Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
SD.CYB.1.1
Define the importance of the cybersecurity industry. |
|
SD.CYB.1.2
Identify the role cybersecurity plays in personal usage. |
|
SD.CYB.1.3
Identify the role cybersecurity plays in industry usage. |
|
SD.CYB.2.1
Investigate the Confidentiality Integrity Availability (CIA) Triad – Security Models. |
|
SD.CYB.2.2
Compare and contrast usability and security. |
|
SD.CYB.3.1
Investigate encryption and encryption types. |
|
SD.CYB.3.2
Investigate how businesses utilize security systems. |
|
SD.CYB.3.3
Compare and contrast public versus private Wi-Fi. |
|
SD.CYB.3.4
Explore processes that maintain integrity of data. |
|
SD.CYB.3.5
Investigate data breaches and its impact on business and customers. |
|
SD.CYB.4.1
Differentiate between threats, vulnerabilities, and attacks. |
|
SD.CYB.4.2
Utilize adversarial thinking. |
|
SD.CYB.4.3
Describe common security related software vulnerabilities. |
|
SD.CYB.4.4
Explore social engineering techniques related to cybersecurity. |
|
SD.CYB.5.1
Compare and contrast ethical versus non-ethical hacking. |
|
SD.CYB.5.2
Understand confidentiality and the role it plays in cybersecurity. |
|
SD.CYB.5.3
Discuss the impact of unethical and illegal hacking on quality of life. |
|
SD.CYB.5.4
Evaluate how the role of value and ethics impacts laws and policy decisions. |
|
SD.CYB.5.5
Evaluate proprietary information and protections. |
|
SD.CYB.6.1
Identify personal interests and abilities related to cybersecurity careers. |
|
SD.CYB.6.2
Investigate career opportunities, trends, and requirements related to cybersecurity careers. |
|
SD.CYB.6.3
Identify skills needed for cybersecurity careers. |
|