Please enable JavaScript to use CodeHS

Standards Mapping

for Georgia Foundations of Secure Information Systems

37

Standards in this Framework

37

Standards Mapped

100%

Mapped to Course

Standard Lessons
MS-CS-FSIS-1.1
Communicate effectively through writing, speaking, listening, reading, and interpersonal abilities.
  1. 3.1 Methodology
  2. 3.2 Support Practice
  3. 5.1 Project: Public Service Announcement
MS-CS-FSIS-1.2
Make collaborative observations and demonstrate potential technology and interpersonal interactions in the digital world.
  1. 3.1 Methodology
  2. 3.2 Support Practice
  3. 5.1 Project: Public Service Announcement
MS-CS-FSIS-1.3
Model work-readiness traits required for success in the workplace including integrity, honesty, ethics, accountability, punctuality, time management, and respect for diversity.
  1. 3.1 Methodology
  2. 3.2 Support Practice
  3. 5.1 Project: Public Service Announcement
MS-CS-FSIS-1.4
Exhibit critical thinking and problem-solving skills to locate, analyze, and apply information in career planning and employment situations.
  1. 2.8 Network Administration
  2. 3.1 Methodology
  3. 3.2 Support Practice
  4. 4.3 Hacking Ethics
MS-CS-FSIS-1.5
Present a professional image through appearance, behavior and language.
  1. 3.1 Methodology
  2. 3.2 Support Practice
  3. 5.1 Project: Public Service Announcement
MS-CS-FSIS-1.6
Investigate educational requirements, job responsibilities, employment trends, and opportunities within information technology career pathways using credible sources.
  1. 2.8 Network Administration
  2. 3.1 Methodology
  3. 3.2 Support Practice
  4. 4.3 Hacking Ethics
MS-CS-FSIS-2.1
Identify the basic components of the computer by disassembling and reassembling a demonstration model personal computer (can be done ‘virtually’ online if demo model is not available).
  1. 1.1 Internal Components
MS-CS-FSIS-2.2
Demonstrate an understanding of key functional components (input devices, output devices, processor, operating system, software applications, memory, storage, Wi-Fi and/or Ethernet ports, and IP addresses).
  1. 1.1 Internal Components
  2. 1.2 Storage Options
  3. 1.4 Network Options
  4. 1.5 Network Communication
  5. 1.6 Operating Systems
  6. 2.2 Internet Hardware and Sending Information
MS-CS-FSIS-2.3
Demonstrate an understanding of the terms and units used to describe major hardware components (RAM, ROM, GHz, MHz, GB, MB, CD, DVD, RW).
  1. 1.1 Internal Components
  2. 1.2 Storage Options
  3. 1.3 Network Devices
  4. 2.2 Internet Hardware and Sending Information
MS-CS-FSIS-2.4
Explain the interrelation of the operating system software, application software, and utility software, citing specific examples of each.
  1. 1.6 Operating Systems
  2. 1.7 Software and Applications
  3. 1.8 Application Security
MS-CS-FSIS-2.5
Develop a basic vocabulary of networks including the Internet, wired, wireless, cellular, WiFi, messages, packets, connections, bandwidth, broadband, firewall, hacking, cybersecurity, encryption, local area network (LAN), wide area network (WAN), and OSI model.
  1. 2.3 Internet Addresses
  2. 2.4 Domain Name System (DNS)
  3. 2.5 Routing
  4. 2.6 Packets & Protocols
MS-CS-FSIS-2.6
Demonstrate an understanding of the fundamental concepts for how computers process programming commands (hex, binary language, sequence of commands, conditional structures, and looping structures).
  1. 6.1 Programming Concepts
  2. 6.2 Programming with Karel
  3. 6.3 Looping
  4. 6.4 Branching
MS-CS-FSIS-3.1
Identify characteristics of computational thinking (decomposition, pattern recognition, algorithmic thinking, and abstraction).
  1. 6.1 Programming Concepts
  2. 6.2 Programming with Karel
  3. 6.5 Organizational Techniques
MS-CS-FSIS-3.2
Explain issues and analyze routine hardware and software problems current to everyday life.
  1. 1.8 Application Security
  2. 3.1 Methodology
  3. 3.2 Support Practice
MS-CS-FSIS-3.3
Apply troubleshooting concepts to issues regarding compatibility, data, and identity.
  1. 3.1 Methodology
  2. 3.2 Support Practice
MS-CS-FSIS-3.4
Describe ways to solve operational problems caused by hardware errors.
  1. 3.1 Methodology
  2. 3.2 Support Practice
MS-CS-FSIS-3.5
Explain how technology can create ethical and legal issues in the business world and a technology-based society and how it can be used to solve & manage those issues.
  1. 2.7 Impact of the Internet
MS-CS-FSIS-4.1
Create diagrams to illustrate types of network topologies to include star, ring, bus, mesh, and hybrid.
  1. 2.5 Routing
MS-CS-FSIS-4.2
Differentiate networks based on coverage area including local area network (LAN), wide area network (WAN), and personal area network (PAN).
  1. 1.4 Network Options
  2. 2.4 Domain Name System (DNS)
MS-CS-FSIS-4.3
Differentiate between different network mediums including Wi-Fi, wired, satellite, and microwave.
  1. 1.4 Network Options
MS-CS-FSIS-5.1
Summarize from multiple credible sources the physical and digital aspects of computing networks.
  1. 1.3 Network Devices
  2. 1.4 Network Options
  3. 2.1 Introduction to the Internet
  4. 2.2 Internet Hardware and Sending Information
  5. 2.5 Routing
MS-CS-FSIS-5.2
Trace the layers required to transmit data from one node to another (the OSI model).
  1. 2.5 Routing
  2. 2.6 Packets & Protocols
MS-CS-FSIS-5.3
Construct and explain the basic functions of the OSI model.
  1. 2.5 Routing
  2. 2.6 Packets & Protocols
MS-CS-FSIS-6.1
List and define the elements of the confidentiality, integrity, and availability (CIA) triad.
  1. 4.4 The CIA Triad
MS-CS-FSIS-6.2
Explain components of access control: Identification, Authentication, Authorization, Accountability, and Non-repudiation.
  1. 2.8 Network Administration
MS-CS-FSIS-6.3
Identify the characteristics of strong vs. weak passwords in data and identity security.
  1. 4.5 Privacy & Security
MS-CS-FSIS-6.4
List and describe the basic steps in security risk management.
  1. 2.8 Network Administration
MS-CS-FSIS-6.5
Develop a logical argument for the importance of physical security.
  1. 4.5 Privacy & Security
MS-CS-FSIS-7.1
Define the cybersecurity first principles of least privilege, minimization, abstraction, domain separation, process isolation, information hiding, layering, simplicity, modularity, and resource encapsulation.
  1. 1.9 System Administration
MS-CS-FSIS-7.2
Apply concepts related to the principles behind encryption, including the purpose of cryptography, hashing, and steganography.
  1. 4.6 Cryptography, Cryptology, Cryptanalysis
  2. 4.7 Hash Functions
MS-CS-FSIS-7.3
Draw conclusions illustrating a basic understanding of internet protocol (IP) packets, ports and network transmission.
  1. 2.4 Domain Name System (DNS)
  2. 2.5 Routing
  3. 2.6 Packets & Protocols
MS-CS-FSIS-7.4
Summarize from multiple credible sources a basic understanding of anti-malware, firewalls, intrusion detection system/intrusion prevention system (IDS/IPS), and virtual private network (VPN).
  1. 2.8 Network Administration
  2. 4.1 What is Cybersecurity?
  3. 4.2 Impact of Cybersecurity
MS-CS-FSIS-8.1
Explain the differences between an ethical (white hat) hacker and an unethical (black hat) hacker.
  1. 4.3 Hacking Ethics
MS-CS-FSIS-8.2
Cite evidence regarding the practice of ethical digital decision-making, including plagiarism, copyright law, and software licensing types (freeware, public domain, shareware, etc.).
  1. 4.9 Creative Credit & Copyright
MS-CS-FSIS-8.3
Summarize and provide examples regarding security and privacy laws and their impact on society, citing recent cases.
  1. 4.3 Hacking Ethics
  2. 4.5 Privacy & Security
MS-CS-FSIS-8.4
Collect and compare cyberbullying evidence, including legal and social consequences, and develop guidelines to prevent cyberbullying.
  1. 4.8 Cyberbullying
MS-CS-FSIS-8.5
Develop an argument regarding network security, citing policy-driven and technologydriven examples.
  1. 2.8 Network Administration