Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia Cybersecurity Fundamentals

109

Standards in this Framework

108

Standards Mapped

99%

Mapped to Course

Standard Lessons
1
Demonstrate creativity and innovation.
  1. 3.1 Create an Escape Room
  2. 9.1 The Game of Risk
2
Demonstrate critical thinking and problem solving.
  1. 2.2 Symmetric Encryption
  2. 3.1 Create an Escape Room
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
3
Demonstrate initiative and self-direction.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. 9.1 The Game of Risk
4
Demonstrate integrity.
  1. 1.3 Can All Information Be Trusted?
  2. 3.1 Create an Escape Room
  3. 7.1 Communication is Key!
5
Demonstrate work ethic.
  1. 3.1 Create an Escape Room
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. 9.1 The Game of Risk
6
Demonstrate conflict-resolution skills.
  1. 1.2 Personal Data and Collection
  2. 1.4 Cyber Ethics and Laws
  3. 7.1 Communication is Key!
7
Demonstrate listening and speaking skills.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 9.1 The Game of Risk
8
Demonstrate respect for diversity.
  1. 1.4 Cyber Ethics and Laws
  2. 5.9 Impact of the Internet
  3. 7.1 Communication is Key!
  4. 8.1 Data as a Resource
9
Demonstrate customer service skills.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
10
Collaborate with team members.
  1. 3.1 Create an Escape Room
  2. 9.1 The Game of Risk
11
Demonstrate big-picture thinking.
  1. 1.5 Personal Data Security
  2. 3.1 Create an Escape Room
  3. 8.1 Data as a Resource
  4. 9.1 The Game of Risk
12
Demonstrate career- and life-management skills.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
13
Demonstrate continuous learning and adaptability.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
14
Manage time and resources.
  1. 3.1 Create an Escape Room
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. 9.1 The Game of Risk
15
Demonstrate information-literacy skills.
  1. 1.3 Can All Information Be Trusted?
  2. 7.3 Building a Knowledge Base
  3. 7.4 Star in a Video!
16
Demonstrate an understanding of information security.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
  3. 4.10 System Administration
  4. 8.3 Security in Coding
  5. 8.6 Checking for Vulnerabilities
  6. 8.7 Risky Business
17
Maintain working knowledge of current information-technology (IT) systems.
  1. 2.4 Authentication Methods
  2. 4.1 Operating Systems
  3. 5.6 Routing and Packets
  4. 6.11 Network Management
  5. 7.2 Troubleshooting Methodology
  6. 7.3 Building a Knowledge Base
  7. 8.3 Security in Coding
18
Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  1. 1.6 Cybersecurity Essentials
  2. 4.10 System Administration
  3. 6.11 Network Management
  4. 7.1 Communication is Key!
  5. 7.2 Troubleshooting Methodology
  6. 7.3 Building a Knowledge Base
  7. 7.4 Star in a Video!
  8. 8.4 Dev Tools Capture the Flag
  9. 8.6 Checking for Vulnerabilities
19
Apply mathematical skills to job-specific tasks.
  1. 2.2 Symmetric Encryption
  2. 5.2 Bits, Text, and Numbers
  3. 8.2 Using Databases
20
Demonstrate professionalism.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 8.7 Risky Business
21
Demonstrate reading and writing skills.
  1. 2.2 Symmetric Encryption
  2. 3.1 Create an Escape Room
  3. 7.1 Communication is Key!
  4. 7.2 Troubleshooting Methodology
  5. 7.3 Building a Knowledge Base
  6. 9.1 The Game of Risk
22
Demonstrate workplace safety.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
  3. 4.9 Browser Configuration
  4. 8.5 Environmental Controls
  5. 8.6 Checking for Vulnerabilities
23
Examine aspects of planning within an industry/organization.
  1. 6.4 Storage Options
  2. 6.7 Network Options
  3. 7.1 Communication is Key!
  4. 7.2 Troubleshooting Methodology
  5. 7.3 Building a Knowledge Base
  6. 8.6 Checking for Vulnerabilities
  7. 8.7 Risky Business
24
Examine aspects of management within an industry/organization.
  1. 6.11 Network Management
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
25
Examine aspects of financial responsibility within an industry/organization.
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
26
Examine technical and production skills required of workers within an industry/organization.
  1. 1.6 Cybersecurity Essentials
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. 8.2 Using Databases
  6. 8.3 Security in Coding
  7. 8.6 Checking for Vulnerabilities
  8. 8.7 Risky Business
27
Examine principles of technology that underlie an industry/organization.
  1. 6.4 Storage Options
  2. 6.7 Network Options
  3. 6.10 Network Communication
  4. 7.1 Communication is Key!
  5. 8.3 Security in Coding
  6. 8.6 Checking for Vulnerabilities
  7. 8.7 Risky Business
28
Examine labor issues related to an industry/organization.
  1. 5.9 Impact of the Internet
29
Examine community issues related to an industry/organization.
  1. 5.9 Impact of the Internet
30
Examine health, safety, and environmental issues related to an industry/organization.
  1. 8.5 Environmental Controls
31
Identify the purposes and goals of the student organization.
  1. 16.1 Student Organizations
32
Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
  1. 16.1 Student Organizations
33
Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
  1. 16.1 Student Organizations
34
Identify Internet safety issues and procedures for complying with acceptable use standards.
  1. 1.4 Cyber Ethics and Laws
  2. 4.7 Software Licenses
35
Identify the types of work-based learning (WBL) opportunities.
  1. 16.2 Alternative Learning Opportunities
36
Reflect on lessons learned during the WBL experience.
  1. 16.2 Alternative Learning Opportunities
37
Explore career opportunities related to the WBL experience.
  1. 16.2 Alternative Learning Opportunities
38
Participate in a WBL experience, when appropriate.
  1. 16.2 Alternative Learning Opportunities
39
Describe Cybersecurity
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
40
Define information assurance
  1. 1.6 Cybersecurity Essentials
  2. 4.8 Application Security
41
Describe the critical factors of information security
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
42
Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration
  1. 1.7 Common Cyber Attacks and Prevention
  2. 2.4 Authentication Methods
  3. 8.3 Security in Coding
43
Define risk
  1. 1.6 Cybersecurity Essentials
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
44
Identify the concepts of cybersecurity risk management
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
45
Describe cybersecurity threats to an organization
  1. 8.3 Security in Coding
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
46
Explain why organizations need to manage risk
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
47
Discuss national or industry standards/regulations that relate to cybersecurity
  1. 1.2 Personal Data and Collection
48
Describe the cyberattack surface of various organizations
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
49
Analyze risks affecting critical infrastructure
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
50
Describe a network
  1. 6.7 Network Options
  2. 6.12 IT Infrastructure Quiz
51
Describe a wired/cabled network
  1. 6.12 IT Infrastructure Quiz
52
Describe a wireless network
  1. 6.7 Network Options
  2. 6.12 IT Infrastructure Quiz
53
Compare cabled/wired and wireless networks
  1. 6.5 Network Devices
54
Compare networking conceptual models
  1. 5.5 IP Addresses
  2. 5.6 Routing and Packets
55
Discuss services, their relationship to the OSI model, and potential vulnerabilities
  1. 5.8 OSI Model
56
Differentiate among network types
  1. 6.7 Network Options
57
Examine the concept of the Internet as a network of connected systems
  1. 5.4 What is the Internet?
  2. 5.7 How Do Websites Work?
58
Identify networking protocols
  1. 5.5 IP Addresses
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 6.7 Network Options
  5. 6.12 IT Infrastructure Quiz
59
Describe the difference between a cyber threat and a vulnerability
  1. 1.6 Cybersecurity Essentials
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
60
Describe types of cyber threats
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
61
Analyze types of current cyber threats
  1. 1.7 Common Cyber Attacks and Prevention
  2. 2.4 Authentication Methods
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business
62
Identify the perpetrators of different types of malicious hacking
  1. 1.6 Cybersecurity Essentials
  2. 8.5 Environmental Controls
63
Describe the characteristics of vulnerabilities
  1. 1.6 Cybersecurity Essentials
  2. 4.8 Application Security
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business
64
Identify the prevention of and protection against cyber threats
  1. 1.7 Common Cyber Attacks and Prevention
  2. 2.4 Authentication Methods
  3. 4.8 Application Security
  4. 4.10 System Administration
  5. 8.6 Checking for Vulnerabilities
65
Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks
  1. 4.10 System Administration
66
Differentiate between ethics and laws
  1. 1.4 Cyber Ethics and Laws
67
Distinguish among types of ethical concerns
  1. 1.4 Cyber Ethics and Laws
68
Define cyberbullying
  1. 1.1 Digital Footprint and Responsibility
69
Identify actions that constitute cyberbullying
  1. 1.1 Digital Footprint and Responsibility
70
Identify possible warning signs of someone being cyberbullied
  1. 1.1 Digital Footprint and Responsibility
71
Identify laws applicable to cybersecurity
  1. 1.4 Cyber Ethics and Laws
72
Explain the concept of “personally identifiable information”
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
73
Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it
  1. 8.1 Data as a Resource
74
Identify ways to control and protect personal data
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
75
Demonstrate net etiquette (netiquette) as it relates to cybersecurity
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Can All Information Be Trusted?
  3. 1.4 Cyber Ethics and Laws
  4. 7.1 Communication is Key!
  5. 7.3 Building a Knowledge Base
  6. 7.4 Star in a Video!
76
Analyze the social and legal significance of the ongoing collection of personal digital information
  1. 1.5 Personal Data Security
  2. 8.1 Data as a Resource
77
Distinguish between data, information, and knowledge
  1. 8.1 Data as a Resource
78
Identify the most common ways data is collected
  1. 8.1 Data as a Resource
  2. 8.2 Using Databases
79
Identify the most common ways data can be stored
  1. 8.1 Data as a Resource
  2. 8.2 Using Databases
80
Explain the difference between data at rest, data in transit, and data being processed
  1. 8.1 Data as a Resource
81
Identify the most common ways data is used
  1. 8.1 Data as a Resource
82
Discuss how data can be compromised, corrupted, or lost
  1. 8.3 Security in Coding
83
Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)
  1. 2.4 Authentication Methods
  2. 4.8 Application Security
  3. 4.10 System Administration
  4. 6.10 Network Communication
84
Define the function of a computer operating system
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
85
Identify the components of an operating system
  1. 4.3 Comparing Operating Systems
86
List types of operating systems
  1. 4.3 Comparing Operating Systems
87
Evaluate the potential vulnerabilities, threats, and common exploits to an operating system
  1. 4.8 Application Security
88
Identify best practices for protecting operating systems
  1. 4.8 Application Security
89
Describe the concept of malware and techniques to guard against it
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
  3. 4.8 Application Security
90
Evaluate critical operating system security parameters
  1. 4.8 Application Security
91
Describe security and auditing logs
  1. 6.11 Network Management
92
Describe the role of a system backup
  1. 4.8 Application Security
93
Define virtualization technology
  1. 4.1 Operating Systems
94
Identify advantages and disadvantages of using virtual machines
  1. 4.1 Operating Systems
95
Define programming in the context of cybersecurity
  1. 8.3 Security in Coding
96
Differentiate between computer programming languages
  1. 13.1 Programming Concepts
97
Evaluate common programming flaws that lead to vulnerabilities
  1. 8.3 Security in Coding
  2. 8.4 Dev Tools Capture the Flag
98
Identify best practices in secure coding and design
  1. 8.3 Security in Coding
  2. 8.4 Dev Tools Capture the Flag
99
Identify ubiquitous computing
  1. 1.6 Cybersecurity Essentials
100
Discuss security and privacy implications of ubiquitous computing
  1. 1.6 Cybersecurity Essentials
101
Research career opportunities for cybersecurity professionals
  1. 1.6 Cybersecurity Essentials
  2. 4.10 System Administration
  3. 6.11 Network Management
  4. 7.1 Communication is Key!
  5. 8.6 Checking for Vulnerabilities
  6. 8.7 Risky Business
102
Identify the educational pathways for emerging cybersecurity professionals
  1. 7.1 Communication is Key!
103
Identify the educational pathways for emerging cybersecurity professionals
  1. 7.1 Communication is Key!
104
Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters
  1. 1.6 Cybersecurity Essentials
  2. 7.1 Communication is Key!
105
Research the cyber threats and security measures related to career pathways
  1. 7.1 Communication is Key!
106
Identify testing skills/strategies for a certification examination
  1. 7.1 Communication is Key!
107
Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course
  1. 7.1 Communication is Key!
108
Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams)
  1. 7.1 Communication is Key!
109
Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA)