Please enable JavaScript to use CodeHS

Standards Mapping

for Maryland Cybersecurity II

57

Standards in this Framework

30

Standards Mapped

52%

Mapped to Course

Standard Lessons
A.1
Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work.
  1. 6.1 Network Administrator
  2. 7.5 Build and Secure a Network
  3. 10.2 Level 2: User Training
  4. 10.5 Level 5: Change Management
  5. 14.1 Engineering Design Process
A.2
Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn.
  1. 7.5 Build and Secure a Network
  2. 10.2 Level 2: User Training
  3. 10.5 Level 5: Change Management
  4. 14.1 Engineering Design Process
A.3
Employ effective reading, writing, and technical documentation skills.
  1. 7.5 Build and Secure a Network
  2. 10.2 Level 2: User Training
  3. 10.5 Level 5: Change Management
  4. 14.1 Engineering Design Process
A.4
Solve problems using critical thinking techniques and structured troubleshooting methodologies.
  1. 7.5 Build and Secure a Network
  2. 10.2 Level 2: User Training
  3. 10.5 Level 5: Change Management
  4. 14.1 Engineering Design Process
A.5
Demonstrate leadership skills and collaborate effectively as a team member.
  1. 4.2 Cyber Case Investigation
  2. 4.3 Security Breaches
  3. 7.5 Build and Secure a Network
  4. 10.2 Level 2: User Training
  5. 10.5 Level 5: Change Management
  6. 14.1 Engineering Design Process
A.6
Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines.
  1. 4.6 Lab: Anti-virus Software Installation
  2. 7.6 Lab: Windows Networking
  3. 7.7 Lab: Network Protocols
A.7
Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security.
  1. 10.4 Level 4: Data and Licenses
A.8
Demonstrate time-management skills and the ability to prioritize tasks in a technical setting.
  1. 14.1 Engineering Design Process
B.1
Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking.
  1. 16.1 After Advanced Cybersecurity
B.2
Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations.
B.3
Demonstrate effective interview skills for roles in IT and networking.
C.1
Use technology as a tool for research, organization, communication, and problem-solving.
  1. 14.1 Engineering Design Process
C.2
Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information.
  1. 14.1 Engineering Design Process
C.3
Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications.
C.4
Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use.
D.1
Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards.
  1. 4.5 Security Baseline
  2. 7.5 Build and Secure a Network
  3. 14.1 Engineering Design Process
D.2
Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting.
  1. 7.3 Network Design
  2. 12.5 Mathematical Operators
D.3
Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting.
E.1
Design and implement infrastructures, including LANs, WANs, and VPNs, to support secure and efficient data communication.
  1. 6.3 Private Networks
  2. 8.1 Project: The Inside Scoop on LANs
E.2
Configure and troubleshoot routing and switching devices, such as routers and managed switches, according to industry standards.
E.3
Utilize subnetting, IP addressing, and network protocols (TCP/IP, DNS, DHCP) to design secure network configurations.
  1. 4.4 Network Protocol Defense
  2. 7.3 Network Design
E.4
Apply techniques for optimizing network performance and securing network traffic.
  1. 7.3 Network Design
  2. 7.4 Networking Services
F.1
Implement network security controls, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., HTTPS TLS).
  1. 6.1 Network Administrator
F.2
Configure and troubleshoot virtual private networks (VPNs) and other remote access solutions to protect data transmission.
  1. 6.3 Private Networks
F.3
Demonstrate knowledge of wireless security settings, including encryption standards (WPA2, WPA3) and access control.
  1. 6.5 Access Control
F.4
Monitor network activity and logs to detect and respond to security threats.
  1. 5.2 Forensic Case 1: Logs
G.1
Identify and analyze security vulnerabilities in network systems using vulnerability scanning tools and penetration testing methods.
  1. 9.1 Identifying Risks
  2. 9.2 Assessing Risks
  3. 9.3 Risk Response
  4. 9.4 Penetration Testing
G.2
Conduct risk assessments and apply best practices for risk mitigation, including patch management, configuration management, and security policies.
  1. 9.1 Identifying Risks
  2. 9.2 Assessing Risks
  3. 9.3 Risk Response
  4. 9.4 Penetration Testing
G.3
Explain and implement access control models, such as role-based access control (RBAC), and multi-factor authentication (MFA).
  1. 6.5 Access Control
G.4
Perform security audits and apply remediation strategies to strengthen the security posture of network environments.
  1. 9.1 Identifying Risks
  2. 9.2 Assessing Risks
  3. 9.3 Risk Response
  4. 9.4 Penetration Testing
H.1
Create and enforce security policies, procedures, and incident response plans based on organizational needs.
  1. 10.3 Level 3: Incident Response
  2. 10.4 Level 4: Data and Licenses
H.2
Explain and implement data protection strategies, including data classification, encryption, and secure disposal methods.
  1. 10.4 Level 4: Data and Licenses
H.3
Apply principles of social engineering awareness and conduct training to enhance security culture within an organization.
  1. 10.2 Level 2: User Training
H.4
Demonstrate an understanding of regulatory compliance and privacy laws, such as GDPR and HIPAA, and their impact on cybersecurity practices.
  1. 10.4 Level 4: Data and Licenses
I.1
Demonstrate effective communication skills in documenting and reporting security incidents and resolutions.
  1. 10.3 Level 3: Incident Response
I.2
Apply advanced mathematical concepts, including probability and statistics, for analyzing network traffic patterns and threat data.
I.3
Use scientific and forensic principles to investigate and analyze security incidents in digital systems.
  1. 5.1 Digital Forensics
  2. 5.2 Forensic Case 1: Logs
  3. 5.3 Forensic Case 2: File Metadata
  4. 5.4 Forensic Case 3: Exit Data
J.1
Compare IT vs. OT environments (safety/availability priorities, legacy systems, real-time constraints).
J.2
Describe the Purdue Model and recommend segmentation for ICS/IIoT networks.
J.3
Identify common OT threats (e.g., ransomware in manufacturing, insecure remote access) and basic mitigations (e.g., allow-listing, change control).
J.4
Apply secure-by-design concepts (threat modeling, SBOM awareness, default-deny) to simple OT scenarios.
J.5
Explain how incident response and business continuity differ in OT contexts (safety and recovery windows).
K.1
Differentiate IaaS, PaaS, and SaaS and shared-responsibility models.
K.2
Configure identity, MFA, and baseline policies in a sandbox cloud tenant.
K.3
Interpret basic cloud service provider logs (e.g., sign-in, resource changes) to identify misconfigurations.
K.4
Describe risks of public storage, exposed keys, and over-permissive roles; propose remediations.
L.1
Map the identity lifecycle (provision, review, de-provision) and enforce least-privilege via roles.
L.2
Implement MFA choices and evaluate usability vs. security trade-offs.
L.3
Explain single sign-on (SSO) and federated identity at a conceptual level.
M.1
Explain common web/app flaws (OWASP Top 10 at a survey level) and simple input validation.
M.2
Use static/dynamic analysis tools in a safe lab to spot low-risk issues.
M.3
Propose remediation and secure coding guidelines appropriate to a high-school level.
N.1
Complete beginner-to-intermediate CTF labs (e.g., privilege escalation basics, simple web exploitation) in a safe, isolated environment.
N.2
Produce brief write-ups capturing approach, tools used, and lessons learned.
N.3
Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved.
O.1
Describe how anomaly detection and clustering can support security operations center (SOC) workflows.
O.2
Recognize adversarial uses of AI (e.g., phishing at scale, deepfakes) and propose controls (e.g., content provenance, user education).