Please enable JavaScript to use CodeHS

South Carolina 6-8 Standards Mapping

to

Fundamentals of Cybersecurity

111 Standards in this Framework 80 Standards Mapped 72% Mapped to Course


Standard Lessons
6.CS.1.1 Identify and describe the key functional components (e.g., input devices, output devices, processor, operating system, software applications, memory, storage) of a computer.
  1. 7.1 Operating Systems
  2. 11.1 Internal Components
  3. 11.2 Peripheral Devices
6.CS.1.2 Identify relevant problems and how they are solved using computer science and various types of computing devices.
  1. 10.10 Impact of the Internet
6.CS.2.1 Understand how software is acquired and installed.
  1. 7.4 Software and Applications
6.CS.3.1 Identify the source of a problem using a systematic process.
  1. 12.1 Methodology
  2. 12.2 Support Practice
6.CS.3.2 Identify informational resources for troubleshooting hardware and software problems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
6.NI.1.1 Identify and define hardware required to connect to a network (e.g., routers, switches, wireless network interface cards/adapter, network cable, modem).
  1. 10.4 Internet Hardware and Sending Information
  2. 10.6 Domain Name System (DNS)
  3. 10.7 Routing
  4. 10.8 Packets & Protocols
  5. 10.9 Viewing a Webpage
  6. 11.3 Network Devices
6.NI.1.2 Define an IP address and identify different examples.
  1. 10.5 Internet Addresses
  2. 10.9 Viewing a Webpage
6.NI.1.3 Identify parts of a Uniform Resource Locator (URL).
  1. 10.5 Internet Addresses
  2. 10.9 Viewing a Webpage
6.NI.1.4 Define a packet and explain how they are used to transmit data across a network.
  1. 10.8 Packets & Protocols
  2. 10.9 Viewing a Webpage
6.NI.2.1 Compare and contrast use of networks and the internet by individuals and organizations.
  1. 7.8 System Administration
  2. 11.5 Network Options
6.NI.2.2 Identify security issues associated with transmitting data across networks.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 8.9 Common Security Problems
  4. 8.11 Types of SQLi and Prevention
  5. 11.6 Network Communication
  6. 11.7 Network Management
6.DA.1.1 Understand that there are different number systems (i.e., base 10, binary, hexadecimal)
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6.DA.1.2 Understand conversions between different number systems.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6.DA.2.1 Explore real-world data collection (e.g., identification number at lunch, teacher taking attendance, grocery store shopping card).
6.DA.3.1 Explore graphical representations of large data sets.
  1. 8.3 The Value of Data
6.DA.3.2 Represent one set of numerical data (e.g., histograms, box plots, dot plots).
6.DA.4.1 Explain how data is represented by a model (e.g., presentation software, clay model, poster).
  1. 8.3 The Value of Data
6.AP.1.1 Create and modify algorithms to express ideas and solve problems.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.1 Booleans
  5. 22.2 Logical Operators
  6. 22.3 Comparison Operators
  7. 22.4 If Statements
  8. 22.5 For Loops in JavaScript
  9. 22.6 General For Loops
  10. 22.7 For Loop Practice
  11. 22.8 Random Numbers
  12. 22.9 While Loops
  13. 22.10 Loop and a Half
6.AP.1.2 Analyze and test algorithms for accuracy.
  1. 21.1 Challenge Problems
6.AP.2.1 Create algorithms that create, assign to, and read from variables.
  1. 4.1 Programming Concepts
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
  6. 22.5 For Loops in JavaScript
  7. 22.8 Random Numbers
  8. 22.9 While Loops
6.AP.2.2 Identify the variables needed to solve a given problem and the data type (e.g., words, strings, integers, images, Boolean, float, list/arrays).
  1. 22.1 Booleans
6.AP.3.1 Identify and use simple control structures
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
6.AP.3.2 Implement and analyze algorithms using simple control structures.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
6.AP.3.3 Recognize events and event handlers implied by a user interface (e.g., mouse click, keyboard strokes, screen touch).
6.AP.4.1 Understand how code can be reused throughout an algorithm and/or program.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 21.1 Challenge Problems
6.AP.4.2 Reuse code multiple times within an algorithm and/or program.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
6.AP.4.3 Understand and describe advantages of reusing code within an algorithm and/or program
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 21.1 Challenge Problems
6.AP.5.1 Use a block-based programming language to solve problems.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 21.1 Challenge Problems
6.AP.5.2 Edit, compile, run, test, and debug a program.
  1. 21.1 Challenge Problems
6.AP.5.3 Use tools to express the design of a program (e.g., natural language, pseudocode, diagrams, flowcharts, comments).
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
6.IC.1.1 Understand and explore how computer science is and can be used to solve problems in students’ daily lives (e.g., voter identification website, mobile applications for neighborhood issues).
  1. 10.10 Impact of the Internet
6.IC.1.2 Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).
  1. 10.10 Impact of the Internet
6.IC.2.1 Identify current communication methods and devices
6.IC.3.1 Identify guidelines for safely using the internet
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
6.IC.4.1 Identify unethical and illegal behavior.
  1. 2.2 Cyberbullying
  2. 2.4 Privacy & Security
  3. 2.7 Hacking Ethics
7.CS.1.1 Explore an expanded definition of computing devices (e.g., “internet of things,” wearable technology, robotics).
  1. 1.2 What is Cybersecurity?
  2. 10.10 Impact of the Internet
7.CS.1.2 Analyze relevant problems and how they are solved using computer science and various types of computing devices.
  1. 10.10 Impact of the Internet
7.CS.2.1 Understand the units of measure used to describe major hardware components (i.e., Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte).
7.CS.3.1 Understand and communicate solutions to various computing problems.
  1. 11.2 Peripheral Devices
  2. 11.3 Network Devices
  3. 12.1 Methodology
  4. 12.2 Support Practice
7.CS.3.2 Understand how rebooting a device can solve problems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
7.NI.1.1 Identify and compare Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs).
  1. 11.5 Network Options
7.NI.1.2 Define and understand how the internet is a network of Wide Area Networks (WANs).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
7.NI.1.3 Compare and contrast network topologies (e.g., ring, star, mesh).
7.NI.2.1 Identify hardware and software methods for protecting data transmitted across networks
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
  7. 11.6 Network Communication
  8. 11.7 Network Management
7.NI.2.2 Identify physical methods for securing devices (e.g., restricted access, hardware firewall, internet filter).
  1. 7.8 System Administration
7.DA.1.1 Understand and connect file extensions to their associated software applications (e.g., .ppt, .pdf, .mp3).
7.DA.1.2 Describe how a picture, sound/song, and video are stored digitally (e.g., Red, Green, and Blue (RGB), pixels, .wav).
7.DA.2.1 Identify computing devices that assist with data collection (i.e., thermometers, barcode scanners, biometrics, sensors, radio-frequency identification (RFID), wearable technology).
7.DA.3.1 Create various graphical representations of large data sets
7.DA.3.2 Represent two sets of numerical data (e.g., histograms, box plots, dot plots)
7.DA.4.1 Create a model to represent collected data (e.g., presentation software, clay model, poster).
7.AP.1.1 Combine multiple algorithms to express ideas and solve more complex problems
  1. 21.1 Challenge Problems
7.AP.1.2 Analyze and test algorithms using proper and improper values.
7.AP.2.1 Deduce the value of a variable from execution of specific code.
  1. 22.4 If Statements
7.AP.2.2 Develop programs that prompt the user for input that is used to determine the value of variables
7.AP.2.3 Determine and use appropriate data types to store information.
  1. 22.1 Booleans
7.AP.3.1 Understand and explain Boolean logic and logic operators.
  1. 22.1 Booleans
  2. 22.2 Logical Operators
  3. 22.3 Comparison Operators
  4. 22.4 If Statements
7.AP.3.2 Identify and use compound conditional statements.
  1. 22.2 Logical Operators
  2. 22.3 Comparison Operators
  3. 22.4 If Statements
7.AP.4.1 Identify procedures, functions, and methods that can be reused.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 21.1 Challenge Problems
7.AP.4.2 Design a program by decomposing a problem into simple tasks
  1. 4.3 Looping
  2. 21.1 Challenge Problems
7.AP.5.1 Use control structures to create a program that solves a specific problem
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.4 If Statements
  5. 22.5 For Loops in JavaScript
  6. 22.6 General For Loops
  7. 22.7 For Loop Practice
  8. 22.9 While Loops
7.AP.5.2 Use a block-based programming language to solve problems of increasing complexity.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 4.4 Branching
  4. 21.1 Challenge Problems
7.IC.1.1 Understand and explore how computer science is and can be used to solve problems in students’ daily lives (e.g., voter identification website, mobile applications for neighborhood issues).
  1. 10.10 Impact of the Internet
7.IC.1.2 Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 10.10 Impact of the Internet
7.IC.2.1 Describe current communication methods and devices.
7.IC.3.1 Understand precautions to protect personal information (i.e., password strength, antivirus software).
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 8.9 Common Security Problems
7.IC.4.1 Understand the consequences of unethical and illegal behavior online (e.g., social media, gaming, cyberbullying).
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
7.IC.5.1 Understand and communicate the role of women in the evolution of computing.
7.IC.5.2 Recognize minority computer scientists who have advanced computing.
7.IC.6.1 Explain how computer science plays a role in every industry.
  1. 10.10 Impact of the Internet
7.IC.7.1 Understand and communicate the changes in computing and computer science over time.
  1. 5.2 History of Cryptography
  2. 10.10 Impact of the Internet
7.IC.7.2 Understand and communicate the history and development of the Internet.
  1. 10.10 Impact of the Internet
8.CS.1.1 Understand and communicate relevant problems and how they are solved using computer science and various types of computing devices.
  1. 10.10 Impact of the Internet
8.CS.1.2 Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
8.CS.2.1 Describe the relationship between the binary system and hardware
  1. 10.2 Notational Systems
  2. 10.4 Internet Hardware and Sending Information
8.CS.2.2 Design and create a computer system based upon the needs of the users in various career fields.
  1. 11.2 Peripheral Devices
8.CS.2.3 Determine appropriate operating systems and software based upon the needs of users in various career fields.
  1. 7.2 Comparing Operating Systems
  2. 7.3 Compatibility
  3. 7.4 Software and Applications
8.CS.3.1 Understand computer hardware and software compatibility.
  1. 7.3 Compatibility
8.CS.3.2 Understand and solve hardware and software problems using industry documentation.
  1. 12.1 Methodology
  2. 12.2 Support Practice
8.NI.1.1 Identify different protocols and their functions (e.g., Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Internet Protocol (IP), Transmission Control Protocol (TCP)).
  1. 10.5 Internet Addresses
  2. 10.9 Viewing a Webpage
  3. 11.6 Network Communication
8.NI.1.2 Design and/or configure a small network using a switch and a router
  1. 11.5 Network Options
8.NI.1.3 Identify relevant problems and how they are solved using networks and the internet.
  1. 10.10 Impact of the Internet
8.NI.2.1 Discuss and understand recent events and trends regarding cybercrimes (i.e., identity theft, hacking).
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.7 Hacking Ethics
  4. 3.1 Project: Public Service Announcement
8.NI.2.2 Discuss and understand the impact of computing copyright issues (i.e., piracy, plagiarism).
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
8.DA.1.1 Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compressed and uncompressed files, transparency).
  1. 7.3 Compatibility
8.DA.1.2 Compare and contrast current storage mediums and their application (e.g., flash drives, hard drives, networks, cloud).
  1. 8.4 Databases
  2. 8.5 Clients and Servers
  3. 11.4 Storage Options
8.DA.2.1 Utilize computing devices that assist with data collection (i.e., thermometers, barcode scanners, biometrics, sensors, radio-frequency identification (RFID), wearable technology).
8.DA.3.1 Identify components of infographics that can be used to represent numerical data (e.g., scatterplots, stem plots).
8.DA.4.1 Make inferences based on collected data.
8.DA.4.2 Use a model to predict specific behaviors and/or outcomes.
8.AP.1.1 Evaluate an algorithm by criteria such as accessibility, effectiveness, and usability to solve a problem.
  1. 21.1 Challenge Problems
8.AP.1.2 Develop formal criteria to fully evaluate algorithm design.
8.AP.2.1 Understand how variables are stored in memory.
8.AP.2.2 Use variables that store more than one value to solve more complex problems (i.e., arrays, lists).
  1. 4.5 Arrays and Objects
8.AP.3.1 Implement and analyze algorithms using iteration.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
  3. 22.5 For Loops in JavaScript
  4. 22.6 General For Loops
  5. 22.7 For Loop Practice
  6. 22.9 While Loops
8.AP.3.2 Use nested control structures to solve a problem.
  1. 21.1 Challenge Problems
8.AP.4.1 Create a function that accepts arguments.
8.AP.4.2 Extend or reuse code from another program.
8.AP.5.1 Use tools to express the design of a program (e.g., natural language, pseudocode, diagrams, flowcharts, comments).
  1. 4.6 Organizational Techniques
8.AP.5.2 Collaborate with peers while programming.
8.AP.5.3 Identify and utilize helpful resources when programming.
8.IC.1.1 Understand and explore how computer science is and can be used to solve problems in students’ daily lives (e.g., voter identification website, mobile applications for neighborhood issues).
  1. 10.10 Impact of the Internet
8.IC.1.2 Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).
  1. 1.3 Impact of Cybersecurity
  2. 7.4 Software and Applications
  3. 10.10 Impact of the Internet
8.IC.2.1 Compare and contrast current communication methods and devices.
8.IC.3.1 Identify risks associated with sharing information digitally (i.e., phishing, identity theft, hacking).
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.4 Privacy & Security
  4. 5.1 Cryptography, Cryptology, Cryptanalysis
  5. 8.9 Common Security Problems
8.IC.4.1 Identify recent laws that have been created to govern computer use.
8.IC.5.1 Discuss and understand the lack of computing resources in areas in relation to his or her state, country, and world.
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
8.IC.6.1 Identify traditional and nontraditional careers that use computer science.
  1. 1.3 Impact of Cybersecurity
  2. 8.4 Databases
  3. 8.9 Common Security Problems
8.IC.7.1 Analyze the impact of computing and computer science over time
  1. 5.2 History of Cryptography
  2. 10.10 Impact of the Internet
8.IC.7.2 Demonstrate an understanding of Moore’s Law (i.e., the number of transistors per square inch on integrated circuits had doubled every year since their invention).
8.IC.7.3 Identify and describe emerging technologies.
  1. 7.9 Command Line Interface
  2. 10.10 Impact of the Internet