Please enable JavaScript to use CodeHS

Standards Mapping

for South Dakota Cybersecurity

22

Standards in this Framework

3

Standards Mapped

13%

Mapped to Course

Standard Lessons
SD.CYB.1.1
Define the importance of the cybersecurity industry.
SD.CYB.1.2
Identify the role cybersecurity plays in personal usage.
SD.CYB.1.3
Identify the role cybersecurity plays in industry usage.
SD.CYB.2.1
Investigate the Confidentiality Integrity Availability (CIA) Triad – Security Models.
  1. 4.5 The CIA Triad
SD.CYB.2.2
Compare and contrast usability and security.
SD.CYB.3.1
Investigate encryption and encryption types.
SD.CYB.3.2
Investigate how businesses utilize security systems.
SD.CYB.3.3
Compare and contrast public versus private Wi-Fi.
SD.CYB.3.4
Explore processes that maintain integrity of data.
  1. 4.5 The CIA Triad
SD.CYB.3.5
Investigate data breaches and its impact on business and customers.
SD.CYB.4.1
Differentiate between threats, vulnerabilities, and attacks.
SD.CYB.4.2
Utilize adversarial thinking.
SD.CYB.4.3
Describe common security related software vulnerabilities.
SD.CYB.4.4
Explore social engineering techniques related to cybersecurity.
SD.CYB.5.1
Compare and contrast ethical versus non-ethical hacking.
SD.CYB.5.2
Understand confidentiality and the role it plays in cybersecurity.
  1. 4.5 The CIA Triad
SD.CYB.5.3
Discuss the impact of unethical and illegal hacking on quality of life.
SD.CYB.5.4
Evaluate how the role of value and ethics impacts laws and policy decisions.
SD.CYB.5.5
Evaluate proprietary information and protections.
SD.CYB.6.1
Identify personal interests and abilities related to cybersecurity careers.
SD.CYB.6.2
Investigate career opportunities, trends, and requirements related to cybersecurity careers.
SD.CYB.6.3
Identify skills needed for cybersecurity careers.