Please enable JavaScript to use CodeHS

Indiana Introduction to Computer Science Standards Mapping

to

Fundamentals of Cybersecurity

38 Standards in this Framework 26 Standards Mapped 68% Mapped to Course


Standard Lessons
ICS-1.1 Create a definition of computer science and computational thinking.
ICS-1.2 Demonstrate awareness of the history of computing.
ICS-1.3 Investigate trends in computer science and their impact on society.
  1. 10.10 Impact of the Internet
ICS-1.4 Summarize ethical issues within computer science.
  1. 10.10 Impact of the Internet
ICS-2.1 Use the design process to iteratively develop a computing artifact.
  1. 21.1 Challenge Problems
ICS-2.2 Demonstrate competencies of programming constructs, including: use of data types and variables, control structures (sequencing, looping, branching), and modularity (such as a function).
  1. 4.1 Programming Concepts
  2. 4.3 Looping
  3. 4.4 Branching
  4. 4.5 Arrays and Objects
  5. 21.1 Challenge Problems
ICS-2.3 Understand how abstractions hide implementation details when used in everyday objects.
  1. 10.2 Notational Systems
  2. 11.1 Internal Components
ICS-2.4 Use abstraction to manage program complexity (such as a function to create recallable code).
  1. 4.2 Programming with Karel
  2. 4.3 Looping
ICS-2.5 Formulate algorithms using programming structures to decompose a complex problem.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
ICS-2.6 Assess a program by testing to verify correct behavior.
  1. 21.1 Challenge Problems
ICS-2.7 Construct a computing artifact that has a user interface.
  1. 22.2 Logical Operators
  2. 22.3 Comparison Operators
  3. 22.4 If Statements
  4. 22.9 While Loops
  5. 22.10 Loop and a Half
ICS-2.8 Produce an artifact that includes rich media.
ICS-2.9 Illustrate knowledge of good programming practice including the use of conventional standards and comment.
ICS-3.1 Understand how computers represent data, including: text, sound, images, and numbers.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
ICS-3.2 Create data visualizations, models, and simulations.
ICS-3.3 Evaluate data to better understand the world.
ICS-3.4 Explore the relationship between information and data.
  1. 8.3 The Value of Data
ICS-4.1 Demonstrate understanding of the hardware and operating systems of computers.
  1. 7.1 Operating Systems
  2. 11.1 Internal Components
  3. 11.2 Peripheral Devices
ICS-4.2 Discuss the ethical and appropriate use of computer devices.
  1. 2.7 Hacking Ethics
  2. 10.10 Impact of the Internet
ICS-4.3 Explore the fundamental principles and components of computer networking.
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
ICS-4.4 Examine the impact of the Internet on society.
  1. 10.10 Impact of the Internet
ICS-4.5 Investigate the use of artificial intelligence by individuals and society.
ICS-4.6 Investigate innovations in computing, including robotics.
ICS-5.1 Design a solution to a problem by working in a team.
ICS-5.2 Explore technologies that can be used to collaborate with others of various cultures and career fields.
  1. 3.1 Project: Public Service Announcement
  2. 7.4 Software and Applications
ICS-5.3 Utilize a problem solving approach to develop a solution using technology.
  1. 12.1 Methodology
  2. 12.2 Support Practice
ICS-5.4 Analyze the work of peers and provide feedback.
ICS-5.5 Program a solution to a problem using pair programming or other methods.
ICS-6.1 Examine the dynamic between privacy and security.
  1. 2.4 Privacy & Security
ICS-6.2 Explain the privacy concerns related to the collection and generation of data through implicit and explicit processes.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 7.7 Browser Configuration
ICS-6.3 Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
  1. 2.1 Digital Footprint and Reputation
  2. 2.4 Privacy & Security
ICS-6.4 Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
ICS-6.5 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical implications.
  1. 7.7 Browser Configuration
  2. 7.8 System Administration
  3. 9.1 Project: Security Assessment Report
  4. 11.6 Network Communication
  5. 11.7 Network Management
ICS-6.6 Discuss the laws surrounding intellectual property.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
ICS-7.1 Identify computer science occupations and the roles and responsibilities of each.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
ICS-7.2 Report job outlook, demand, and projected wages for computer science careers.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
ICS-7.3 Explore the job opportunities that are available in computer science.
  1. 2.7 Hacking Ethics
  2. 8.4 Databases
  3. 8.5 Clients and Servers
  4. 8.9 Common Security Problems
ICS-7.4 Investigate post-secondary training opportunities and industry certifications that are available.