Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada Cybersecurity 1

109

Standards in this Framework

57

Standards Mapped

52%

Mapped to Course

Standard Lessons
1.1.1
Demonstrate the proper use of safety devices
1.1.2
Research the environmental impact of production
1.1.3
Research local, state, and federal regulations related to material handling
1.1.4
Demonstrate secure disposal of technology materials
1.1.5
Describe Material Safety Data Sheets (MSDS)
1.1.6
Explain the relationship between organization and safety
1.1.7
Demonstrate an organized work environment
  1. 12.1 Methodology
1.1.8
Demonstrate electrical safety (e.g., grounding, ESD (static), etc.)
  1. 12.1 Methodology
1.1.9
Apply installation safety (e.g., lifting, overhead movements, etc.)
1.1.10
Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems)
1.2.1
Explain common tools used in computer repair
  1. 12.1 Methodology
1.2.2
Demonstrate the use of common networking and repair tools
  1. 12.1 Methodology
1.2.3
Select the proper tool for diagnostic and troubleshooting procedures
  1. 12.1 Methodology
1.2.4
Compare and contrast fire suppression systems in IT environments
1.2.5
Describe the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems for IT systems
2.1.1
Analyze legal issues in technology
2.1.2
Evaluate intellectual property laws
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
2.1.3
Explain differences between licensing, copyright, and infringement
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
2.1.4
Explain the differences between restricted content, prohibited or illegal content
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
2.1.5
Examine state, federal, and international regulations related to technology (e.g.; legal holds, disposal methods, data retention, discoverability, data protection, etc.)
2.2.1
Analyze acceptable use policies
  1. 2.6 Creative Credit & Copyright
  2. 10.10 Creative Credit & Copyright
2.2.2
Explain the difference between technology policies, privacy standards, and best practices
2.2.3
Explain data and privacy encryption issues related to using technology
  1. 2.4 Privacy & Security
2.2.4
Evaluate appropriate consent policies to monitoring various stakeholders
  1. 2.4 Privacy & Security
2.2.5
Explain appropriate data classification
2.3.1
Communicate with customers to ensure understanding of customer requirements, scope, and concerns
2.3.2
Utilize appropriate documentation systems
  1. 12.2 Support Practice
2.3.3
Explain the purpose of business agreements (i.e., memos of understanding, service level agreement, statement of work, master services agreement)
3.1.1
Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, CPU features, memory module attributes, and expansion business types)
  1. 11.1 Internal Components
3.1.2
Use industry standard vocabulary to identify components
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
3.2.1
Select and install appropriate system unit components to meet customer specifications
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
3.2.2
Interpret BIOS/UEFI settings for basic hardware components
  1. 11.1 Internal Components
3.2.3
Configure the settings of basic hardware components
  1. 7.3 Compatibility
  2. 11.1 Internal Components
3.2.4
Troubleshoot basic hardware components and resolve issues
  1. 12.2 Support Practice
3.3.1
Categorize audio and video device components, connectors, and cables
  1. 11.2 Peripheral Devices
3.3.2
Install appropriate sound and video cards to match specifications and end-user requirements
  1. 11.1 Internal Components
3.3.3
Configure display and video settings
  1. 7.3 Compatibility
3.3.4
Manage sound card and audio device settings
  1. 7.3 Compatibility
3.4.1
Identify external device components, connectors, and cables
  1. 11.2 Peripheral Devices
3.4.2
Connect external devices using the appropriate connectors and cables
  1. 11.2 Peripheral Devices
3.4.3
Manage device driver updates and roll back drivers
  1. 11.2 Peripheral Devices
3.4.4
Enable or disable devices
  1. 7.3 Compatibility
3.4.5
Install drivers for external devices
  1. 11.2 Peripheral Devices
3.4.6
Prepare devices for safe removal
3.4.7
Manipulate system utilities to configure storage and external devices
  1. 7.3 Compatibility
3.5.1
Install SOHO multifunction device / printers and configure appropriate settings
3.5.2
Compare and contrast differences between the various print technologies and the associated imaging process
3.5.3
Perform appropriate printer maintenance
4.1.1
Use industry standard vocabulary in relation to operating systems (OS)
  1. 7.1 Operating Systems
4.1.2
Compare and contrast Microsoft Windows Operating Systems
  1. 7.2 Comparing Operating Systems
4.1.3
Install and secure operating systems
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
4.1.4
Install and configure Windows networking
4.2.1
Explain various features and tools of operating systems
  1. 7.2 Comparing Operating Systems
4.2.2
Apply appropriate command line tools
  1. 7.9 Command Line Interface
  2. 11.7 Network Management
4.2.3
Select appropriate operating system features and tools based on customer requirements
  1. 7.3 Compatibility
4.2.4
Configure Windows Update Settings
  1. 7.2 Comparing Operating Systems
4.2.5
Configure local users and groups for a Windows networking system
  1. 7.8 System Administration
4.2.6
Configure User Access Control (UAC)
  1. 7.8 System Administration
4.2.7
Use Windows Control Panel utilities
4.2.8
Perform common preventive maintenance procedures using the appropriate Windows OS tools
  1. 7.6 Application Security
4.2.9
Troubleshoot common PC security issues using best practices
  1. 12.1 Methodology
4.3.1
Explain key terms and acronyms used in diagnostic testing and troubleshooting
  1. 12.1 Methodology
4.3.2
Identify common symptoms for a given discrepancy
  1. 12.1 Methodology
  2. 12.2 Support Practice
4.3.3
Develop a solution for a given discrepancy
  1. 12.1 Methodology
  2. 12.2 Support Practice
4.3.4
Document the solution
  1. 12.1 Methodology
  2. 12.2 Support Practice
4.4.1
Identify common features and functionality of the Mac OS and Linux operating systems
  1. 7.2 Comparing Operating Systems
4.4.2
Set up and use client-side virtualization
4.4.3
Identify basic cloud concepts
  1. 11.4 Storage Options
4.4.4
Summarize the properties and purpose of services provided by networked hosts
4.4.5
Identify basic features of mobile operating systems
4.4.6
Install and configure basic mobile device network connectivity and email
  1. 7.8 System Administration
4.4.7
Summarize methods and data related to mobile device synchronization
4.4.8
Compare and contrast methods to secure mobile devices
4.4.9
Explain the characteristics of various types of other mobile devices
4.4.10
Compare and contrast accessories, features, and ports of mobile and IoT devices
4.4.11
Troubleshoot common mobile OS and tablet software/hardware issues
4.5.1
Compare and contrast laptops, tablets, and computer form factors
4.5.2
Explain current trends in laptops and tablet applications
4.5.3
Compare laptop and tablet operating systems
4.5.4
Explain the function of components within the display of a laptop and tablet
4.5.5
Compare and contrast accessories, features, and ports of laptops and tablets
5.1.1
Describe the OSI model and relate to hardware in a network
5.1.2
Implement the appropriate industry policy and procedures
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
  3. 10.10 Creative Credit & Copyright
5.1.3
Compare and contrast the ports and protocols (HTTP, NetBIOS, SMTP, TCP, UDP, etc.)
5.1.4
Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.)
5.1.5
Utilize appropriate wired connections
  1. 11.2 Peripheral Devices
5.1.6
Utilize appropriate wireless connections
  1. 11.5 Network Options
5.2.1
Describe encapsulation/de-encapsulation
5.2.2
Explain modulation techniques
  1. 10.2 Notational Systems
5.2.3
Apply numbering systems (e.g., binary, octal, hexadecimal)
  1. 10.2 Notational Systems
5.2.4
Demonstrate addressing and subnetting techniques
  1. 10.5 Internet Addresses
5.2.5
Compare broadband/baseband
5.2.6
Compare and contrast bit rates vs. baud rates
5.2.7
Describe CDMA
5.2.8
Explain the difference between CSMA/CD-CSMA/CA
5.2.9
Describe wavelength
5.2.10
Apply TCP/IP suite (TCP, UDP, ICMP)
5.3.1
Compare Main (MDF) and intermediate distribution frame (IDF)
5.3.2
Implement a cable management solution
5.3.3
Analyze and create a power management plan (i.e., power converters, circuits, UPS {Power redundancy}, inverters, load capacity, etc.)
5.3.4
Determine proper airflow for optimal performance
5.3.5
Utilize correct rack systems for location and operation
5.3.6
Employ consistent labeling methodologies (port, system, circuit, patch panel)
5.3.7
Develop a plan to monitor rack security and environmental conditions
6.3.3
Troubleshoot and resolve common wireless issues
  1. 12.2 Support Practice
6.3.4
Troubleshoot and resolve common copper and fiber cable issues
  1. 11.3 Network Devices
6.3.5
Troubleshoot and resolve common network issues
  1. 12.2 Support Practice
6.3.6
Troubleshoot and resolve common security issues
  1. 12.2 Support Practice
6.3.7
Troubleshoot and resolve common WAN issues
  1. 12.2 Support Practice