Please enable JavaScript to use CodeHS

North Dakota 9-12 Standards Mapping

to

Introduction to Cybersecurity (Alberti)

73 Standards in this Framework 47 Standards Mapped 64% Mapped to Course


Standard Lessons
9.NI.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 7.1 Introduction to the Internet
10.NI.1 Identify and define different network connection types (e.g., wifi, mobile data, ethernet).
  1. 7.2 Internet Hardware and Sending Information
11.NI.1 Compare and contrast different network connection types (e.g., wifi, mobile data, ethernet).
  1. 7.2 Internet Hardware and Sending Information
12.NI.1 Choose an appropriate network connection given a scenario or situation.
  1. 7.2 Internet Hardware and Sending Information
9.NI.2 Understand the implications of accessing publicly available Internet connections.
  1. 7.8 Impact of the Internet
10.NI.2 Identify networkable devices.
11.NI.2 Understand the global impact of networkable devices.
  1. 7.8 Impact of the Internet
12.NI.2 Compare and contrast the benefits and security risks of networkable devices.
  1. 7.9 Network Attacks
9.HS.1 Compare and contrast appropriate device/hardware/software to complete a task.
9.HS.2 Define software and security patches/update.
10.HS.2 Recognize the importance of and effectively perform software and security patches/updates.
11.HS.2 Identify and choose hardware and software to help protect a system.
9.HS.3 Explain why a backup is necessary.
10.HS.3 Identify important data or systems that need redundancy.
11.HS.3 Identify different options for redundancy (e.g., cloud storage, external, duplicate devices).
12.HS.3 Implement redundancy.
9.T.1 Describe basic hardware and software problems using appropriate and accurate terminology.
10.T.1 Follow appropriate guidelines that convey systematic troubleshooting techniques to identify and fix errors.
12.T.1 Implement systematic troubleshooting strategies to identify and fix errors.
9.PSA.1 Identify, recognize, and use an algorithm to solve a complex problem across disciplines.
10.PSA.1 Create and test an algorithm to solve a complex problem across disciplines.
11.PSA.1 Demonstrate ways a given algorithm applies to problems across disciplines and explain the benefits and drawbacks of choices made.
12.PSA.1 Use and adapt common algorithms to solve computational problems.
9.DCA.1 Collect and analyze complex data.
10.DCA.1 Represent complex data in more than one way to support a claim.
11.DCA.1 Represent complex data in multiple ways to defend a student-generated claim.
12.DCA.1 Represent complex data using interactive data visualizations or computational models.
9.A.1 Plan and employ effective research strategies to locate information.
  1. 3.5 Information Literacy
10.A.1 Curate relevant information from digital resources using a variety of tools and methods.
  1. 3.5 Information Literacy
11.A.1 Devise new search strategies based on information gaps and new understanding.
12.A.1 Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions.
9.E.1 Evaluate the accuracy, perspective, credibility, and relevance of information, media, data, or other resources.
  1. 3.5 Information Literacy
10.E.1 Gather accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
  1. 3.5 Information Literacy
11.E.1 Use accurate, credible, and relevant sources of information, media, data, or other resources showing different perspectives.
  1. 3.5 Information Literacy
12.E.1 Explain source selection based on accuracy, perspective, credibility, and relevance of information, media, data, or other resources.
  1. 3.5 Information Literacy
9.C.1 Create original works or responsibly repurpose or remix digital resources into new creations to communicate an idea.
  1. 3.6 Creative Credit & Copyright
10.C.1 Choose the appropriate platforms and tools for meeting the desired objectives of their creation or communication.
11.C.1 Publish or present content that customizes the message and medium for their intended audiences to communicate their idea.
  1. 3.8 Project: Public Service Announcement
12.C.1 Exhibit perseverance, a tolerance for ambiguity, and the capacity to work with openended problems in the design and creation process.
  1. 10.1 Project: Security Assessment Report
9.IP.1 Properly use copyrighted works, works in the creative commons, and works in the public domain.
  1. 3.6 Creative Credit & Copyright
10.IP.1 Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
  1. 3.6 Creative Credit & Copyright
11.IP.1 Explain the beneficial and harmful effects that intellectual property laws can have on innovation, creativity, and collaboration.
  1. 3.6 Creative Credit & Copyright
12.IP.1 Debate laws and regulations that impact the development and use of software.
9.IP.2 Cite sources in a standard format to ethically reference the intellectual property of others.
  1. 3.6 Creative Credit & Copyright
9.IP.3 Engage in positive, safe, legal and ethical behavior when using technology.
  1. 3.7 Hacking Ethics
11.IP.3 Evaluate the social and economic implications of piracy and plagiarism in the context of safety, law, or ethics.
  1. 3.6 Creative Credit & Copyright
9.IC.1 Evaluate how technology has impacted the workforce positively and negatively.
  1. 7.8 Impact of the Internet
10.IC.1 Evaluate the social, personal, and economic implications technology has on society and the economy.
  1. 7.8 Impact of the Internet
11.IC.1 Explain how computing may change cultural aspects of society.
  1. 7.8 Impact of the Internet
12.IC.1 Predict how computing may impact the workplace and personal lives.
  1. 7.8 Impact of the Internet
9.SI.1 Identify how technology has affected our means of communication.
  1. 7.8 Impact of the Internet
10.SI.1 Evaluate the impacts of technology on social interactions.
  1. 7.8 Impact of the Internet
11.SI.1 Investigate ways to maximize the benefits and minimize the harmful effects technology can have on society
  1. 7.8 Impact of the Internet
12.SI.1 Evaluate the impact of equity, bias, access, and influence on the availability of computing resources in a global society.
  1. 7.8 Impact of the Internet
9.SE.1 Recognize the effects sharing information online can have on others' privacy.
  1. 3.4 Privacy & Security
10.SE.1 Implement best practices to secure personal information.
  1. 3.4 Privacy & Security
11.SE.1 Understand encryption and how it is used to protect data.
  1. 4.3 Why encrypt?
  2. 4.7 Advanced Cryptography
  3. 4.8 Hash Functions
9.SE.2 Know how to modify account settings to protect privacy and security.
  1. 3.4 Privacy & Security
10.SE.2 Recognize the importance of monitoring your private data.
  1. 3.1 Digital Footprint and Reputation
11.SE.2 Explain the privacy concerns related to the collection and generation of data through automated processes.
  1. 7.9 Network Attacks
  2. 7.10 Securing a Network
12.SE.2 Illustrate how sensitive data can be affected by malware and other attacks.
  1. 7.9 Network Attacks
  2. 7.10 Securing a Network
9.SE.3 Recognize that datacollection technology can be used to track navigation online.
  1. 3.1 Digital Footprint and Reputation
10.SE.3 Manage personal data to maintain digital privacy and security and are aware of datacollection technology used to track online behaviors.
  1. 3.1 Digital Footprint and Reputation
9.SE.4 Describe ways to prevent identity theft.
10.SE.4 Identify if their private data has been altered and can react appropriately.
11.SE.4 Develop a plan to recover from an incident that was tied to unauthorized access.
  1. 7.10 Securing a Network
  2. 7.11 Project: Secure the Company's Network
9.RU.1 Apply cyberbullying prevention strategies.
  1. 3.2 Cyberbullying
9.RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction.
  1. 3.1 Digital Footprint and Reputation
9.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
10.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
11.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
12.RU.4 Understand the purpose of and comply with Acceptable Use Policies.
  1. 3.6 Creative Credit & Copyright
9.DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world.
  1. 3.1 Digital Footprint and Reputation