Please enable JavaScript to use CodeHS

South Carolina Fundamentals of Computing Standards Mapping

to

Fundamentals of Cybersecurity

84 Standards in this Framework 49 Standards Mapped 58% Mapped to Course


Standard Lessons
A.1 Review school safety policies and procedures.
A.2 Review classroom safety rules and procedures.
A.3 Review safety procedures for using equipment in the classroom.
A.4 Identify major causes of work-related accidents in office environments.
A.5 Demonstrate safety skills in an office/work environment.
B.1 Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
B.2 Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
B.3 Explain the benefits and responsibilities of being a member of a CTSO.
B.4 List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
B.5 Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
C.1 Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
C.2 Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.5 Information Literacy
C.3 Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
  3. 2.1 Digital Footprint and Reputation
  4. 2.2 Cyberbullying
  5. 2.3 Internet Safety
  6. 2.4 Privacy & Security
  7. 2.6 Creative Credit & Copyright
  8. 2.7 Hacking Ethics
C.4 Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
  3. 2.1 Digital Footprint and Reputation
  4. 2.2 Cyberbullying
  5. 2.6 Creative Credit & Copyright
  6. 2.7 Hacking Ethics
  7. 7.5 Software Licenses
C.5 Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
C.6 Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
C.7 Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
  3. 2.7 Hacking Ethics
  4. 7.6 Application Security
  5. 7.7 Browser Configuration
  6. 7.8 System Administration
C.8 Evaluate various solutions to common hardware and software problems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
D.1 Demonstrate punctuality.
D.2 Demonstrate self-representation.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
D.3 Demonstrate work ethic.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
D.4 Demonstrate respect.
  1. 3.1 Project: Public Service Announcement
D.5 Demonstrate time management.
  1. 3.1 Project: Public Service Announcement
D.6 Demonstrate integrity.
  1. 3.1 Project: Public Service Announcement
D.7 Demonstrate leadership.
  1. 3.1 Project: Public Service Announcement
D.8 Demonstrate teamwork and collaboration.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
D.9 Demonstrate conflict resolution.
  1. 3.1 Project: Public Service Announcement
D.10 Demonstrate perseverance.
  1. 3.1 Project: Public Service Announcement
  2. 21.1 Challenge Problems
D.11 Demonstrate commitment.
  1. 3.1 Project: Public Service Announcement
D.12 Demonstrate a healthy view of competition.
D.13 Demonstrate a global perspective.
  1. 3.1 Project: Public Service Announcement
D.14 Demonstrate health and fitness.
D.15 Demonstrate self-direction.
  1. 3.1 Project: Public Service Announcement
D.16 Demonstrate lifelong learning
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
E.1 Demonstrate effective speaking and listening skills.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
E.2 Demonstrate effective reading and writing skills.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
E.3 Demonstrate mathematical reasoning.
E.4 Demonstrate job-specific mathematics skills.
E.5 Demonstrate critical-thinking and problem-solving skills.
  1. 21.1 Challenge Problems
E.6 Demonstrate creativity and resourcefulness.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 21.1 Challenge Problems
E.7 Demonstrate an understanding of business ethics.
E.8 Demonstrate confidentiality.
E.9 Demonstrate an understanding of workplace structures, organizations, systems, and climates.
E.10 Demonstrate diversity awareness.
  1. 3.1 Project: Public Service Announcement
E.11 Demonstrate job acquisition and advancement skills.
E.12 Demonstrate task management skills.
  1. 3.1 Project: Public Service Announcement
E.13 Demonstrate customer-service skills
  1. 12.1 Methodology
  2. 12.2 Support Practice
F.1 Define key computing terms (e.g. hardware, software, data, etc.).
  1. 7.4 Software and Applications
  2. 11.1 Internal Components
F.2 Identify key individuals and their impact on the field of computing.
F.3 Discuss the progression of computing and explain its impact on society (e.g. hardware, programming languages, applications, Internet, emerging technologies, etc.).
  1. 10.10 Impact of the Internet
F.4 Explain Moore’s Law.
G.1 Identify and define the key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, etc.).
  1. 7.1 Operating Systems
  2. 7.4 Software and Applications
  3. 11.1 Internal Components
  4. 11.2 Peripheral Devices
  5. 11.4 Storage Options
G.2 Understand the terms and units that are used to describe major hardware components (RAM, ROM, Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte, Binary, etc.).
G.3 Describe how software and hardware interact.
  1. 7.1 Operating Systems
  2. 11.1 Internal Components
G.4 Discuss how and why binary is used to represent data in a computer.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
G.5 Describe how a picture, sound/song, and video are digitized and represented in a computer.
G.6 Compare and contrast operating systems (e.g., Mac, Windows, Linux, ChromeOS, iOS, Android).
  1. 7.2 Comparing Operating Systems
G.7 Evaluate hardware and software configuration to meet situational and budgetary requirements (e.g. gaming, Internet browsing, student, graphic designer, etc.).
G.8 Make hardware and software recommendations to improve a computer system.
H.1 Describe how computer programs and apps can be used to solve various problems (e.g., desktop, mobile, enterprise).
H.2 Solve a problem by applying appropriate problem solving techniques (understand the problem, plan the solution, carry out the plan, review and discuss).
  1. 12.1 Methodology
  2. 12.2 Support Practice
  3. 21.1 Challenge Problems
H.3 Define algorithm (a set of clearly defined, logical steps to solve a problem).
H.4 Demonstrate an understanding of algorithms and their practical applications.
H.5 Create, evaluate, and adjust algorithms to solve a variety of problems.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
  6. 22.5 For Loops in JavaScript
  7. 22.6 General For Loops
  8. 22.7 For Loop Practice
  9. 22.8 Random Numbers
  10. 22.9 While Loops
  11. 22.10 Loop and a Half
I.1 Express the design of a program using representations such as flowcharts and pseudocode.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
I.2 Analyze and explain how a particular program functions.
I.3 Solve problems of increasing complexity using visual block-based programming individually and collaboratively.
  1. 4.2 Programming with Karel
  2. 4.3 Looping
  3. 21.1 Challenge Problems
I.4 Write code that uses variables, events, functions, operators (i.e. arithmetic, relational, logical), conditional control structures (e.g., if, if-else) and repetition/iteration control structures (e.g., while, for).
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.1 Booleans
  5. 22.2 Logical Operators
  6. 22.3 Comparison Operators
  7. 22.4 If Statements
  8. 22.5 For Loops in JavaScript
  9. 22.6 General For Loops
  10. 22.7 For Loop Practice
  11. 22.8 Random Numbers
  12. 22.9 While Loops
  13. 22.10 Loop and a Half
I.5 Differentiate between text and numerical data.
  1. 4.1 Programming Concepts
I.6 Edit, compile/run, test, and debug a program.
  1. 21.1 Challenge Problems
J.1 Evaluate the results of Internet searches and the reliability of information found on Web sites.
  1. 2.5 Information Literacy
J.2 Describe how Web sites are used to communicate and exchange data.
  1. 10.9 Viewing a Webpage
J.3 Plan a web page considering subject, devices, audience, layout, color, links and graphics.
J.4 Create a web page that contains a variety of HTML elements (e.g., hyperlinks, ordered and unordered lists, images, headings, paragraph) and CSS styles.
K.1 Examine the consequences resulting from issues involving ethics around security, privacy, copyright, fair use, intellectual property, social media and licensing.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.6 Creative Credit & Copyright
  5. 7.5 Software Licenses
K.2 Explain the importance of Acceptable Use Policies.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
K.3 Explain the importance of data security and physical security.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
  6. 8.9 Common Security Problems
K.4 Explain the concepts of confidentiality, integrity, and availability (CIA).
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
K.5 Identify computing threats (e.g., spyware, adware, malware, viruses, ransomware, phishing, hacking, software piracy, identity theft, etc.) and their potential impacts on society.
  1. 1.2 What is Cybersecurity?
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
K.6 Explain the concept of encryption and how it is used on a daily basis.
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
  3. 2.4 Privacy & Security
  4. 5.1 Cryptography, Cryptology, Cryptanalysis
L.1 Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
L.2 Compare and contrast careers in computing along with their education, training requirements, industry certifications and salary ranges.
L.3 Identify gender, diversity and geographic related issues in computing.
L.4 Describe how computing enhances other career fields.
  1. 10.10 Impact of the Internet