Please enable JavaScript to use CodeHS

Standards Mapping

for South Dakota Cybersecurity

22

Standards in this Framework

20

Standards Mapped

90%

Mapped to Course

Standard Lessons
SD.CYB.1.1
Define the importance of the cybersecurity industry.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
SD.CYB.1.2
Identify the role cybersecurity plays in personal usage.
  1. 1.3 Impact of Cybersecurity
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
SD.CYB.1.3
Identify the role cybersecurity plays in industry usage.
  1. 7.6 Application Security
  2. 7.8 System Administration
SD.CYB.2.1
Investigate the Confidentiality Integrity Availability (CIA) Triad – Security Models.
  1. 1.4 The CIA Triad
SD.CYB.2.2
Compare and contrast usability and security.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 7.8 System Administration
SD.CYB.3.1
Investigate encryption and encryption types.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
  3. 5.3 Basic Crypto Systems: Caesar Cipher
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
SD.CYB.3.2
Investigate how businesses utilize security systems.
  1. 7.8 System Administration
SD.CYB.3.3
Compare and contrast public versus private Wi-Fi.
SD.CYB.3.4
Explore processes that maintain integrity of data.
  1. 1.4 The CIA Triad
  2. 7.6 Application Security
SD.CYB.3.5
Investigate data breaches and its impact on business and customers.
  1. 1.3 Impact of Cybersecurity
SD.CYB.4.1
Differentiate between threats, vulnerabilities, and attacks.
  1. 1.3 Impact of Cybersecurity
SD.CYB.4.2
Utilize adversarial thinking.
SD.CYB.4.3
Describe common security related software vulnerabilities.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
SD.CYB.4.4
Explore social engineering techniques related to cybersecurity.
  1. 1.3 Impact of Cybersecurity
SD.CYB.5.1
Compare and contrast ethical versus non-ethical hacking.
  1. 2.7 Hacking Ethics
SD.CYB.5.2
Understand confidentiality and the role it plays in cybersecurity.
  1. 1.4 The CIA Triad
  2. 7.8 System Administration
SD.CYB.5.3
Discuss the impact of unethical and illegal hacking on quality of life.
  1. 2.7 Hacking Ethics
SD.CYB.5.4
Evaluate how the role of value and ethics impacts laws and policy decisions.
  1. 2.7 Hacking Ethics
SD.CYB.5.5
Evaluate proprietary information and protections.
  1. 7.5 Software Licenses
SD.CYB.6.1
Identify personal interests and abilities related to cybersecurity careers.
  1. 13.1 After Fundamentals of Cybersecurity
SD.CYB.6.2
Investigate career opportunities, trends, and requirements related to cybersecurity careers.
  1. 13.1 After Fundamentals of Cybersecurity
SD.CYB.6.3
Identify skills needed for cybersecurity careers.
  1. 13.1 After Fundamentals of Cybersecurity