Please enable JavaScript to use CodeHS

Georgia Introduction to Cybersecurity Framework


Standard Description
IT-ICS-1.1 Communicate effectively through writing, speaking, listening, reading, and interpersonal abilities. Lessons
IT-ICS-1.2 Demonstrate creativity by asking challenging questions and applying innovative procedures and methods. Lessons
IT-ICS-1.3 Exhibit critical thinking and problem solving skills to locate, analyze and apply information in career planning and employment situations. Lessons
IT-ICS-1.4 Model work readiness traits required for success in the workplace including integrity, honesty, accountability, punctuality, time management, and respect for diversity. Lessons
IT-ICS-1.5 Apply the appropriate skill sets to be productive in a changing, technological, diverse workplace to be able to work independently and apply team work skills. Lessons
IT-ICS-1.6 Present a professional image through appearance, behavior and language. Lessons
IT-ICS-2.1 Explain the importance of data security Lessons
IT-ICS-2.2 Explain the concepts of confidentiality, integrity, availability, authentication, and nonrepudiation. [NICE 63] Lessons
IT-ICS-2.3 Research current events on breaches; focus on particular Information Assurance (IA) areas that were compromised. [NICE 165] Lessons
IT-ICS-2.4 Explain the importance of physical security. Lessons
IT-ICS-3.1 Define and identify the different types of LANs. Lessons
IT-ICS-3.2 Identify and describe the purpose for a perimeter network. Lessons
IT-ICS-3.3 Identify the different network topologies to include client/server and peer-to-peer distributed networks. Lessons
IT-ICS-3.4 Define and describe Ethernet standards. Lessons
IT-ICS-3.5 Identify twisted-pair cable, cabling tools, cabling testers and describe what can interfere with twisted-pair cabling, and how to avoid it. Lessons
IT-ICS-3.6 Identify wireless devices, wireless settings and configurations, wireless standards, and encryption protocols. Lessons
IT-ICS-3.7 Explain the differences between static and dynamic routing Lessons
IT-ICS-3.8 Explain how to install and configure Routing and Remote Access Service (RRAS) to function as a network router and how to install the Routing Information Protocol Lessons
IT-ICS-3.9 Explain the basics about various other wide area networking technologies Lessons
IT-ICS-3.10 Explain different personal and small business Internet connectivity types Lessons
IT-ICS-4.1 Explain the Open Systems Interconnection (OSI) model by defining each of the layers and their functions. Lessons
IT-ICS-4.2 Explain the differences and operation of layer 2 and layer 3 switches. Lessons
IT-ICS-4.3 Differentiate between the OSI model and the TCP model. Lessons
IT-ICS-4.4 Demonstrate how to categorize IPv4 addresses using the Class A, B, and C classifications Lessons
IT-ICS-4.5 Identify the default gateway and Domain Name System (DNS) server and explain how to configure within a network adapter’s Transmission Control Protocol/Internet Protocol (TCP/IP) properties dialog box Lessons
IT-ICS-4.6 Demonstrate how to define advanced TCP/IP concepts, such as Network Address Translation (NAT) and sub-nets, and how to create a sub-netted network. Lessons
IT-ICS-4.7 Demonstrate the basics of IPv6 and how to configure IPv6 in the command line and define dual stack and tunneling technologies. Lessons
IT-ICS-4.8 Implement Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to client computers demonstrating an understanding of the four-step process known as DORA (discover, offer, request, acknowledgment). Lessons
IT-ICS-4.9 Implement Terminal Services so that client computers can connect remotely to a server and take control of it in the Graphical User Interface (GUI) Lessons
IT-ICS-4.10 Implement Network Policy Service (NPS) as a LAN router and define IPsec and the various types of protocols, including Security Associations (SA), Authentication Header (AH), and Encapsulating Security Payload (ESP). Lessons
IT-ICS-4.11 Explain the function of Domain Name System (DNS) and Windows Internet Name Service (WINS) and explain how to install in Windows Server 2008, as well as how to create forward-lookup zones. Lessons
IT-ICS-5.1 Manipulate and explain the command prompt as an administrator. Lessons
IT-ICS-5.2 Demonstrate basic TCP/IP commands such as ipconfig and ping to analyze and test a network. Lessons
IT-ICS-5.3 Demonstrate more advanced commands such as netstat, nbtstat, tracert, pathping, route, and netsh to fully examine a computer and configure it in the command line. Lessons
IT-ICS-5.4 Manipulate the Net command in an effort to find out more information about a system, start and stop services, and work with the network configuration. Lessons
IT-ICS-6.1 Differentiate between the Internet, Intranets, and Extranets. Lessons
IT-ICS-6.2 Demonstrate how to set up a virtual private network (VPN). Lessons
IT-ICS-6.3 Explain firewalls and how to initiate port scans on them to see whether they are locked down. Lessons
IT-ICS-6.4 Explain other perimeter devices and zones, such as proxy servers, internet content filters, Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS), and Demilitarized Zones (DMZ). Lessons
IT-ICS-7.1 Explain the security function and purpose of network devices and technologies (e.g., Intrusion Detection System (IDS) tools and applications and IDS hardware and software, including open source tools, and their capabilities. [NICE 3, 59 and 146] Lessons
IT-ICS-7.2 Distinguish and differentiate between network design elements and compounds. Lessons
IT-ICS-7.3 Securely install cabling. Lessons
IT-ICS-7.4 Configure firewalls. Lessons
IT-ICS-7.5 Configure secure network connections (in Windows or Linux). Lessons
IT-ICS-7.6 Justify the use of basic Windows or Linux commands to configure communications (e.g. ipconfig/ifconfig). Lessons
IT-ICS-7.7 Design a basic secure network topology demonstrating knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies. [NICE 66] Lessons
IT-ICS-8.1 Compare and contrast common operating systems, e.g., Windows, Linux, OS X. Lessons
IT-ICS-8.2 Compare and contrast common file systems Lessons
IT-ICS-8.3 Explain the importance of application security. Lessons
IT-ICS-8.4 Demonstrate knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). [NICE 105] Lessons
IT-ICS-8.5 Install and configure anti-virus software Lessons
IT-ICS-8.6 Perform command line exercises specific to operating systems. Lessons
IT-ICS-8.7 Demonstrate knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities and how to differentiate between types of application attacks. [NICE 150] Lessons
IT-ICS-8.8 Justify the need and implement Active X and Java Security. Lessons
IT-ICS-8.9 Discuss protection from buffer overflow attacks. Lessons
IT-ICS-8.10 Prevent input validation attacks and scripting attacks. Lessons
IT-ICS-8.11 Justify the need for and implement secure cookies. Lessons
IT-ICS-9.1 Implement appropriate procedures to establish host security Lessons
IT-ICS-9.2 Secure operating systems (OS), user profiles, and computer permissions. Lessons
IT-ICS-9.3 Secure firewalls and Web browsers. Lessons
IT-ICS-9.4 Establish a secure baseline for host OS. Lessons
IT-ICS-9.5 Install and manage MS Windows Lessons
IT-ICS-9.6 Analyze security using Microsoft Baseline Security Analyzer (MBSA). Lessons
IT-ICS-9.7 Demonstrate knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools such as Microsoft (MS) Backup/Restore. [NICE 29] Lessons
IT-ICS-9.8 Methodically examine and conduct a security audit to review system performance and settings in Windows and Linux. Lessons
IT-ICS-9.9 Demonstrate the ability to select and set both file and folder permissions in Windows and Linux. Lessons
IT-ICS-9.10 Set up shared documents and folders. Lessons
IT-ICS-9.11 View and edit Windows services (disable services). Lessons
IT-ICS-9.12 Enable Extended File System (EFS). Lessons
IT-ICS-9.13 View and change the backup archive bit in order to change the backup file status. Lessons
IT-ICS-9.14 Secure DNS/BIND, web, email, messaging, FTP servers. Lessons
IT-ICS-9.15 Secure directory services, Dynamic Host Configuration Protocol (DHCP), file, and print servers. Lessons
IT-ICS-10.1 Demonstrate knowledge of host/network access controls (e.g., access control list) to include the function and purpose of authentication services. [NICE 49] Lessons
IT-ICS-10.2 Explain the fundamental concepts and best practices related to authentication, authorization, and access control. Lessons
IT-ICS-10.3 Implement appropriate security controls when performing account management. Lessons
IT-ICS-10.4 Review authentication using Lessons
IT-ICS-10.5 Manage user accounts, including basic to advanced protocol procedures. Lessons
IT-ICS-11.1 Summarize general cryptography concepts (symmetric encryption, asymmetric encryption). [NICE 27] Lessons
IT-ICS-11.2 Demonstrate basic cipher systems (e.g., Caesar cipher, Vigenere cipher). Lessons
IT-ICS-11.3 Demonstrate file hashing. Lessons
IT-ICS-11.4 Demonstrate knowledge of current applications of steganography to include concealed identification, authentication, and communications. Lessons
IT-ICS-12.1 Explain the goals, mission and objectives of Future Business Leaders of America. Lessons
IT-ICS-12.2 Explore the impact and opportunities a student organization (FBLA) can develop to bring business and education together in a positive working relationship through innovative leadership and career development programs. Lessons
IT-ICS-12.3 Explore the local, state, and national opportunities available to students through participation in related student organization (FBLA) including but not limited to conferences, competitions, community service, philanthropy, and other FBLA activities. Lessons
IT-ICS-12.4 Explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development. Lessons
IT-ICS-12.5 Explore the competitive events related to the content of this course and the required competencies, skills, and knowledge for each related event for individual, team, and chapter competitions. Lessons