Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Cybersecurity Capstone

17

Standards in this Framework

11

Standards Mapped

64%

Mapped to Course

Standard Lessons
7243.D1.1
Know & understand the proper techniques of installation, configuration, error diagnosis, troubleshooting, & repairing of various operating systems.
7243.D1.2
Explain the requirements associated with the installations of each operating system.
7243.D1.3
Demonstrate the ability to install, configure, & repair an operating system created during class.
7243.D1.4
Analyze the skills required to be an operating system administrator.
7243.D2.1
Identify trends in Information Communication Technology (ICT) for networking protocols.
  1. 3.3 Protocols and Standards
7243.D2.2
Apply the foundational concepts of how data travels on a network infrastructure.
  1. 3.1 Network Administrator
7243.D2.3
Securely configure access rights, and traffic on a network infrastructure.
  1. 3.1 Network Administrator
  2. 3.4 Private Networks
  3. 3.5 Mobile Devices
  4. 3.6 Access Control
7243.D2.4
Protect digital assets through network infrastructure configurations and monitoring.
  1. 3.1 Network Administrator
  2. 3.4 Private Networks
  3. 3.5 Mobile Devices
  4. 3.6 Access Control
  5. 5.1 Network Attacks
  6. 5.2 Malware Types and Prevention
7243.D2.5
Design and implement an organizational network infrastructure.
  1. 3.1 Network Administrator
  2. 3.4 Private Networks
7243.D3.1
Describe the key components of a security metrics program.
7243.D3.2
List the fundamental elements of key information security management practices.
  1. 7.2 Level 2: User Training
  2. 7.3 Level 3: Incident Response
  3. 7.4 Level 4: Data and Licenses
  4. 7.5 Level 5: Change Management
7243.D3.3
Define various access control approaches, including authentication, authorization, and biometric access controls.
  1. 3.6 Access Control
7243.D3.4
Explain popular approaches used in industry to manage risk
  1. 8.2 Assessing Risks
  2. 8.3 Risk Response
  3. 8.4 Penetration Testing
7243.D4.1
Access and use provided forensic software to complete investigative research.
7243.D4.2
Complete Case Studies that require the use of inference and knowledge of cyber laws at the state and federal level.
  1. 7.4 Level 4: Data and Licenses
7243.D4.3
Create supporting documents that could be used to support cybercrime cases in litigation.
  1. 7.3 Level 3: Incident Response
  2. 7.4 Level 4: Data and Licenses
  3. 8.4 Penetration Testing
7243.D4.4
Understand current threats, vulnerabilities, and mitigation strategies for cybercrime.
  1. 5.1 Network Attacks
  2. 5.2 Malware Types and Prevention
  3. 5.3 Common Network Attacks
  4. 5.4 Additional Attacks
  5. 5.5 Cross-site Scripting
  6. 5.6 Internal Threats
  7. 8.1 Identifying Risks
  8. 8.4 Penetration Testing