Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia Cybersecurity Fundamentals

109

Standards in this Framework

Standard Lessons
1
Demonstrate creativity and innovation.
2
Demonstrate critical thinking and problem solving.
3
Demonstrate initiative and self-direction.
4
Demonstrate integrity.
5
Demonstrate work ethic.
6
Demonstrate conflict-resolution skills.
7
Demonstrate listening and speaking skills.
8
Demonstrate respect for diversity.
9
Demonstrate customer service skills.
10
Collaborate with team members.
11
Demonstrate big-picture thinking.
12
Demonstrate career- and life-management skills.
13
Demonstrate continuous learning and adaptability.
14
Manage time and resources.
15
Demonstrate information-literacy skills.
16
Demonstrate an understanding of information security.
17
Maintain working knowledge of current information-technology (IT) systems.
18
Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
19
Apply mathematical skills to job-specific tasks.
20
Demonstrate professionalism.
21
Demonstrate reading and writing skills.
22
Demonstrate workplace safety.
23
Examine aspects of planning within an industry/organization.
24
Examine aspects of management within an industry/organization.
25
Examine aspects of financial responsibility within an industry/organization.
26
Examine technical and production skills required of workers within an industry/organization.
27
Examine principles of technology that underlie an industry/organization.
28
Examine labor issues related to an industry/organization.
29
Examine community issues related to an industry/organization.
30
Examine health, safety, and environmental issues related to an industry/organization.
31
Identify the purposes and goals of the student organization.
32
Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
33
Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
34
Identify Internet safety issues and procedures for complying with acceptable use standards.
35
Identify the types of work-based learning (WBL) opportunities.
36
Reflect on lessons learned during the WBL experience.
37
Explore career opportunities related to the WBL experience.
38
Participate in a WBL experience, when appropriate.
39
Describe Cybersecurity
40
Define information assurance
41
Describe the critical factors of information security
42
Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration
43
Define risk
44
Identify the concepts of cybersecurity risk management
45
Describe cybersecurity threats to an organization
46
Explain why organizations need to manage risk
47
Discuss national or industry standards/regulations that relate to cybersecurity
48
Describe the cyberattack surface of various organizations
49
Analyze risks affecting critical infrastructure
50
Describe a network
51
Describe a wired/cabled network
52
Describe a wireless network
53
Compare cabled/wired and wireless networks
54
Compare networking conceptual models
55
Discuss services, their relationship to the OSI model, and potential vulnerabilities
56
Differentiate among network types
57
Examine the concept of the Internet as a network of connected systems
58
Identify networking protocols
59
Describe the difference between a cyber threat and a vulnerability
60
Describe types of cyber threats
61
Analyze types of current cyber threats
62
Identify the perpetrators of different types of malicious hacking
63
Describe the characteristics of vulnerabilities
64
Identify the prevention of and protection against cyber threats
65
Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks
66
Differentiate between ethics and laws
67
Distinguish among types of ethical concerns
68
Define cyberbullying
69
Identify actions that constitute cyberbullying
70
Identify possible warning signs of someone being cyberbullied
71
Identify laws applicable to cybersecurity
72
Explain the concept of “personally identifiable information”
73
Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it
74
Identify ways to control and protect personal data
75
Demonstrate net etiquette (netiquette) as it relates to cybersecurity
76
Analyze the social and legal significance of the ongoing collection of personal digital information
77
Distinguish between data, information, and knowledge
78
Identify the most common ways data is collected
79
Identify the most common ways data can be stored
80
Explain the difference between data at rest, data in transit, and data being processed
81
Identify the most common ways data is used
82
Discuss how data can be compromised, corrupted, or lost
83
Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)
84
Define the function of a computer operating system
85
Identify the components of an operating system
86
List types of operating systems
87
Evaluate the potential vulnerabilities, threats, and common exploits to an operating system
88
Identify best practices for protecting operating systems
89
Describe the concept of malware and techniques to guard against it
90
Evaluate critical operating system security parameters
91
Describe security and auditing logs
92
Describe the role of a system backup
93
Define virtualization technology
94
Identify advantages and disadvantages of using virtual machines
95
Define programming in the context of cybersecurity
96
Differentiate between computer programming languages
97
Evaluate common programming flaws that lead to vulnerabilities
98
Identify best practices in secure coding and design
99
Identify ubiquitous computing
100
Discuss security and privacy implications of ubiquitous computing
101
Research career opportunities for cybersecurity professionals
102
Identify the educational pathways for emerging cybersecurity professionals
103
Identify the educational pathways for emerging cybersecurity professionals
104
Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters
105
Research the cyber threats and security measures related to career pathways
106
Identify testing skills/strategies for a certification examination
107
Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course
108
Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams)
109
Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA)