Please enable JavaScript to use CodeHS

Standards Mapping

for Georgia Introduction to Cybersecurity

86

Standards in this Framework

21

Standards Mapped

24%

Mapped to Course

Standard Lessons
IT-ICS-1.1
Communicate effectively through writing, speaking, listening, reading, and interpersonal abilities.
  1. 2.1 Project: Steganography
  2. 4.1 Communication is Key!
  3. 4.2 Building a Knowledge Base
  4. 7.3 Level 3: Incident Response
IT-ICS-1.2
Demonstrate creativity by asking challenging questions and applying innovative procedures and methods.
  1. 2.1 Project: Steganography
  2. 4.1 Communication is Key!
  3. 4.2 Building a Knowledge Base
  4. 4.3 Star in a Video!
  5. 6.1 Project Security Assessment Report
IT-ICS-1.3
Exhibit critical thinking and problem solving skills to locate, analyze and apply information in career planning and employment situations.
  1. 2.1 Project: Steganography
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
  4. 6.1 Project Security Assessment Report
  5. 7.3 Level 3: Incident Response
IT-ICS-1.4
Model work readiness traits required for success in the workplace including integrity, honesty, accountability, punctuality, time management, and respect for diversity.
  1. 2.1 Project: Steganography
  2. 4.1 Communication is Key!
  3. 4.2 Building a Knowledge Base
  4. 4.3 Star in a Video!
  5. 6.1 Project Security Assessment Report
  6. 7.3 Level 3: Incident Response
IT-ICS-1.5
Apply the appropriate skill sets to be productive in a changing, technological, diverse workplace to be able to work independently and apply team work skills.
  1. 2.1 Project: Steganography
  2. 4.1 Communication is Key!
  3. 4.2 Building a Knowledge Base
  4. 4.3 Star in a Video!
  5. 6.1 Project Security Assessment Report
  6. 7.3 Level 3: Incident Response
IT-ICS-1.6
Present a professional image through appearance, behavior and language.
  1. 2.1 Project: Steganography
  2. 4.1 Communication is Key!
  3. 4.2 Building a Knowledge Base
  4. 4.3 Star in a Video!
  5. 6.1 Project Security Assessment Report
  6. 7.3 Level 3: Incident Response
IT-ICS-2.1
Explain the importance of data security
IT-ICS-2.2
Explain the concepts of confidentiality, integrity, availability, authentication, and nonrepudiation. [NICE 63]
IT-ICS-2.3
Research current events on breaches; focus on particular Information Assurance (IA) areas that were compromised. [NICE 165]
IT-ICS-2.4
Explain the importance of physical security.
IT-ICS-3.1
Define and identify the different types of LANs.
IT-ICS-3.2
Identify and describe the purpose for a perimeter network.
  1. 3.4 Private Networks
IT-ICS-3.3
Identify the different network topologies to include client/server and peer-to-peer distributed networks.
  1. 3.4 Private Networks
IT-ICS-3.4
Define and describe Ethernet standards.
IT-ICS-3.5
Identify twisted-pair cable, cabling tools, cabling testers and describe what can interfere with twisted-pair cabling, and how to avoid it.
IT-ICS-3.6
Identify wireless devices, wireless settings and configurations, wireless standards, and encryption protocols.
IT-ICS-3.7
Explain the differences between static and dynamic routing
IT-ICS-3.8
Explain how to install and configure Routing and Remote Access Service (RRAS) to function as a network router and how to install the Routing Information Protocol
IT-ICS-3.9
Explain the basics about various other wide area networking technologies
IT-ICS-3.10
Explain different personal and small business Internet connectivity types
IT-ICS-4.1
Explain the Open Systems Interconnection (OSI) model by defining each of the layers and their functions.
IT-ICS-4.2
Explain the differences and operation of layer 2 and layer 3 switches.
IT-ICS-4.3
Differentiate between the OSI model and the TCP model.
IT-ICS-4.4
Demonstrate how to categorize IPv4 addresses using the Class A, B, and C classifications
IT-ICS-4.5
Identify the default gateway and Domain Name System (DNS) server and explain how to configure within a network adapter’s Transmission Control Protocol/Internet Protocol (TCP/IP) properties dialog box
IT-ICS-4.6
Demonstrate how to define advanced TCP/IP concepts, such as Network Address Translation (NAT) and sub-nets, and how to create a sub-netted network.
  1. 3.4 Private Networks
IT-ICS-4.7
Demonstrate the basics of IPv6 and how to configure IPv6 in the command line and define dual stack and tunneling technologies.
  1. 3.4 Private Networks
IT-ICS-4.8
Implement Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to client computers demonstrating an understanding of the four-step process known as DORA (discover, offer, request, acknowledgment).
IT-ICS-4.9
Implement Terminal Services so that client computers can connect remotely to a server and take control of it in the Graphical User Interface (GUI)
IT-ICS-4.10
Implement Network Policy Service (NPS) as a LAN router and define IPsec and the various types of protocols, including Security Associations (SA), Authentication Header (AH), and Encapsulating Security Payload (ESP).
IT-ICS-4.11
Explain the function of Domain Name System (DNS) and Windows Internet Name Service (WINS) and explain how to install in Windows Server 2008, as well as how to create forward-lookup zones.
IT-ICS-5.1
Manipulate and explain the command prompt as an administrator.
IT-ICS-5.2
Demonstrate basic TCP/IP commands such as ipconfig and ping to analyze and test a network.
IT-ICS-5.3
Demonstrate more advanced commands such as netstat, nbtstat, tracert, pathping, route, and netsh to fully examine a computer and configure it in the command line.
IT-ICS-5.4
Manipulate the Net command in an effort to find out more information about a system, start and stop services, and work with the network configuration.
IT-ICS-6.1
Differentiate between the Internet, Intranets, and Extranets.
  1. 3.4 Private Networks
IT-ICS-6.2
Demonstrate how to set up a virtual private network (VPN).
  1. 3.4 Private Networks
IT-ICS-6.3
Explain firewalls and how to initiate port scans on them to see whether they are locked down.
IT-ICS-6.4
Explain other perimeter devices and zones, such as proxy servers, internet content filters, Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS), and Demilitarized Zones (DMZ).
  1. 3.1 Network Administrator
IT-ICS-7.1
Explain the security function and purpose of network devices and technologies (e.g., Intrusion Detection System (IDS) tools and applications and IDS hardware and software, including open source tools, and their capabilities. [NICE 3, 59 and 146]
  1. 3.1 Network Administrator
IT-ICS-7.2
Distinguish and differentiate between network design elements and compounds.
IT-ICS-7.3
Securely install cabling.
IT-ICS-7.4
Configure firewalls.
IT-ICS-7.5
Configure secure network connections (in Windows or Linux).
IT-ICS-7.6
Justify the use of basic Windows or Linux commands to configure communications (e.g. ipconfig/ifconfig).
IT-ICS-7.7
Design a basic secure network topology demonstrating knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies. [NICE 66]
IT-ICS-8.1
Compare and contrast common operating systems, e.g., Windows, Linux, OS X.
IT-ICS-8.2
Compare and contrast common file systems
IT-ICS-8.3
Explain the importance of application security.
IT-ICS-8.4
Demonstrate knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). [NICE 105]
IT-ICS-8.5
Install and configure anti-virus software
IT-ICS-8.6
Perform command line exercises specific to operating systems.
IT-ICS-8.7
Demonstrate knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities and how to differentiate between types of application attacks. [NICE 150]
  1. 5.1 Network Attacks
IT-ICS-8.8
Justify the need and implement Active X and Java Security.
IT-ICS-8.9
Discuss protection from buffer overflow attacks.
  1. 5.5 Cross-site Scripting
  2. 8.2 Assessing Risks
IT-ICS-8.10
Prevent input validation attacks and scripting attacks.
  1. 5.5 Cross-site Scripting
  2. 8.2 Assessing Risks
IT-ICS-8.11
Justify the need for and implement secure cookies.
IT-ICS-9.1
Implement appropriate procedures to establish host security
IT-ICS-9.2
Secure operating systems (OS), user profiles, and computer permissions.
IT-ICS-9.3
Secure firewalls and Web browsers.
IT-ICS-9.4
Establish a secure baseline for host OS.
IT-ICS-9.5
Install and manage MS Windows
IT-ICS-9.6
Analyze security using Microsoft Baseline Security Analyzer (MBSA).
IT-ICS-9.7
Demonstrate knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools such as Microsoft (MS) Backup/Restore. [NICE 29]
IT-ICS-9.8
Methodically examine and conduct a security audit to review system performance and settings in Windows and Linux.
  1. 8.2 Assessing Risks
IT-ICS-9.9
Demonstrate the ability to select and set both file and folder permissions in Windows and Linux.
IT-ICS-9.10
Set up shared documents and folders.
IT-ICS-9.11
View and edit Windows services (disable services).
IT-ICS-9.12
Enable Extended File System (EFS).
IT-ICS-9.13
View and change the backup archive bit in order to change the backup file status.
IT-ICS-9.14
Secure DNS/BIND, web, email, messaging, FTP servers.
IT-ICS-9.15
Secure directory services, Dynamic Host Configuration Protocol (DHCP), file, and print servers.
IT-ICS-10.1
Demonstrate knowledge of host/network access controls (e.g., access control list) to include the function and purpose of authentication services. [NICE 49]
IT-ICS-10.2
Explain the fundamental concepts and best practices related to authentication, authorization, and access control.
IT-ICS-10.3
Implement appropriate security controls when performing account management.
IT-ICS-10.4
Review authentication using Passfaces.com.
IT-ICS-10.5
Manage user accounts, including basic to advanced protocol procedures.
IT-ICS-11.1
Summarize general cryptography concepts (symmetric encryption, asymmetric encryption). [NICE 27]
  1. 1.2 Encryption Algorithms
  2. 1.3 Advanced Cryptography
  3. 1.6 Asymmetric Encryption
IT-ICS-11.2
Demonstrate basic cipher systems (e.g., Caesar cipher, Vigenere cipher).
IT-ICS-11.3
Demonstrate file hashing.
  1. 1.4 Hash Functions
  2. 1.5 Hash Function Development
IT-ICS-11.4
Demonstrate knowledge of current applications of steganography to include concealed identification, authentication, and communications.
  1. 2.1 Project: Steganography
IT-ICS-12.1
Explain the goals, mission and objectives of Future Business Leaders of America.
IT-ICS-12.2
Explore the impact and opportunities a student organization (FBLA) can develop to bring business and education together in a positive working relationship through innovative leadership and career development programs.
IT-ICS-12.3
Explore the local, state, and national opportunities available to students through participation in related student organization (FBLA) including but not limited to conferences, competitions, community service, philanthropy, and other FBLA activities.
IT-ICS-12.4
Explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development.
IT-ICS-12.5
Explore the competitive events related to the content of this course and the required competencies, skills, and knowledge for each related event for individual, team, and chapter competitions.