Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada Cybersecurity I Effective 2023

146

Standards in this Framework

131

Standards Mapped

89%

Mapped to Course

Standard Lessons
1.1.1
Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law (Level 1 (L1), Level 2 (L2), Complementary (C))
  1. 16.1 Student Organizations
1.1.2
Research nationally recognized CTSOs (L1, L2, C)
  1. 16.1 Student Organizations
1.1.3
Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) (L1, L2, C)
  1. 16.1 Student Organizations
1.2.1
Discuss the purpose of parliamentary procedure (L1, L2, C)
  1. 16.1 Student Organizations
1.2.2
Demonstrate the proper use of parliamentary procedure (L1, L2, C)
  1. 16.1 Student Organizations
1.2.3
Differentiate between an office and a committee (L1, L2, C)
1.2.4
Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions (L1, L2, C)
  1. 16.1 Student Organizations
1.2.5
Participate in local, regional, state, or national conferences, events, or competitions (L1, L2, C)
  1. 16.1 Student Organizations
1.2.6
Describe the importance of a constitution and bylaws to the operation of a CTSO chapter (L1, L2, C)
  1. 16.1 Student Organizations
1.3.1
Explore opportunities in community service-related work-based learning (WBL) (L1, L2, C)
  1. 16.2 Alternative Learning Opportunities
1.3.2
Participate in a service learning (program related) and/or community service project or activity (L1, L2, C)
  1. 16.2 Alternative Learning Opportunities
1.3.3
Engage with business and industry partners for community service (L1, L2, C)
  1. 16.2 Alternative Learning Opportunities
1.4.1
Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) (L1, L2, C)
  1. 16.3 Resume and Interview Prep
1.4.2
Describe the appropriate professional/workplace attire and its importance (L1, L2, C)
  1. 16.3 Resume and Interview Prep
1.4.3
Investigate industry-standard credentials/certifications available within this Career Cluster™ (L1, L2, C)
  1. 10.1 After Fundamentals of Cybersecurity
1.4.4
Participate in authentic contextualized instructional activities (L1, L2, C)
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
1.4.5
Demonstrate technical skills in various student organization activities/events (L1, L2, C)
  1. 16.1 Student Organizations
1.5.1
Make a connection between program standards to career pathway(s) (L1, L2, C)
  1. 7.1 Communication is Key!
1.5.2
Explain the importance of participation and completion of a program of study (L1, L2, C)
1.5.3
Promote community awareness of local student organizations associated with CTE programs (L1, L2, C)
2.1.1
Demonstrate the proper use of safety devices based on industry regulations (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 8.5 Environmental Controls
  3. 16.4 Personal Safety
2.1.2
Research the environmental impact of production based on industry standards (L1)
  1. 8.5 Environmental Controls
2.1.3
Research local, state, federal, and international regulations related to material handling (L1)
  1. 8.5 Environmental Controls
2.1.4
Demonstrate secure disposal of technology materials and data (L1)
  1. 8.5 Environmental Controls
2.1.5
Introduce Material Safety Data Sheets (MSDS) (L1)
  1. 8.5 Environmental Controls
2.1.6
Explain the relationship between organization and safety (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 8.5 Environmental Controls
  3. 16.4 Personal Safety
2.1.7
Demonstrate an organized work environment (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 6.6 Lab: Design a Distribution Frame
  3. 8.5 Environmental Controls
  4. 16.4 Personal Safety
2.1.8
Demonstrate electrical safety (e.g., grounding, ESD [static]) (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 8.5 Environmental Controls
  3. 16.4 Personal Safety
2.1.9
Apply installation safety (e.g., lifting, overhead movements) (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 16.4 Personal Safety
2.1.10
Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems, natural disasters) (L1)
  1. 16.4 Personal Safety
2.2.1
Explain common tools used in computer repair (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 7.2 Troubleshooting Methodology
2.2.2
Demonstrate the use of common networking and repair tools (L1)
  1. 6.2 Lab: Computer Disassembly
  2. 6.7 Network Options
  3. 7.2 Troubleshooting Methodology
2.2.3
Select the proper tool for diagnostic and troubleshooting procedures (L1)
  1. 7.2 Troubleshooting Methodology
2.2.4
Discuss fire suppression systems, the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems, and industry standards when dealing with the loss of power (L1)
  1. 8.5 Environmental Controls
  2. 16.4 Personal Safety
3.1.1
Analyze legal issues in technology (L1)
  1. 1.2 Personal Data and Collection
  2. 1.4 Cyber Ethics and Laws
  3. 4.7 Software Licenses
3.1.2
Evaluate intellectual property laws (L1)
  1. 1.4 Cyber Ethics and Laws
3.1.3
Explain differences between licensing, copyright, and infringement (L1)
  1. 1.4 Cyber Ethics and Laws
  2. 4.7 Software Licenses
3.1.4
Explain the differences between restricted content, prohibited or illegal content (L1)
  1. 1.4 Cyber Ethics and Laws
3.1.5
Examine state, federal, and international regulations related to technology (e.g., legal holds, disposal methods, data retention, discoverability, data protection) (L1)
  1. 1.2 Personal Data and Collection
  2. 1.4 Cyber Ethics and Laws
3.2.1
Analyze acceptable use policies (L1)
  1. 1.4 Cyber Ethics and Laws
3.2.2
Explain the difference between technology policies, privacy standards, and best practices (L1)
3.2.3
Explain data and privacy encryption issues related to using technology (L1)
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.4 Authentication Methods
3.2.4
Evaluate appropriate consent policies to monitoring various stakeholders (L1)
  1. 1.2 Personal Data and Collection
3.2.5
Explain appropriate data classification (L1)
  1. 1.2 Personal Data and Collection
3.3.1
Communicate with customers to ensure understanding of customer requirements, scope, and concerns (L1)
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. 16.5 Create a Service Agreement
3.3.2
Utilize appropriate documentation systems (L1)
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
  3. 16.5 Create a Service Agreement
3.3.3
Explain the purpose of business agreements (e.g., memos of understanding, service level agreement, statement of work, master services agreement) (L1)
  1. 16.5 Create a Service Agreement
4.1.1
Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, Central Processing Unit (CPU) features, memory module attributes, and expansion business types) (L1)
  1. 6.1 Internal Components
4.1.2
Use industry standard vocabulary to identify components (L1)
  1. 6.1 Internal Components
4.2.1
Select and install appropriate system unit components to meet customer specifications (L1)
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
4.2.2
Interpret BIOS/UEFI settings for basic hardware components (L1)
  1. 6.1 Internal Components
4.2.3
Configure the settings of basic hardware components (L1)
  1. 6.1 Internal Components
  2. 6.8 Lab: SOHO Devices
4.2.4
Troubleshoot basic hardware components and resolve issues (L1)
  1. 6.3 Peripheral Devices
  2. 7.2 Troubleshooting Methodology
4.3.1
Categorize audio and video device components, connectors, and cables (L1)
  1. 6.3 Peripheral Devices
4.3.2
Install appropriate sound and video cards to match specifications and end-user requirements (L1)
  1. 6.1 Internal Components
4.3.3
Configure display and video settings (L1)
  1. 4.2 Lab: Configuring a Computer
4.3.4
Manage sound card and audio device settings (L1)
  1. 4.2 Lab: Configuring a Computer
4.4.1
Identify external device components, connectors, and cables (L1)
  1. 6.3 Peripheral Devices
  2. 6.8 Lab: SOHO Devices
4.4.2
Connect external devices using the appropriate connectors and cables (L1)
  1. 6.3 Peripheral Devices
  2. 6.8 Lab: SOHO Devices
4.4.3
Manage device driver updates and roll back drivers (L1)
  1. 6.3 Peripheral Devices
4.4.4
Enable or disable devices (L1)
  1. 4.2 Lab: Configuring a Computer
4.4.5
Install drivers for external devices (L1)
  1. 6.3 Peripheral Devices
4.4.6
Prepare devices for safe removal (L1)
  1. 7.4 Star in a Video!
4.4.7
Manipulate system utilities to configure storage and external devices (L1)
  1. 4.2 Lab: Configuring a Computer
  2. 6.8 Lab: SOHO Devices
4.5.1
Install small office/home office network (SOHO) multifunction device/printers and configure appropriate settings (L1)
  1. 6.8 Lab: SOHO Devices
4.5.2
Compare and contrast differences between the various print technologies and the associated imaging process (L1)
  1. 6.8 Lab: SOHO Devices
4.5.3
Perform appropriate printer maintenance (L1)
  1. 6.8 Lab: SOHO Devices
  2. 7.2 Troubleshooting Methodology
  3. 16.5 Create a Service Agreement
5.1.1
Use industry standard vocabulary in relation to operating systems (OS) (L1, L2)
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
  3. 4.4 Compatibility
5.1.2
Compare and contrast (L1, L2)
  1. 4.3 Comparing Operating Systems
5.1.3
Install and secure operating systems (L1, L2)
  1. 4.1 Operating Systems
5.1.4
Install and configure Windows networking (L1, L2)
  1. 15.1 Networking Labs
5.2.1
Explain various features and tools of operating systems (L1, L2)
  1. 4.1 Operating Systems
5.2.2
Apply appropriate command line tools (L1, L2)
  1. 4.11 Command Line Interface
  2. 6.11 Network Management
5.2.3
Select appropriate operating system features and tools based on customer requirements (L1, L2)
  1. 4.3 Comparing Operating Systems
5.2.4
Configure Windows Update settings (L1, L2)
  1. 4.1 Operating Systems
5.2.5
Configure local users and groups for a Windows networking system (L1, L2)
  1. 4.10 System Administration
5.2.6
Configure User Access Control (UAC) (L1, L2)
  1. 4.10 System Administration
5.2.7
Use Windows Control Panel utilities (L1, L2)
  1. 15.1 Networking Labs
5.2.8
Perform common preventive maintenance procedures using the appropriate Windows OS tools (L1, L2)
  1. 4.8 Application Security
5.2.9
Troubleshoot common PC security issues using best practices (L1, L2)
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
5.3.1
Explain key terms and acronyms used in diagnostic testing and troubleshooting (L1, L2)
  1. 7.2 Troubleshooting Methodology
5.3.2
Identify common symptoms for a given discrepancy (L1, L2)
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
5.3.3
Develop a solution for a given discrepancy (L1, L2)
  1. 6.3 Peripheral Devices
  2. 6.5 Network Devices
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
5.3.4
Document the solution (L1, L2)
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
5.4.1
Identify common features and functionality of Mac OS, Chrome, and other Linux operating systems (L1, L2)
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
5.4.2
Set up and use client-side virtualization and introduce server virtualization topics (L1, L2)
  1. 4.1 Operating Systems
5.4.3
Identify basic features of mobile operating systems (L1, L2)
  1. 4.1 Operating Systems
  2. 4.5 Laptops and Tablets
5.4.4
Install and configure basic mobile device network connectivity and email (L1, L2)
  1. 4.10 System Administration
  2. 6.9 Lab: Mobile Device Connectivity
5.4.5
Summarize methods and data related to mobile device synchronization (L1, L2)
  1. 6.9 Lab: Mobile Device Connectivity
5.4.6
Compare and contrast methods to secure mobile devices (L1, L2)
  1. 4.10 System Administration
5.4.7
Explain the characteristics of various types of other mobile devices (L1)
  1. 4.5 Laptops and Tablets
5.4.8
Compare and contrast accessories, features, and ports of mobile and IoT devices (L1, L2)
  1. 4.5 Laptops and Tablets
5.4.9
Troubleshoot common mobile OS and tablet software/hardware issues (L1, L2)
  1. 7.3 Building a Knowledge Base
  2. 7.4 Star in a Video!
5.5.1
Compare and contrast laptops, tablets, and computer form factors (L1)
  1. 4.5 Laptops and Tablets
5.5.2
Explain current trends in laptops and tablet applications (L1)
  1. 4.5 Laptops and Tablets
5.5.3
Compare laptop and tablet operating systems (L1)
  1. 4.5 Laptops and Tablets
5.5.4
Explain the function of components within the display of a laptop and tablet (L1)
  1. 4.5 Laptops and Tablets
5.5.5
Compare and contrast accessories, features, and ports of laptops and tablets (L1)
  1. 4.5 Laptops and Tablets
5.6.1
Identify basic cloud concepts (L1)
  1. 6.4 Storage Options
6.1.1
Describe the OSI model and relate to hardware in a network (L1, L2)
  1. 5.8 OSI Model
6.1.2
Implement the appropriate industry policy and procedures (L1, L2)
  1. 4.7 Software Licenses
  2. 4.10 System Administration
6.1.3
Compare and contrast the ports and protocols (HTTP – Hypertext Transfer Protocol, NetBIOS – Network Basic Input/Output System, SMTP – Simple Mail Transfer Protocol, TCP – Transmission Control Protocol, UDP – User Datagram Protocol, etc.) (L1, L2)
  1. 5.5 IP Addresses
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 6.9 Lab: Mobile Device Connectivity
  5. 6.10 Network Communication
6.2.1
Describe encapsulation/de-encapsulation (L1)
  1. 5.8 OSI Model
6.2.2
Explain modulation techniques (L1)
  1. 5.4 What is the Internet?
6.2.3
Apply numbering systems (e.g., binary, octal, hexadecimal) (L1)
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
  3. 5.3 Encoding Images in Binary
6.2.4
Demonstrate addressing and subnetting techniques (L1)
  1. 5.5 IP Addresses
6.2.5
Compare broadband/baseband (L1)
6.2.6
Compare and contrast bit rates versus baud rates (L1)
6.2.7
Describe code-division multiple access (CDMA) (L1)
  1. 6.9 Lab: Mobile Device Connectivity
6.2.8
Explain the difference between carrier sense multiple access with collision detection (CSMA/CD) and collision avoidance (CSMA/CA) (L1)
  1. 15.1 Networking Labs
6.2.9
Describe wavelength (L1)
  1. 6.5 Network Devices
6.2.10
Apply transmission control protocol/internet protocol (TCP/IP) suite (TCP, UDP, ICMP – internet control message protocol) (L1)
  1. 5.6 Routing and Packets
  2. 5.7 How Do Websites Work?
  3. 5.8 OSI Model
6.3.1
Compare main distribution frame (MDF) and intermediate distribution frame (IDF) (L1, L2)
  1. 6.6 Lab: Design a Distribution Frame
6.3.2
Implement a cable management solution (L1, L2)
  1. 6.6 Lab: Design a Distribution Frame
6.3.3
Analyze and create a power management plan (i.e., power converters, circuits, UPS – uninterruptible power supply [power redundancy], inverters, load capacity) (L1, L2)
  1. 6.6 Lab: Design a Distribution Frame
6.3.4
Determine proper airflow for optimal performance (L1, L2)
  1. 8.5 Environmental Controls
6.3.5
Utilize correct rack systems for location and operation (L1)
  1. 8.5 Environmental Controls
6.3.6
Employ consistent labeling methodologies (port, system, circuit, patch panel) (L1)
  1. 6.6 Lab: Design a Distribution Frame
6.3.7
Develop a plan to monitor rack security and environmental conditions (L1)
  1. 8.5 Environmental Controls
8.5.1
Install software and hardware patches and updates (OS, critical, non-critical, etc.) (L1)
  1. 4.1 Operating Systems
8.5.2
Compare and contrast firmware and driver updates (L1)
8.5.3
Recognize the difference between feature releases/security updates (L1)
  1. 4.1 Operating Systems
  2. 4.8 Application Security
8.5.4
Develop rollout/rollback procedures (L1)
9.1.1
Describe the steps of the cybersecurity lifecycle (e.g., people, process, and tools) (L1)
9.1.2
Write a set of principles, rules, and practices to provide guidance and direction (L1)
  1. 4.10 System Administration
  2. 7.3 Building a Knowledge Base
  3. 8.7 Risky Business
9.1.3
Follow appropriate decision-making models to determine correct response procedures (L1)
  1. 8.7 Risky Business
9.2.1
Plan, prepare, and develop scope for a Cyber Incident Response Plan (L1)
9.2.2
Determine correct detection, mitigation, and reporting processes (L1)
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
9.2.3
Evaluate assessment and decision-making steps when handling an incident or event (L1)
9.2.4
Determine correct investigative procedures (L1)
9.2.5
Gather intelligence from a variety of sources, including open source and others (L1)
9.2.6
Document intelligence-gathering efforts, including who, what, when, where, why, and how (L1)
9.2.7
Determine the extent of event or incident scope, including severity (L1)
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
10.2.1
Explain the proper use of penetration testing versus vulnerability scanning (L1)
  1. 8.6 Checking for Vulnerabilities
10.2.2
Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters (L1)
  1. 8.6 Checking for Vulnerabilities
10.2.3
Discover the common types of cyber threat actors, including Cybercriminals, AttentionSeekers, Script Kiddies, Hacktivists, and Nation States (L1)
  1. 1.4 Cyber Ethics and Laws
10.2.4
Explain and summarize the common cybersecurity attacks, including the preferred tactics, techniques, and procedures (TTPS) of threat actors (L1)
  1. 1.7 Common Cyber Attacks and Prevention
10.2.5
Examine and summarize the targets of cyber threat actors, including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications (L1)
  1. 1.7 Common Cyber Attacks and Prevention
10.2.6
Review and examine geopolitical flashpoints (L1)
10.3.4
Identify encryption methods and demonstrate tools to decipher encrypted data (L1)
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.4 Authentication Methods
10.3.6
Identify Web application exploits and vulnerabilities (L1)
  1. 8.3 Security in Coding
10.3.7
Describe and demonstrate Web Application Security and Scanning methods and tools (L1)
  1. 8.3 Security in Coding
10.3.9
Describe and demonstrate a working knowledge of phishing attacks and mitigation steps (L1)
  1. 8.7 Risky Business
11.1.1
Describe job skills needed for potential careers in new and emerging technologies (L1)
  1. 7.1 Communication is Key!
11.1.2
Explore potential uses for and industries that may use emerging technologies (L1)
  1. 7.1 Communication is Key!
11.1.3
Explain the role of ethics as it relates to security and emerging technologies (L1)
  1. 1.4 Cyber Ethics and Laws