Please enable JavaScript to use CodeHS

Indiana Computer Science 2 Standards Mapping

to

Fundamentals of Cybersecurity

61 Standards in this Framework 39 Standards Mapped 63% Mapped to Course


Standard Lessons
CSII-1.1 Document problem analysis through industry standards such as: flowcharts, functional specifications, user stories, etc.
  1. 4.6 Organizational Techniques
  2. 12.1 Methodology
  3. 12.2 Support Practice
CSII-1.2 Outline the problem assigned and describe the solution.
  1. 12.1 Methodology
  2. 12.2 Support Practice
CSII-1.3 Use puzzles and games to enhance problem solving skills.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 21.1 Challenge Problems
CSII-1.4 Recognize language appropriate planning and designing tools (for example: flowcharts, UML diagrams, pseudocode, use cases).
  1. 4.6 Organizational Techniques
CSII-1.5 Modify an existing program, such as a template, to add additional functionality and discuss intended and unintended implications.
CSII-1.6 Justify what programming methodology to use (object oriented or procedural).
  1. 4.1 Programming Concepts
CSII-2.1 Design a solution to a problem by working in a team.
CSII-2.2 Explore technologies that can be used to collaborate with others of various cultures and career fields.
  1. 3.1 Project: Public Service Announcement
  2. 7.4 Software and Applications
CSII-2.3 Utilize a problem solving approach to develop a solution using technology.
  1. 12.1 Methodology
  2. 12.2 Support Practice
  3. 21.1 Challenge Problems
CSII-2.4 Analyze the work of peers and provide feedback.
CSII-2.5 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices in a group software project.
CSII-3.1 Develop algorithms to determine a solution.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 21.1 Challenge Problems
CSII-3.2 Assess the use of algorithms to provide a solution.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 21.1 Challenge Problems
CSII-3.3 Create pseudocode to describe a solution.
  1. 4.6 Organizational Techniques
  2. 21.1 Challenge Problems
CSII-3.4 Create a program flowchart using ANSI standard flowcharting symbols to define a solution.
  1. 4.6 Organizational Techniques
CSII-3.5 Explain how the algorithm can be used to solve a problem.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
CSII-3.6 Apply Boolean logic and relational operations.
  1. 4.4 Branching
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
CSII-3.7 Demonstrate iteration in an algorithm.
  1. 4.3 Looping
CSII-3.8 Evaluate algorithms in terms of their efficiency, correctness, and clarity.
  1. 21.1 Challenge Problems
CSII-3.9 Illustrate the flow of execution of a recursive algorithm.
CSII-3.10 Integrate classic algorithms (sorting and searching) to solve computational problems.
CSII-3.11 Demonstrate the different methods for encoding data such as binary, decimal, hexadecimal, ASCII, and Unicode.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
CSII-4.1 Define the process of programming.
  1. 4.1 Programming Concepts
CSII-4.2 Plan and develop programs for broad audiences using a software development lifecycle process (such as: Agile, waterfall, and spiral).
CSII-4.3 Adhere to industry standard programming conventions for accuracy and readability.
CSII-4.4 Demonstrate code reuse by creating programming solutions using libraries and APIs.
CSII-4.5 Create an advanced computer program that corresponds to an algorithm or proposed solution.
  1. 21.1 Challenge Problems
CSII-4.6 Implement fundamental programming constructs, including data types, control structures, methods, and arrays.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
CSII-4.7 Compare local scope and global scope.
CSII-4.8 Create programmer defined functions and methods to break down program logic and support reuse.
  1. 4.2 Programming with Karel
CSII-4.9 Recognize the order of operations used by a computer when performing calculations.
CSII-4.10 Implement simple and compound conditionals (Boolean - not, and, or).
  1. 4.4 Branching
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
CSII-4.11 Demonstrate the relationship between classes and objects (instances).
CSII-4.12 Demonstrate the differences between instance variables and class variables
CSII-4.13 Demonstrate the differences between instance methods and class methods.
CSII-4.14 Apply inheritance, polymorphism, encapsulation, and abstraction in the context of Object Oriented Programming.
CSII-4.15 Compare the graphical user interface and the command line interface.
  1. 7.9 Command Line Interface
CSII-5.1 Predict and explain programming outcomes.
  1. 21.1 Challenge Problems
CSII-52 Identify cause/effect for input/output.
  1. 21.1 Challenge Problems
CSII-5.3 Understand input validation
CSII-5.4 Develop and use a series of test cases to verify that a program performs according to its design specifications.
  1. 21.1 Challenge Problems
CSII-5.5 Peer review documentation and code.
CSII-5.6 Differentiate between syntax, logic, and semantic errors.
CSII-5.7 Debug code using techniques such as: code tracing, print statements, boundary testing, breakpoints, etc.
CSII-5.8 Review computing artifacts to reduce bias, increase equity, and support accessibility.
CSII-6.1 Describe the function of a computing artifact (for example, code or design).
  1. 21.1 Challenge Problems
CSII-6.2 Identify the purposes of a computing artifact.
  1. 21.1 Challenge Problems
CSII-6.3 Explain concepts related to a computing artifact.
  1. 21.1 Challenge Problems
CSII-6.4 Describe how to use a computing artifact.
  1. 21.1 Challenge Problems
CSII-6.5 Explain cause/effect by interpreting input and output.
  1. 21.1 Challenge Problems
CSII-6.6 Create documentation for computing artifact such as comments or user manual/readme.
CSII-7.1 Examine the dynamic between privacy and security.
  1. 2.4 Privacy & Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
CSII-7.2 Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 7.7 Browser Configuration
CSII-7.3 Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 2.4 Privacy & Security
CSII-7.4 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
CSII-7.5 Discuss the concepts and justifications for using secure design techniques.
  1. 8.10 SQL Injection Overview
  2. 8.11 Types of SQLi and Prevention
  3. 9.1 Project: Security Assessment Report
CSII-7.6 Discuss the laws surrounding intellectual property.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
CSII-8.1 Identify computer science occupations and the roles and responsibilities of each.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
CSII-8.2 Report job outlook, demand, and projected wages for computer science careers.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
CSII-8.3 Explore the job opportunities that are available in computer science.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
CSII-8.4 Investigate post-secondary training opportunities and industry certifications that are available.