Please enable JavaScript to use CodeHS

Indiana Computer Science 1 Standards Mapping

to

Fundamentals of Cybersecurity

53 Standards in this Framework 41 Standards Mapped 77% Mapped to Course


Standard Lessons
CSI-1.1 Document problem analysis through industry standards such as: flowcharts, functional specifications, user stories, etc.
  1. 4.6 Organizational Techniques
  2. 12.1 Methodology
  3. 12.2 Support Practice
CSI-1.2 Outline the problem assigned and describe the solution.
  1. 12.1 Methodology
  2. 12.2 Support Practice
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
CSI-1.3 Use puzzles and games to enhance problem solving skills.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 21.1 Challenge Problems
CSI-1.4 Recognize language appropriate planning and designing tools (for example: flowcharts, UML diagrams, pseudocode, use cases).
  1. 4.6 Organizational Techniques
CSI-2.1 Design a solution to a problem by working in a team.
CSI-2.2 Explore technologies that can be used to collaborate with others of various cultures and career fields.
  1. 3.1 Project: Public Service Announcement
  2. 7.4 Software and Applications
CSI-2.3 Utilize a problem solving approach to develop a solution using technology.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 12.1 Methodology
  5. 12.2 Support Practice
  6. 21.1 Challenge Problems
  7. 23.1 Control Structures Challenges
CSI-2.4 Analyze the work of peers and provide feedback.
  1. 23.1 Control Structures Challenges
CSI-2.5 Program a solution to a problem using pair programming or other methods.
CSI-3.1 Develop algorithms to determine a solution.
  1. 4.2 Programming with Karel
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
CSI-3.2 Assess the use of algorithms to provide a solution.
  1. 4.2 Programming with Karel
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
CSI-3.3 Use pseudocode to describe a solution.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
CSI-3.4 Create a program flowchart using ANSI standard flowcharting symbols to define a solution.
  1. 4.6 Organizational Techniques
CSI-3.5 Explain how the algorithm can be used to solve a problem.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
CSI-3.6 Apply Boolean logic and relational operations.
  1. 22.1 Booleans
  2. 22.2 Logical Operators
  3. 22.3 Comparison Operators
  4. 22.4 If Statements
CSI-3.7 Describe the different methods for encoding data such as binary, decimal, hexadecimal, ASCII, and Unicode.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
CSI-4.1 Define the process of programming.
  1. 4.1 Programming Concepts
CSI-4.10 Recognize the order of operations used by a computer when performing calculations.
CSI-4.11 Define simple and compound conditionals (Boolean - not, and, or).
  1. 22.1 Booleans
  2. 22.2 Logical Operators
  3. 22.3 Comparison Operators
  4. 22.4 If Statements
CSI-4.12 Implement simple and compound conditionals.
  1. 4.4 Branching
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
CSI-4.13 Adhere to industry standard programming conventions for accuracy and readability.
CSI-4.2 Create a computer program that corresponds to an algorithm or proposed solution.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-4.3 Define fundamental control structures (sequencing, selection, and repetition).
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
CSI-4.4 Implement data variables and constants.
  1. 4.1 Programming Concepts
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
  6. 22.5 For Loops in JavaScript
  7. 22.6 General For Loops
  8. 22.7 For Loop Practice
  9. 22.8 Random Numbers
  10. 22.9 While Loops
  11. 22.10 Loop and a Half
CSI-4.5 Compare local scope and global scope.
CSI-4.6 Construct a fundamental control structure.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
CSI-4.7 Implement arrays.
  1. 4.5 Arrays and Objects
CSI-4.8 Create programmer defined functions and methods to break down program logic and support reuse.
  1. 4.2 Programming with Karel
CSI-4.9 Compare the graphical user interface and the command line interface.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.9 Command Line Interface
CSI-5.1 Predict and explain programming outcomes.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-5.2 Identify cause/effect for input/output.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-5.3 Understand input validation.
CSI-5.4 Peer review documentation and code.
CSI-5.5 Conduct testing to identify performance errors.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
  3. 23.1 Control Structures Challenges
CSI-5.6 Differentiate between syntax and logic errors.
CSI-5.7 Debug code using techniques such as: code tracing, print statements, boundary testing, breakpoints, etc.
CSI-5.8 Review computing artifacts to reduce bias, increase equity, and support accessibility.
CSI-6.1 Describe the function of a computing artifact (for example, code or design).
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-6.2 Identify the purposes of a computing artifact.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-6.3 Explain concepts related to a computing artifact.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-6.4 Describe how to use a computing artifact.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-6.5 Explain cause/effect by interpreting input and output.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
CSI-6.6 Create documentation for computing artifact such as comments or user manual/readme.
CSI-7.1 Examine the dynamic between privacy and security.
  1. 2.4 Privacy & Security
CSI-7.2 Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 7.7 Browser Configuration
CSI-7.3 Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 2.4 Privacy & Security
CSI-7.4 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
CSI-7.5 Discuss the concepts and justifications for using secure design techniques.
  1. 8.10 SQL Injection Overview
  2. 8.11 Types of SQLi and Prevention
  3. 9.1 Project: Security Assessment Report
CSI-7.6 Discuss the laws surrounding intellectual property.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
CSI-8.1 Identify computer science occupations and the roles and responsibilities of each.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
CSI-8.2 Report job outlook, demand, and projected wages for computer science careers.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
CSI-8.3 Explore the job opportunities that are available in computer science.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
CSI-8.4 Investigate post-secondary training opportunities and industry certifications that are available.