Please enable JavaScript to use CodeHS

FL Fundamentals of Cybersecurity Framework

Standards

Standard Description
1.01 Describe and use current and emerging computer technology and software to perform personal and business related tasks. Lessons
1.02 Describe the types of communications and networking systems used in workplace environments. Lessons
1.03 Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals. Lessons
1.04 Troubleshoot problems with computer hardware peripherals. Lessons
1.05 Describe ethical, privacy, and security issues and problems associated with computers and information systems. Lessons
1.06 Demonstrate proficiency in using the basic features of GUI browsers. Lessons
1.07 Configure computer systems to protect against various low-level attacks. Lessons
2.01 Identify the most common computer operating systems. Lessons
2.02 Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems. Lessons
2.03 Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save). Lessons
2.04 Demonstrate a working knowledge of standard file formats. Lessons
2.05 Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux). Lessons
2.06 Differentiate between different operating systems and applications. Lessons
2.07 Compare and contrast open source and proprietary software. Lessons
2.08 Explain how system utilities are used to maintain computer performance. Lessons
2.09 Evaluate criteria for selecting an operating system. Lessons
2.10 Configure various operating systems from their default settings to low, medium, and high security level settings. Lessons
3.01 Explain how information technology impacts the operation and management of business and society. Lessons
3.02 Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile). Lessons
3.03 Describe how digital technologies (social media) are changing both work and personal lifestyles. Lessons
3.04 Demonstrate an understanding of configuring social media used for business to meet various business requirements. Lessons
3.05 Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry. Lessons
4.01 Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security. Lessons
4.02 Explain the need for, and use of, peripherals and how they can compromise security. Lessons
4.03 Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks. Lessons
4.04 Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security. Lessons
5.01 Explain the need for and use of compilers. Lessons
5.02 Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented). Lessons
5.03 Compare the various types or classes of programming languages (e.g., compiled, interpretive). Lessons
5.04 Differentiate among source code, machine code, interpreters, and compilers. Lessons
5.05 Characterize the major categories of programming languages and how they are used. Lessons
5.06 Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO. Lessons
5.07 Describe the stages in the software development life cycle and explain how to successfully implement them. Lessons
5.08 Compare security and vulnerabilities of various programming languages. Lessons
6.01 Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI). Lessons
6.02 Adhere to published best practices for protecting personal identifiable information when using the Internet. Lessons
6.03 Identify trends related to the secure use of information technology in people’s personal and professional lives. Lessons
6.04 Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security. Lessons
7.01 Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. Lessons
7.02 Describe the purpose of the OSI model and each of its layers. Lessons
7.03 Explain specific functions belonging to each OSI model layer. Lessons
7.04 Understand how two network nodes communicate through the OSI model. Lessons
7.05 Discuss the structure and purpose of data packets and frames. Lessons
7.06 Describe the two types of addressing covered by the OSI model. Lessons
8.01 Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. Lessons
8.02 Describe the purpose of the TCP/IP model and each of its layers. Lessons
8.03 Explain specific functions belonging to each TCP/IP model layer. Lessons
8.04 Understand how two network nodes communicate through the TCP/IP model. Lessons
8.05 Describe the two types of addressing covered by the TCP/IP model. Lessons
9.01 Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). Lessons
9.02 Use common computer and programming terminology. Lessons
10.01 Identify and describe web terminology. Lessons
10.02 Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh). Lessons
10.03 Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil). Lessons
10.04 Demonstrate proficiency using search engines, including Boolean search strategies. Lessons
10.05 Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF). Lessons
10.06 Compare and contrast the roles of web servers and web browsers. Lessons
10.07 Compare and contrast MS Web Servers and Linux Web Servers. Lessons
11.01 Describe cyber-bullying and its impact on perpetrators and victims. Lessons
11.02 Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection. Lessons
11.03 Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses. Lessons
11.04 Describe the risks associated with online gaming and ways to reduce these risks. Lessons
11.05 Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet. Lessons
11.06 Describe various risks associated with social networking sites and ways to reduce these risks. Lessons
11.07 Describe the risks associated with various conferencing programs and ways to reduce these risks. Lessons
11.08 Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites. Lessons
12.01 Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). Lessons
12.02 Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). Lessons
13.01 Describe email capabilities and functions. Lessons
13.02 Identify components of an email message. Lessons
13.03 Identify the components of an email address. Lessons
13.04 Identify when to use different email options. Lessons
13.05 Attach a file to an email message. Lessons
13.06 Forward an email message. Lessons
13.07 Use an address book if an address book is available via the school’s Outlook server for the student to use. Lessons
13.08 Reply to an email message. Lessons
13.09 Use the Internet to perform email activities. Lessons
13.10 Identify the appropriate use of email and demonstrate related email etiquette. Lessons
13.11 Recognize a fraudulent email and deal with it appropriately. Lessons
13.12 Identify common problems associated with widespread use of email. Lessons
13.13 Create folders to organize email. Lessons
14.01 Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology. Lessons
14.02 Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance. Lessons
14.03 Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers). Lessons
14.04 Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles. Lessons
14.05 Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web. Lessons
15.01 Determine work priorities, the audience, project budgets, project specifications, and the production schedule. Lessons
15.02 Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks. Lessons
15.03 Present and defend design projects. Lessons
16.01 Locate, comprehend and evaluate key elements of oral and written information. Lessons
16.02 Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals). Lessons
16.03 Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention. Lessons
17.01 Demonstrate knowledge of arithmetic operations. Lessons
17.02 Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity. Lessons
17.03 Demonstrate an understanding of binary numbers and ASCII characters. Lessons
18.01 Discuss the role of creativity in constructing scientific questions, methods and explanations. Lessons
18.02 Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings. Lessons