Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Advanced Cybersecurity

Clear selection Print / Download

75

Standards in this Framework

57

Standards Mapped

76%

Mapped to Course

Standard Lessons
A.1
Review school safety policies and procedures.
  1. 20.4 Personal Safety
A.2
Review classroom safety rules and procedures.
  1. 20.4 Personal Safety
A.3
Review safety procedures for using equipment in the classroom.
  1. 20.4 Personal Safety
A.4
Identify major causes of work-related accidents in office environments.
  1. 20.4 Personal Safety
A.5
Demonstrate safety skills in an office/work environment.
  1. 20.4 Personal Safety
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
  1. 20.1 Student Organizations
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
  1. 20.1 Student Organizations
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
  1. 20.1 Student Organizations
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
  1. 20.1 Student Organizations
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
  1. 20.1 Student Organizations
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation.
  1. 1.2 Hash Functions
  2. 1.3 Hash Function Development
  3. 11.1 Databases and Cybersecurity
  4. 12.2 Printing in Python
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. 10.2 Level 2: User Training
  2. 10.3 Level 3: Incident Response
  3. 10.5 Level 5: Change Management
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. 3.6 Internal Threats
  2. 4.4 Network Protocol Defense
  3. 9.1 Identifying Risks
  4. 9.4 Penetration Testing
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying, illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. 3.1 Network Attacks
  2. 3.3 Common Network Attacks
  3. 3.4 Additional Attacks
  4. 4.3 Security Breaches
  5. 7.2 Operating Systems Security
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, Creative Commons, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use.
  1. 10.4 Level 4: Data and Licenses
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information.
  1. 10.4 Level 4: Data and Licenses
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. 3.2 Malware Types and Prevention
  2. 3.3 Common Network Attacks
  3. 3.4 Additional Attacks
  4. 9.1 Identifying Risks
  5. 9.2 Assessing Risks
D.1
Demonstrate creativity and innovation.
  1. 2.1 Project: Steganography
  2. 14.1 Engineering Design Process
D.2
Demonstrate critical thinking and problem-solving skills.
  1. 9.3 Risk Response
  2. 11.8 Joining Tables
  3. 12.5 Mathematical Operators
  4. 14.1 Engineering Design Process
D.3
Demonstrate initiative and self-direction.
  1. 14.1 Engineering Design Process
D.4
Demonstrate integrity.
  1. 14.1 Engineering Design Process
D.5
Demonstrate work ethic.
  1. 14.1 Engineering Design Process
D.6
Demonstrate conflict resolution skills.
  1. 10.5 Level 5: Change Management
  2. 14.1 Engineering Design Process
D.7
Demonstrate listening and speaking skills.
  1. 14.1 Engineering Design Process
D.8
Demonstrate respect for diversity.
D.9
Demonstrate customer service orientation.
D.10
Demonstrate teamwork.
  1. 4.2 Cyber Case Investigation
  2. 14.1 Engineering Design Process
E.1
Demonstrate global or "big picture" thinking.
  1. 14.1 Engineering Design Process
E.2
Demonstrate career and life management skills and goal-making.
  1. 20.2 Alternative Learning Opportunities
  2. 20.3 Resume and Interview Prep
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
  1. 20.2 Alternative Learning Opportunities
  2. 20.3 Resume and Interview Prep
E.4
Demonstrate time and resource management skills.
  1. 14.1 Engineering Design Process
E.5
Demonstrates information literacy skills.
E.6
Demonstrates information security skills.
E.7
Demonstrates information technology skills.
  1. 1.5 Digital Certificates
  2. 10.4 Level 4: Data and Licenses
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. 5.1 Digital Forensics
  2. 6.1 Network Administrator
  3. 7.3 Network Design
  4. 9.4 Penetration Testing
  5. 11.1 Databases and Cybersecurity
  6. 12.2 Printing in Python
E.9
Demonstrate job-specific mathematics skills.
  1. 1.2 Hash Functions
  2. 1.3 Hash Function Development
  3. 11.8 Joining Tables
  4. 12.5 Mathematical Operators
E.10
Demonstrates professionalism in the workplace.
  1. 14.1 Engineering Design Process
E.11
Demonstrate reading and writing skills.
  1. 4.2 Cyber Case Investigation
  2. 4.5 Security Baseline
  3. 14.1 Engineering Design Process
E.12
Demonstrates workplace safety.
  1. 20.4 Personal Safety
F.1
Compare and contrast different types of social engineering techniques (e.g., Phishing, Spam, Spear phishing, Identity fraud).
F.2
Given a scenario, analyze potential indicators to determine the type of attack (e.g., Malware, Password attacks, Physical attacks, Cryptographic attacks).
  1. 3.1 Network Attacks
  2. 3.2 Malware Types and Prevention
  3. 4.3 Security Breaches
  4. 4.4 Network Protocol Defense
F.3
Given a scenario, analyze potential indicators associated with application attacks (e.g., Error handling, Race conditions, Integer overflow, Memory leaks).
  1. 9.1 Identifying Risks
  2. 9.2 Assessing Risks
F.4
Given a scenario, analyze potential indicators associated with network attacks (e.g., Wireless, On-path attack, Domain Name System (DNS), Malicious code).
  1. 3.1 Network Attacks
F.5
Explain different threat actors, vectors, and intelligence sources (e.g., Actors and threats, Vectors, Attributes of actors).
F.6
Explain the security concerns associated with various types of vulnerabilities (e.g., Third-party risks, Weak configurations, Zero-day, Legacy platform).
  1. 3.3 Common Network Attacks
  2. 3.4 Additional Attacks
F.7
Summarize the techniques used in security assessments (e.g.,Threat hunting, Vulnerability scans, Syslog/Security information).
  1. 9.1 Identifying Risks
  2. 9.2 Assessing Risks
F.8
Explain the techniques used in penetration testing (e.g., Penetration testing, Passive and active reconnaissance, Exercise Types).
  1. 9.4 Penetration Testing
G.1
Explain the importance of security concepts in an enterprise environment (e.g., Configuration management, Data protection, Hashing, Site resiliency).
  1. 1.2 Hash Functions
  2. 1.3 Hash Function Development
  3. 1.5 Digital Certificates
  4. 10.4 Level 4: Data and Licenses
G.2
Summarize virtualization and cloud computing concepts (e.g., Cloud models, Cloud service providers, Containers, Microservices/API).
G.3
Summarize secure application development, deployment, and automation concepts (e.g., Environment, Secure coding techniques, Scalability, Automation/scripting).
G.4
Summarize authentication and authorization design concepts (e.g., Biometrics, Multifactor authentication, Cloud vs on-premises requirements).
  1. 6.5 Access Control
G.5
Given a scenario, implement cybersecurity resilience (e.g., Redundancy, Network, Power, Replication, Diversity).
G.6
Explain the security implications of embedded and specialized systems (e.g., Voice over IP(VoIP), System on Chip (SoC), Constraints, Surveillance systems).
G.7
Explain the importance of physical security controls (e.g., Badges, Alarms, Cameras, Locks, Secure Areas).
G.8
Summarize the basics of cryptographic concepts (e.g., Digital signatures, Key length, Symmetric vs asymmetric, Limitations).
  1. 1.1 Advanced Cryptography
  2. 1.4 Asymmetric Encryption
  3. 1.5 Digital Certificates
H.1
Given a scenario, implement secure protocols (e.g., Protocols, Use cases).
  1. 4.4 Network Protocol Defense
  2. 6.2 Protocols and Standards
H.2
Given a scenario, implement host or application security solutions (e.g., Endpoint protection, Boot integrity, BIOS, Database, Application security, Hardening, Self-encrypting drive (SED), Full-disk encryption (FDE), Hardware root of trust, Trusted Platform Module (TPM), sandboxing).
  1. 4.4 Network Protocol Defense
  2. 7.5 Build and Secure a Network
H.3
Given a scenario, implement secure network designs (e.g., Load balancing, Network segmentation, virtual private network (VPN), DNS, network access control (NAC), Out-of-band management, port security, network appliances, Access control list (ACL), route security, Quality of service (QoS), implications of IPv6, Port spanning/port mirroring, monitoring services, file integrity monitors).
  1. 6.3 Private Networks
  2. 7.3 Network Design
  3. 7.4 Networking Services
  4. 7.5 Build and Secure a Network
H.4
Given a scenario, install and configure wireless security settings (e.g., Cryptographic protocols, Authentication protocols, Methods, Installation considerations).
  1. 1.2 Hash Functions
  2. 1.3 Hash Function Development
  3. 1.4 Asymmetric Encryption
  4. 1.5 Digital Certificates
H.5
Given a scenario, implement secure mobile solutions (e.g., connection methods and receivers, Mobile Device Management (MDM), mobile devices, enforcement and monitoring, deployment models).
  1. 6.4 Mobile Devices
H.6
Given a scenario, implement secure mobile solutions (e.g., cloud security controls, solutions, cloud native controls vs. third-party solutions).
H.7
Given a scenario, implement identity and account management controls (e.g., identity, account types, account policies).
H.8
Given a scenario, implement authentication and authorization solutions (e.g., Authentication management, authentication/authorization, access control schemes).
  1. 6.5 Access Control
H.9
Given a scenario, implement public key infrastructure (e.g., Public Key Infrastructure (PKI), types of certificates, certificate formats, concepts).
  1. 1.4 Asymmetric Encryption
  2. 1.5 Digital Certificates
I.1
Given a scenario, use the appropriate tool to assess organizational security (e.g., forensics, file manipulation, network reconnaissance and discovery, password crackers).
  1. 5.2 Forensic Case 1: Logs
  2. 5.3 Forensic Case 2: File Metadata
  3. 5.4 Forensic Case 3: Exit Data
I.2
Summarize the importance of policies, processes, and procedures for incident response (e.g., incident response plans and process, exercises, attack frameworks, communication plan).
  1. 10.3 Level 3: Incident Response
I.3
Given an incident, utilize appropriate data sources to support an investigation (e.g., log files, protocol analyzer output, bandwidth monitors, metadata).
  1. 10.3 Level 3: Incident Response
I.4
Given an incident, apply mitigation techniques or controls to secure an environment (e.g., configuration changes, isolation, containment, segmentation).
  1. 10.3 Level 3: Incident Response
I.5
Explain the key aspects of digital forensics (e.g., documentation/evidence, acquisition, Integrity, data recovery, preservation).
  1. 5.1 Digital Forensics
I.6
Perform secure data destruction (e.g., Secure Erase, BCWipe).
J.1
Compare and contrast various types of controls (e.g., managerial, preventative, corrective, deterrent).
J.2
Explain the importance of applicable regulation standards or frameworks that impact organization security posture (e.g., General Data Protection Regulation (GDPR), - Center for Internet Security (CIS), International Organization for Standardization (ISO) 27001/27002/27701/31000, platform/vendor-specific guides).
J.3
Explain the importance of policies to organizational security (e.g., personnel, diversity of training techniques, third-party risk management, data, credential policies, organizational policies).
J.4
Summarize risk management processes and concepts (e.g., risk types, risk management strategies, risk analysis, disasters, business impact analysis).
  1. 9.1 Identifying Risks
  2. 9.2 Assessing Risks
  3. 9.3 Risk Response
J.5
Explain privacy and sensitive data concepts in relation to security (e.g., organizational consequences of privacy and data breaches, notifications of breaches, data types, privacy enhancing technologies, roles and responsibilities).