Please enable JavaScript to use CodeHS

Standards Mapping

for Maryland Cybersecurity I

Clear selection Print / Download

55

Standards in this Framework

40

Standards Mapped

72%

Mapped to Course

Standard Lessons
A.1
Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.4 Star in a Video!
  4. 9.1 The Game of Risk
A.2
Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.4 Star in a Video!
  4. 9.1 The Game of Risk
A.3
Employ effective reading, writing, and technical documentation skills.
  1. 3.1 Create an Escape Room
  2. 7.3 Building a Knowledge Base
  3. 9.1 The Game of Risk
A.4
Solve problems using critical thinking techniques and structured troubleshooting methodologies.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.4 Star in a Video!
A.5
Demonstrate leadership skills and collaborate effectively as a team member.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.4 Star in a Video!
A.6
Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines.
  1. 1.5 Personal Data Security
  2. 18.4 Personal Safety
A.7
Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security.
  1. 1.4 Cyber Ethics and Laws
A.8
Demonstrate time-management skills and the ability to prioritize tasks in a technical setting.
  1. 3.1 Create an Escape Room
  2. 7.1 Communication is Key!
  3. 7.4 Star in a Video!
  4. 9.1 The Game of Risk
B.1
Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking.
  1. 7.1 Communication is Key!
  2. 10.1 After Fundamentals of Cybersecurity
B.2
Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations.
  1. 18.3 Resume and Interview Prep
B.3
Demonstrate effective interview skills for roles in IT and networking.
  1. 18.3 Resume and Interview Prep
C.1
Use technology as a tool for research, organization, communication, and problem-solving.
  1. 18.2 Alternative Learning Opportunities
C.2
Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information.
  1. 3.1 Create an Escape Room
  2. 4.11 Command Line Interface
  3. 5.3 Encoding Images in Binary
  4. 6.9 Lab: Mobile Device Connectivity
  5. 7.4 Star in a Video!
  6. 8.4 Dev Tools Capture the Flag
C.3
Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications.
  1. 6.11 Network Management
  2. 8.3 Security in Coding
  3. 8.4 Dev Tools Capture the Flag
C.4
Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use.
  1. 1.4 Cyber Ethics and Laws
D.1
Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
D.2
Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting.
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
D.3
Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting.
E.1
Identify and describe the functions of different computer hardware components, including CPUs, memory, storage, and peripheral devices.
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
  3. 6.4 Storage Options
E.2
Perform basic hardware installation, configuration, and troubleshooting in line with industry standards.
  1. 4.2 Lab: Configuring a Computer
  2. 7.2 Troubleshooting Methodology
E.3
Demonstrate the ability to install and configure operating systems, focusing on system updates, patches, and driver installations.
  1. 4.1 Operating Systems
E.4
Explain the importance of and perform regular maintenance and upgrades on hardware and software systems.
  1. 4.1 Operating Systems
F.1
Understand basic networking concepts, including IP addressing and network protocols, to prepare for configuration and troubleshooting.
  1. 5.5 IP Addresses
  2. 5.6 Routing and Packets
F.2
Configure and troubleshoot wired and wireless network connections, adhering to industry protocols and standards.
F.3
Apply fundamental concepts of network security, including firewalls, antivirus software, and network access controls.
  1. 1.7 Common Cyber Attacks and Prevention
  2. 4.10 System Administration
F.4
Demonstrate the ability to set up and secure both home and small business networks, emphasizing cybersecurity best practices.
  1. 6.8 Lab: SOHO Devices
G.1
Describe common security threats, vulnerabilities, and attacks, including phishing, malware, and social engineering.
  1. 1.7 Common Cyber Attacks and Prevention
G.2
Identify basic data security measures, such as data encryption, secure passwords, and data backup strategies.
  1. 1.6 Cybersecurity Essentials
  2. 2.3 Asymmetric Encryption
  3. 2.4 Authentication Methods
G.3
Demonstrate knowledge of access controls, user permissions, and authentication methods for protecting information systems.
  1. 1.6 Cybersecurity Essentials
  2. 2.4 Authentication Methods
  3. 4.10 System Administration
G.4
Describe the core cybersecurity frameworks including the CIA Triad, Defense in Depth, and Authentication, Authorization, and Accounting (AAA) and how they influence cybersecurity policies and practices.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
G.5
Conduct basic risk assessments and apply strategies to mitigate potential cybersecurity threats.
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
H.1
Identify and troubleshoot common hardware, software, and network issues using systematic diagnostic methods.
H.2
Document technical issues, troubleshooting steps, and solutions in line with industry documentation practices.
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
  3. 7.4 Star in a Video!
H.3
Demonstrate the use of technical support tools, such as remote assistance, for resolving user issues.
H.4
Apply customer service skills in technical support scenarios, practicing professional communication and problem-solving techniques.
  1. 7.1 Communication is Key!
  2. 7.3 Building a Knowledge Base
  3. 7.4 Star in a Video!
I.1
Harden operating systems (local policies, secure services, update/patch cadence) and configure endpoint protection (AV/EDR).
I.2
Apply least-privilege and standard user policies; manage local groups and permissions.
  1. 4.10 System Administration
I.3
Configure basic logging and review event logs to identify suspicious activity.
  1. 6.11 Network Management
I.4
Create and test a simple data backup/restore plan for endpoints.
J.1
Use decomposition, pattern recognition, abstraction, and algorithms to plan solutions.
  1. 14.1 The Language of Computers
  2. 14.9 Flowcharts and Pseudocode
J.2
Write and run simple scripts (e.g., Python, Bash, or PowerShell) to parse logs, hash files, or query system info.
  1. 8.2 Using Databases
J.3
Use regular expressions and command-line tools to filter and transform data.
  1. 4.11 Command Line Interface
J.4
Document scripts with comments and basic error handling.
  1. 8.3 Security in Coding
  2. 14.5 Comments
K.1
Explain what modern AI/ML systems do (at a high level) and their limitations (e.g., hallucinations, bias, data leakage).
K.2
Use AI tools responsibly for research and drafting (prompt hygiene, citation, privacy-safe inputs).
K.3
Identify security risks of AI systems (e.g., prompt injection, model poisoning, data exfiltration) in age-appropriate scenarios.
L.1
Track current industry news and summarize quarterly trends (e.g., AI, cloud, OT).
L.2
Map evolving roles to skills/credentials (e.g., Security Operations, GRC, Cloud Security, OT Security) and update an individual learning plan.
M.1
Complete beginner capture-the-flag (CTF) labs (e.g., password cracking basics, log triage, web challenges) in a safe, isolated environment.
  1. 8.4 Dev Tools Capture the Flag
M.2
Reflect on problem-solving approaches and document write-ups in a portfolio.
M.3
Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved.
N.1
Perform basic OS installation or imaging and initial configuration (accounts, updates, drivers).
N.2
Configure user profiles and local authentication settings on Windows, Linux, or macOS.
N.3
Connect and troubleshoot common peripherals and printers at a basic level.
  1. 7.2 Troubleshooting Methodology
N.4
Describe safe tool use and ESD precautions during basic hardware service.
  1. 8.5 Environmental Controls