Please enable JavaScript to use CodeHS

Virginia Cybersecurity Fundamentals Standards Mapping

to

Introduction to Cybersecurity (Vigenere)

109 Standards in this Framework 81 Standards Mapped 74% Mapped to Course


Standard Lessons
1 Demonstrate creativity and innovation.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
2 Demonstrate critical thinking and problem solving.
  1. 3.1 Project: Public Service Announcement
  2. 4.4 Basic Crypto Systems: Caesar Cipher
  3. 4.5 Basic Crypto Systems: Cracking Caesar
  4. 4.6 Basic Crypto Systems: Vigenere Cipher
  5. 4.7 Advanced Cryptography
  6. 4.9 Hash Function Development
  7. 5.1 Project: Classic Cipher Newscast
  8. 6.9 Common Security Problems
  9. 8.1 Project: Secure the Company's Network
3 Demonstrate initiative and self-direction.
  1. 3.1 Project: Public Service Announcement
  2. 4.9 Hash Function Development
  3. 5.1 Project: Classic Cipher Newscast
  4. 8.1 Project: Secure the Company's Network
  5. 11.1 Project: Security Assessment Report
4 Demonstrate integrity.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 3.1 Project: Public Service Announcement
  4. 5.1 Project: Classic Cipher Newscast
  5. 8.1 Project: Secure the Company's Network
5 Demonstrate work ethic.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
6 Demonstrate conflict-resolution skills.
  1. 2.2 Cyberbullying
  2. 3.1 Project: Public Service Announcement
  3. 5.1 Project: Classic Cipher Newscast
  4. 8.1 Project: Secure the Company's Network
7 Demonstrate listening and speaking skills.
  1. 2.2 Cyberbullying
  2. 3.1 Project: Public Service Announcement
  3. 5.1 Project: Classic Cipher Newscast
  4. 8.1 Project: Secure the Company's Network
8 Demonstrate respect for diversity.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 7.8 Impact of the Internet
  4. 8.1 Project: Secure the Company's Network
9 Demonstrate customer service skills.
  1. 5.1 Project: Classic Cipher Newscast
  2. 8.1 Project: Secure the Company's Network
10 Collaborate with team members.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
11 Demonstrate big-picture thinking.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
12 Demonstrate career- and life-management skills.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
13 Demonstrate continuous learning and adaptability.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
14 Manage time and resources.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
15 Demonstrate information-literacy skills.
  1. 2.5 Information Literacy
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
  3. 3.1 Project: Public Service Announcement
  4. 8.1 Project: Secure the Company's Network
16 Demonstrate an understanding of information security.
  1. 2.4 Privacy & Security
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
  3. 5.1 Project: Classic Cipher Newscast
  4. 6.9 Common Security Problems
  5. 6.10 SQL Injection Overview
  6. 6.11 Types of SQLi and Prevention
  7. 7.9 Network Attacks
  8. 8.1 Project: Secure the Company's Network
17 Maintain working knowledge of current information-technology (IT) systems.
  1. 5.1 Project: Classic Cipher Newscast
  2. 6.1 Inside Web Apps
  3. 6.2 Developer Tools
  4. 6.9 Common Security Problems
  5. 6.10 SQL Injection Overview
  6. 6.11 Types of SQLi and Prevention
  7. 6.12 Cross-site Scripting
  8. 7.9 Network Attacks
  9. 7.10 Securing a Network
  10. 8.1 Project: Secure the Company's Network
18 Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  1. 4.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.1 Project: Classic Cipher Newscast
  3. 6.1 Inside Web Apps
  4. 6.2 Developer Tools
  5. 6.3 Databases
  6. 6.10 SQL Injection Overview
  7. 7.6 Packets & Protocols
  8. 7.7 Viewing a Webpage
  9. 7.10 Securing a Network
  10. 8.1 Project: Secure the Company's Network
19 Apply mathematical skills to job-specific tasks.
  1. 4.4 Basic Crypto Systems: Caesar Cipher
  2. 4.5 Basic Crypto Systems: Cracking Caesar
  3. 4.6 Basic Crypto Systems: Vigenere Cipher
  4. 4.7 Advanced Cryptography
  5. 4.8 Hash Functions
  6. 4.9 Hash Function Development
  7. 5.1 Project: Classic Cipher Newscast
  8. 8.1 Project: Secure the Company's Network
20 Demonstrate professionalism.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
21 Demonstrate reading and writing skills.
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
22 Demonstrate workplace safety.
  1. 2.3 Internet Safety
23 Examine aspects of planning within an industry/organization.
  1. 8.1 Project: Secure the Company's Network
24 Examine aspects of management within an industry/organization.
  1. 8.1 Project: Secure the Company's Network
25 Examine aspects of financial responsibility within an industry/organization.
  1. 1.2 What is Cybersecurity?
26 Examine technical and production skills required of workers within an industry/organization.
  1. 6.3 Databases
  2. 6.9 Common Security Problems
27 Examine principles of technology that underlie an industry/organization.
  1. 7.10 Securing a Network
  2. 8.1 Project: Secure the Company's Network
28 Examine labor issues related to an industry/organization.
29 Examine community issues related to an industry/organization.
  1. 3.1 Project: Public Service Announcement
  2. 7.8 Impact of the Internet
  3. 8.1 Project: Secure the Company's Network
30 Examine health, safety, and environmental issues related to an industry/organization.
  1. 3.1 Project: Public Service Announcement
  2. 8.1 Project: Secure the Company's Network
31 Identify the purposes and goals of the student organization.
32 Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
33 Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
34 Identify Internet safety issues and procedures for complying with acceptable use standards.
35 Identify the types of work-based learning (WBL) opportunities.
36 Reflect on lessons learned during the WBL experience.
37 Explore career opportunities related to the WBL experience.
38 Participate in a WBL experience, when appropriate.
39 Describe Cybersecurity
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
40 Define information assurance
  1. 6.9 Common Security Problems
41 Describe the critical factors of information security
  1. 6.9 Common Security Problems
42 Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration
  1. 2.7 Hacking Ethics
  2. 6.10 SQL Injection Overview
  3. 6.11 Types of SQLi and Prevention
43 Define risk
  1. 1.2 What is Cybersecurity?
44 Identify the concepts of cybersecurity risk management
  1. 6.9 Common Security Problems
45 Describe cybersecurity threats to an organization
  1. 1.3 Impact of Cybersecurity
  2. 1.5 What is Cybersecurity? Quiz
46 Explain why organizations need to manage risk
  1. 1.3 Impact of Cybersecurity
  2. 8.1 Project: Secure the Company's Network
47 Discuss national or industry standards/regulations that relate to cybersecurity
  1. 1.3 Impact of Cybersecurity
  2. 2.7 Hacking Ethics
  3. 6.9 Common Security Problems
48 Describe the cyberattack surface of various organizations
49 Analyze risks affecting critical infrastructure
50 Describe a network
  1. 7.2 Internet Hardware and Sending Information
51 Describe a wired/cabled network
  1. 7.2 Internet Hardware and Sending Information
52 Describe a wireless network
  1. 7.2 Internet Hardware and Sending Information
53 Compare cabled/wired and wireless networks
  1. 7.2 Internet Hardware and Sending Information
54 Compare networking conceptual models
  1. 7.5 Routing
55 Discuss services, their relationship to the OSI model, and potential vulnerabilities
56 Differentiate among network types
  1. 7.2 Internet Hardware and Sending Information
  2. 7.5 Routing
57 Examine the concept of the Internet as a network of connected systems
  1. 7.2 Internet Hardware and Sending Information
  2. 7.5 Routing
58 Identify networking protocols
  1. 7.6 Packets & Protocols
59 Describe the difference between a cyber threat and a vulnerability
  1. 7.9 Network Attacks
60 Describe types of cyber threats
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 6.10 SQL Injection Overview
  5. 6.11 Types of SQLi and Prevention
  6. 6.12 Cross-site Scripting
  7. 7.9 Network Attacks
  8. 11.1 Project: Security Assessment Report
61 Analyze types of current cyber threats
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 6.10 SQL Injection Overview
  5. 6.11 Types of SQLi and Prevention
  6. 6.12 Cross-site Scripting
  7. 7.9 Network Attacks
  8. 11.1 Project: Security Assessment Report
62 Identify the perpetrators of different types of malicious hacking
  1. 1.3 Impact of Cybersecurity
  2. 6.10 SQL Injection Overview
  3. 7.9 Network Attacks
63 Describe the characteristics of vulnerabilities
  1. 6.10 SQL Injection Overview
  2. 6.11 Types of SQLi and Prevention
  3. 7.9 Network Attacks
64 Identify the prevention of and protection against cyber threats
  1. 1.3 Impact of Cybersecurity
  2. 6.11 Types of SQLi and Prevention
  3. 6.12 Cross-site Scripting
  4. 11.1 Project: Security Assessment Report
65 Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks
66 Differentiate between ethics and laws
  1. 2.7 Hacking Ethics
67 Distinguish among types of ethical concerns
  1. 2.7 Hacking Ethics
68 Define cyberbullying
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
69 Identify actions that constitute cyberbullying
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
70 Identify possible warning signs of someone being cyberbullied
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
71 Identify laws applicable to cybersecurity
  1. 2.2 Cyberbullying
72 Explain the concept of “personally identifiable information”
73 Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it
  1. 6.3 Databases
74 Identify ways to control and protect personal data
  1. 2.4 Privacy & Security
  2. 6.9 Common Security Problems
75 Demonstrate net etiquette (netiquette) as it relates to cybersecurity
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.8 Digital Citizenship and Cyber Hygiene Quiz
76 Analyze the social and legal significance of the ongoing collection of personal digital information
  1. 2.4 Privacy & Security
  2. 6.3 Databases
77 Distinguish between data, information, and knowledge
  1. 6.3 Databases
78 Identify the most common ways data is collected
  1. 6.3 Databases
79 Identify the most common ways data can be stored
  1. 6.3 Databases
80 Explain the difference between data at rest, data in transit, and data being processed
  1. 6.3 Databases
81 Identify the most common ways data is used
  1. 6.3 Databases
82 Discuss how data can be compromised, corrupted, or lost
  1. 6.10 SQL Injection Overview
  2. 6.11 Types of SQLi and Prevention
  3. 6.12 Cross-site Scripting
  4. 11.1 Project: Security Assessment Report
83 Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)
  1. 6.11 Types of SQLi and Prevention
  2. 6.12 Cross-site Scripting
  3. 8.1 Project: Secure the Company's Network
  4. 11.1 Project: Security Assessment Report
84 Define the function of a computer operating system
85 Identify the components of an operating system
86 List types of operating systems
87 Evaluate the potential vulnerabilities, threats, and common exploits to an operating system
88 Identify best practices for protecting operating systems
89 Describe the concept of malware and techniques to guard against it
  1. 7.9 Network Attacks
90 Evaluate critical operating system security parameters
91 Describe security and auditing logs
  1. 7.10 Securing a Network
92 Describe the role of a system backup
  1. 7.10 Securing a Network
93 Define virtualization technology
94 Identify advantages and disadvantages of using virtual machines
95 Define programming in the context of cybersecurity
  1. 4.9 Hash Function Development
  2. 6.11 Types of SQLi and Prevention
96 Differentiate between computer programming languages
  1. 6.1 Inside Web Apps
97 Evaluate common programming flaws that lead to vulnerabilities
  1. 6.1 Inside Web Apps
  2. 6.10 SQL Injection Overview
  3. 6.11 Types of SQLi and Prevention
98 Identify best practices in secure coding and design
  1. 6.1 Inside Web Apps
  2. 6.11 Types of SQLi and Prevention
99 Identify ubiquitous computing
  1. 1.2 What is Cybersecurity?
100 Discuss security and privacy implications of ubiquitous computing
  1. 1.2 What is Cybersecurity?
101 Research career opportunities for cybersecurity professionals
  1. 1.3 Impact of Cybersecurity
  2. 6.3 Databases
  3. 6.9 Common Security Problems
102 Identify the educational pathways for emerging cybersecurity professionals
103 Identify the educational pathways for emerging cybersecurity professionals
104 Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters
  1. 1.3 Impact of Cybersecurity
  2. 6.3 Databases
  3. 6.9 Common Security Problems
105 Research the cyber threats and security measures related to career pathways
  1. 1.3 Impact of Cybersecurity
  2. 6.9 Common Security Problems
106 Identify testing skills/strategies for a certification examination
107 Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course
108 Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams)
109 Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA)