Please enable JavaScript to use CodeHS

Standards Mapping

for Georgia Introduction to Cybersecurity

86

Standards in this Framework

66

Standards Mapped

76%

Mapped to Course

Standard Lessons
IT-ICS-1.1
Communicate effectively through writing, speaking, listening, reading, and interpersonal abilities.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. Advanced Cybersecurity
  6. 2.1 Project: Steganography
  7. 4.1 Communication is Key!
  8. 4.2 Building a Knowledge Base
  9. 7.3 Level 3: Incident Response
IT-ICS-1.2
Demonstrate creativity by asking challenging questions and applying innovative procedures and methods.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 4.3 Star in a Video!
  11. 6.1 Project Security Assessment Report
IT-ICS-1.3
Exhibit critical thinking and problem solving skills to locate, analyze and apply information in career planning and employment situations.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. Advanced Cybersecurity
  6. 2.1 Project: Steganography
  7. 4.2 Building a Knowledge Base
  8. 4.3 Star in a Video!
  9. 6.1 Project Security Assessment Report
  10. 7.3 Level 3: Incident Response
IT-ICS-1.4
Model work readiness traits required for success in the workplace including integrity, honesty, accountability, punctuality, time management, and respect for diversity.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 4.3 Star in a Video!
  11. 6.1 Project Security Assessment Report
  12. 7.3 Level 3: Incident Response
IT-ICS-1.5
Apply the appropriate skill sets to be productive in a changing, technological, diverse workplace to be able to work independently and apply team work skills.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 4.3 Star in a Video!
  11. 6.1 Project Security Assessment Report
  12. 7.3 Level 3: Incident Response
IT-ICS-1.6
Present a professional image through appearance, behavior and language.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 4.1 Communication is Key!
  9. 4.2 Building a Knowledge Base
  10. 4.3 Star in a Video!
  11. 6.1 Project Security Assessment Report
  12. 7.3 Level 3: Incident Response
IT-ICS-2.1
Explain the importance of data security
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. 8.1 Data as a Resource
IT-ICS-2.2
Explain the concepts of confidentiality, integrity, availability, authentication, and nonrepudiation. [NICE 63]
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
IT-ICS-2.3
Research current events on breaches; focus on particular Information Assurance (IA) areas that were compromised. [NICE 165]
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
IT-ICS-2.4
Explain the importance of physical security.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
IT-ICS-3.1
Define and identify the different types of LANs.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
IT-ICS-3.2
Identify and describe the purpose for a perimeter network.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 6.10 Network Communication
  4. Advanced Cybersecurity
  5. 3.4 Private Networks
IT-ICS-3.3
Identify the different network topologies to include client/server and peer-to-peer distributed networks.
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
  3. Advanced Cybersecurity
  4. 3.4 Private Networks
IT-ICS-3.4
Define and describe Ethernet standards.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
IT-ICS-3.5
Identify twisted-pair cable, cabling tools, cabling testers and describe what can interfere with twisted-pair cabling, and how to avoid it.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
IT-ICS-3.6
Identify wireless devices, wireless settings and configurations, wireless standards, and encryption protocols.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
IT-ICS-3.7
Explain the differences between static and dynamic routing
IT-ICS-3.8
Explain how to install and configure Routing and Remote Access Service (RRAS) to function as a network router and how to install the Routing Information Protocol
IT-ICS-3.9
Explain the basics about various other wide area networking technologies
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
IT-ICS-3.10
Explain different personal and small business Internet connectivity types
  1. Fundamentals of Cybersecurity
  2. 6.8 Lab: SOHO Devices
IT-ICS-4.1
Explain the Open Systems Interconnection (OSI) model by defining each of the layers and their functions.
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
IT-ICS-4.2
Explain the differences and operation of layer 2 and layer 3 switches.
IT-ICS-4.3
Differentiate between the OSI model and the TCP model.
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
IT-ICS-4.4
Demonstrate how to categorize IPv4 addresses using the Class A, B, and C classifications
IT-ICS-4.5
Identify the default gateway and Domain Name System (DNS) server and explain how to configure within a network adapter’s Transmission Control Protocol/Internet Protocol (TCP/IP) properties dialog box
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
  3. 5.6 Routing and Packets
  4. 5.7 How Do Websites Work?
  5. 5.8 OSI Model
IT-ICS-4.6
Demonstrate how to define advanced TCP/IP concepts, such as Network Address Translation (NAT) and sub-nets, and how to create a sub-netted network.
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ICS-4.7
Demonstrate the basics of IPv6 and how to configure IPv6 in the command line and define dual stack and tunneling technologies.
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ICS-4.8
Implement Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to client computers demonstrating an understanding of the four-step process known as DORA (discover, offer, request, acknowledgment).
IT-ICS-4.9
Implement Terminal Services so that client computers can connect remotely to a server and take control of it in the Graphical User Interface (GUI)
IT-ICS-4.10
Implement Network Policy Service (NPS) as a LAN router and define IPsec and the various types of protocols, including Security Associations (SA), Authentication Header (AH), and Encapsulating Security Payload (ESP).
IT-ICS-4.11
Explain the function of Domain Name System (DNS) and Windows Internet Name Service (WINS) and explain how to install in Windows Server 2008, as well as how to create forward-lookup zones.
IT-ICS-5.1
Manipulate and explain the command prompt as an administrator.
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 6.11 Network Management
IT-ICS-5.2
Demonstrate basic TCP/IP commands such as ipconfig and ping to analyze and test a network.
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
IT-ICS-5.3
Demonstrate more advanced commands such as netstat, nbtstat, tracert, pathping, route, and netsh to fully examine a computer and configure it in the command line.
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
IT-ICS-5.4
Manipulate the Net command in an effort to find out more information about a system, start and stop services, and work with the network configuration.
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
IT-ICS-6.1
Differentiate between the Internet, Intranets, and Extranets.
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ICS-6.2
Demonstrate how to set up a virtual private network (VPN).
  1. Advanced Cybersecurity
  2. 3.4 Private Networks
IT-ICS-6.3
Explain firewalls and how to initiate port scans on them to see whether they are locked down.
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
IT-ICS-6.4
Explain other perimeter devices and zones, such as proxy servers, internet content filters, Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS), and Demilitarized Zones (DMZ).
  1. Advanced Cybersecurity
  2. 3.1 Network Administrator
IT-ICS-7.1
Explain the security function and purpose of network devices and technologies (e.g., Intrusion Detection System (IDS) tools and applications and IDS hardware and software, including open source tools, and their capabilities. [NICE 3, 59 and 146]
  1. Advanced Cybersecurity
  2. 3.1 Network Administrator
IT-ICS-7.2
Distinguish and differentiate between network design elements and compounds.
IT-ICS-7.3
Securely install cabling.
IT-ICS-7.4
Configure firewalls.
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication
IT-ICS-7.5
Configure secure network connections (in Windows or Linux).
IT-ICS-7.6
Justify the use of basic Windows or Linux commands to configure communications (e.g. ipconfig/ifconfig).
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
IT-ICS-7.7
Design a basic secure network topology demonstrating knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies. [NICE 66]
IT-ICS-8.1
Compare and contrast common operating systems, e.g., Windows, Linux, OS X.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
IT-ICS-8.2
Compare and contrast common file systems
  1. Fundamentals of Cybersecurity
  2. 4.3 Comparing Operating Systems
IT-ICS-8.3
Explain the importance of application security.
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
IT-ICS-8.4
Demonstrate knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). [NICE 105]
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
IT-ICS-8.5
Install and configure anti-virus software
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
IT-ICS-8.6
Perform command line exercises specific to operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 6.11 Network Management
IT-ICS-8.7
Demonstrate knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities and how to differentiate between types of application attacks. [NICE 150]
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business
  5. Advanced Cybersecurity
  6. 5.1 Network Attacks
IT-ICS-8.8
Justify the need and implement Active X and Java Security.
IT-ICS-8.9
Discuss protection from buffer overflow attacks.
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
  3. Advanced Cybersecurity
  4. 5.5 Cross-site Scripting
  5. 8.2 Assessing Risks
IT-ICS-8.10
Prevent input validation attacks and scripting attacks.
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
  3. Advanced Cybersecurity
  4. 5.5 Cross-site Scripting
  5. 8.2 Assessing Risks
IT-ICS-8.11
Justify the need for and implement secure cookies.
  1. Fundamentals of Cybersecurity
  2. 8.4 Dev Tools Capture the Flag
IT-ICS-9.1
Implement appropriate procedures to establish host security
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-9.2
Secure operating systems (OS), user profiles, and computer permissions.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-9.3
Secure firewalls and Web browsers.
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
  3. 4.9 Browser Configuration
  4. 6.10 Network Communication
IT-ICS-9.4
Establish a secure baseline for host OS.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-9.5
Install and manage MS Windows
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
IT-ICS-9.6
Analyze security using Microsoft Baseline Security Analyzer (MBSA).
IT-ICS-9.7
Demonstrate knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools such as Microsoft (MS) Backup/Restore. [NICE 29]
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
IT-ICS-9.8
Methodically examine and conduct a security audit to review system performance and settings in Windows and Linux.
  1. Fundamentals of Cybersecurity
  2. 8.7 Risky Business
  3. Advanced Cybersecurity
  4. 8.2 Assessing Risks
IT-ICS-9.9
Demonstrate the ability to select and set both file and folder permissions in Windows and Linux.
  1. Fundamentals of Cybersecurity
  2. 4.4 Compatibility
  3. 4.10 System Administration
IT-ICS-9.10
Set up shared documents and folders.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-9.11
View and edit Windows services (disable services).
IT-ICS-9.12
Enable Extended File System (EFS).
IT-ICS-9.13
View and change the backup archive bit in order to change the backup file status.
IT-ICS-9.14
Secure DNS/BIND, web, email, messaging, FTP servers.
IT-ICS-9.15
Secure directory services, Dynamic Host Configuration Protocol (DHCP), file, and print servers.
IT-ICS-10.1
Demonstrate knowledge of host/network access controls (e.g., access control list) to include the function and purpose of authentication services. [NICE 49]
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-10.2
Explain the fundamental concepts and best practices related to authentication, authorization, and access control.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-10.3
Implement appropriate security controls when performing account management.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-10.4
Review authentication using Passfaces.com.
IT-ICS-10.5
Manage user accounts, including basic to advanced protocol procedures.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
IT-ICS-11.1
Summarize general cryptography concepts (symmetric encryption, asymmetric encryption). [NICE 27]
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. Advanced Cybersecurity
  5. 1.2 Encryption Algorithms
  6. 1.3 Advanced Cryptography
  7. 1.6 Asymmetric Encryption
IT-ICS-11.2
Demonstrate basic cipher systems (e.g., Caesar cipher, Vigenere cipher).
  1. Fundamentals of Cybersecurity
  2. 2.1 Cryptography: Then, Now, and Future
  3. 2.2 Symmetric Encryption
IT-ICS-11.3
Demonstrate file hashing.
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.4 Hash Functions
  5. 1.5 Hash Function Development
IT-ICS-11.4
Demonstrate knowledge of current applications of steganography to include concealed identification, authentication, and communications.
  1. Advanced Cybersecurity
  2. 2.1 Project: Steganography
IT-ICS-12.1
Explain the goals, mission and objectives of Future Business Leaders of America.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
IT-ICS-12.2
Explore the impact and opportunities a student organization (FBLA) can develop to bring business and education together in a positive working relationship through innovative leadership and career development programs.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
IT-ICS-12.3
Explore the local, state, and national opportunities available to students through participation in related student organization (FBLA) including but not limited to conferences, competitions, community service, philanthropy, and other FBLA activities.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
IT-ICS-12.4
Explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. 16.2 Alternative Learning Opportunities
IT-ICS-12.5
Explore the competitive events related to the content of this course and the required competencies, skills, and knowledge for each related event for individual, team, and chapter competitions.
  1. Fundamentals of Cybersecurity
  2. 16.2 Alternative Learning Opportunities