DHCP), file, and print servers.
IT-ICS-10.1
Demonstrate knowledge of host/network access controls (e.g., access control list) to include the function and purpose of authentication services. [NICE 49]
  1. 7.8 System Administration
IT-ICS-10.2
Explain the fundamental concepts and best practices related to authentication, authorization, and access control.
  1. 7.8 System Administration
IT-ICS-10.3
Implement appropriate security controls when performing account management.
  1. 7.8 System Administration
IT-ICS-10.4
Review authentication using Passfaces.com.
IT-ICS-10.5
Manage user accounts, including basic to advanced protocol procedures.
  1. 7.8 System Administration
IT-ICS-11.1
Summarize general cryptography concepts (symmetric encryption, asymmetric encryption). [NICE 27]
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
IT-ICS-11.2
Demonstrate basic cipher systems (e.g., Caesar cipher, Vigenere cipher).
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
IT-ICS-11.3
Demonstrate file hashing.
IT-ICS-11.4
Demonstrate knowledge of current applications of steganography to include concealed identification, authentication, and communications.
IT-ICS-12.1
Explain the goals, mission and objectives of Future Business Leaders of America.
IT-ICS-12.2
Explore the impact and opportunities a student organization (FBLA) can develop to bring business and education together in a positive working relationship through innovative leadership and career development programs.
IT-ICS-12.3
Explore the local, state, and national opportunities available to students through participation in related student organization (FBLA) including but not limited to conferences, competitions, community service, philanthropy, and other FBLA activities.
IT-ICS-12.4
Explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development.
IT-ICS-12.5
Explore the competitive events related to the content of this course and the required competencies, skills, and knowledge for each related event for individual, team, and chapter competitions.