Please enable JavaScript to use CodeHS

Utah 6 Standards Mapping

to

Fundamentals of Cybersecurity

7 Standards in this Framework 5 Standards Mapped 71% Mapped to Course


Standard Lessons
6.CS.1 Utilize troubleshooting strategies to resolve hardware and software issues in a logical order.
  1. 3.1 Project: Public Service Announcement
  2. 12.1 Methodology
  3. 12.2 Support Practice
6.NI.1 Explain potential security threats and practice protective measures to reduce these threats.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.9 Command Line Interface
  5. 8.9 Common Security Problems
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
6.DA.1 Represent a single data set in multiple ways using words, symbols, manipulatives, charts, diagrams, and visuals.
6.AP.1 Design and illustrate algorithms to efficiently solve complex problems by utilizing pseudocode and/or other descriptive methods.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
6.AP.2 Create naming conventions for variables that support the debugging process and incorporate these variables into a simple program.
  1. 4.1 Programming Concepts
6.AP.3 Annotate programs in order to document their use and improve readability, testing, and debugging.
  1. 4.6 Organizational Techniques
6.IC.1 Recognize and discuss issues of bias and accessibility in existing technologies.