Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia Cybersecurity Fundamentals

109

Standards in this Framework

89

Standards Mapped

81%

Mapped to Course

Standard Lessons
1
Demonstrate creativity and innovation.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
2
Demonstrate critical thinking and problem solving.
  1. 3.1 Project: Public Service Announcement
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.5 Basic Crypto Systems: Vigenere Cipher
  5. 6.1 Project: Classic Cipher Newscast
  6. 8.9 Common Security Problems
  7. 12.2 Support Practice
3
Demonstrate initiative and self-direction.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
4
Demonstrate integrity.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 3.1 Project: Public Service Announcement
  4. 6.1 Project: Classic Cipher Newscast
  5. 10.10 Creative Credit & Copyright
5
Demonstrate work ethic.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
6
Demonstrate conflict-resolution skills.
  1. 2.2 Cyberbullying
  2. 3.1 Project: Public Service Announcement
  3. 6.1 Project: Classic Cipher Newscast
7
Demonstrate listening and speaking skills.
  1. 2.2 Cyberbullying
  2. 3.1 Project: Public Service Announcement
  3. 6.1 Project: Classic Cipher Newscast
8
Demonstrate respect for diversity.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 10.11 Impact of the Internet
9
Demonstrate customer service skills.
  1. 6.1 Project: Classic Cipher Newscast
  2. 12.1 Methodology
  3. 12.2 Support Practice
10
Collaborate with team members.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
11
Demonstrate big-picture thinking.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
12
Demonstrate career- and life-management skills.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
13
Demonstrate continuous learning and adaptability.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
14
Manage time and resources.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
15
Demonstrate information-literacy skills.
  1. 2.5 Information Literacy
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
  3. 3.1 Project: Public Service Announcement
16
Demonstrate an understanding of information security.
  1. 2.4 Privacy & Security
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
  3. 6.1 Project: Classic Cipher Newscast
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
  7. 8.12 Software Security Quiz
17
Maintain working knowledge of current information-technology (IT) systems.
  1. 6.1 Project: Classic Cipher Newscast
  2. 8.1 Inside Web Apps
  3. 8.2 Developer Tools
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
  7. 12.1 Methodology
  8. 12.2 Support Practice
18
Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 6.1 Project: Classic Cipher Newscast
  3. 8.1 Inside Web Apps
  4. 8.2 Developer Tools
  5. 8.4 Databases
  6. 8.10 SQL Injection Overview
  7. 10.8 Packets & Protocols
  8. 10.9 Viewing a Webpage
  9. 12.1 Methodology
  10. 12.2 Support Practice
19
Apply mathematical skills to job-specific tasks.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 6.1 Project: Classic Cipher Newscast
20
Demonstrate professionalism.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 12.1 Methodology
  4. 12.2 Support Practice
21
Demonstrate reading and writing skills.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 12.1 Methodology
  4. 12.2 Support Practice
22
Demonstrate workplace safety.
  1. 2.3 Internet Safety
23
Examine aspects of planning within an industry/organization.
  1. 11.4 Storage Options
  2. 11.5 Network Options
24
Examine aspects of management within an industry/organization.
  1. 11.7 Network Management
25
Examine aspects of financial responsibility within an industry/organization.
  1. 1.2 What is Cybersecurity?
26
Examine technical and production skills required of workers within an industry/organization.
  1. 8.4 Databases
  2. 8.9 Common Security Problems
  3. 12.1 Methodology
  4. 12.2 Support Practice
27
Examine principles of technology that underlie an industry/organization.
  1. 11.4 Storage Options
  2. 11.5 Network Options
  3. 11.6 Network Communication
28
Examine labor issues related to an industry/organization.
29
Examine community issues related to an industry/organization.
  1. 3.1 Project: Public Service Announcement
  2. 10.11 Impact of the Internet
30
Examine health, safety, and environmental issues related to an industry/organization.
  1. 3.1 Project: Public Service Announcement
31
Identify the purposes and goals of the student organization.
32
Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
33
Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
34
Identify Internet safety issues and procedures for complying with acceptable use standards.
  1. 7.5 Software Licenses
35
Identify the types of work-based learning (WBL) opportunities.
36
Reflect on lessons learned during the WBL experience.
37
Explore career opportunities related to the WBL experience.
38
Participate in a WBL experience, when appropriate.
39
Describe Cybersecurity
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
40
Define information assurance
  1. 8.9 Common Security Problems
41
Describe the critical factors of information security
  1. 8.9 Common Security Problems
42
Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration
  1. 2.7 Hacking Ethics
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
43
Define risk
  1. 1.2 What is Cybersecurity?
44
Identify the concepts of cybersecurity risk management
  1. 8.9 Common Security Problems
45
Describe cybersecurity threats to an organization
  1. 1.3 Impact of Cybersecurity
  2. 1.5 What is Cybersecurity? Quiz
46
Explain why organizations need to manage risk
  1. 1.3 Impact of Cybersecurity
47
Discuss national or industry standards/regulations that relate to cybersecurity
  1. 1.3 Impact of Cybersecurity
  2. 2.7 Hacking Ethics
  3. 8.9 Common Security Problems
48
Describe the cyberattack surface of various organizations
49
Analyze risks affecting critical infrastructure
50
Describe a network
  1. 10.4 Internet Hardware and Sending Information
  2. 10.12 Networking Fundamentals Quiz
  3. 11.5 Network Options
  4. 11.8 IT Infrastructure Quiz
51
Describe a wired/cabled network
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
  3. 11.8 IT Infrastructure Quiz
52
Describe a wireless network
  1. 10.4 Internet Hardware and Sending Information
  2. 10.12 Networking Fundamentals Quiz
  3. 11.3 Network Devices
  4. 11.5 Network Options
  5. 11.8 IT Infrastructure Quiz
53
Compare cabled/wired and wireless networks
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
  3. 11.8 IT Infrastructure Quiz
54
Compare networking conceptual models
  1. 10.7 Routing
55
Discuss services, their relationship to the OSI model, and potential vulnerabilities
56
Differentiate among network types
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 11.5 Network Options
  4. 11.8 IT Infrastructure Quiz
57
Examine the concept of the Internet as a network of connected systems
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 10.12 Networking Fundamentals Quiz
58
Identify networking protocols
  1. 10.8 Packets & Protocols
  2. 10.12 Networking Fundamentals Quiz
  3. 11.3 Network Devices
  4. 11.5 Network Options
  5. 11.8 IT Infrastructure Quiz
59
Describe the difference between a cyber threat and a vulnerability
60
Describe types of cyber threats
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
  6. 9.1 Project: Security Assessment Report
61
Analyze types of current cyber threats
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
  6. 9.1 Project: Security Assessment Report
62
Identify the perpetrators of different types of malicious hacking
  1. 1.3 Impact of Cybersecurity
  2. 8.10 SQL Injection Overview
63
Describe the characteristics of vulnerabilities
  1. 7.6 Application Security
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
64
Identify the prevention of and protection against cyber threats
  1. 1.3 Impact of Cybersecurity
  2. 8.11 Types of SQLi and Prevention
  3. 9.1 Project: Security Assessment Report
65
Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks
66
Differentiate between ethics and laws
  1. 2.7 Hacking Ethics
67
Distinguish among types of ethical concerns
  1. 2.7 Hacking Ethics
68
Define cyberbullying
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
69
Identify actions that constitute cyberbullying
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
70
Identify possible warning signs of someone being cyberbullied
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
71
Identify laws applicable to cybersecurity
  1. 2.2 Cyberbullying
72
Explain the concept of “personally identifiable information”
73
Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it
  1. 8.3 The Value of Data
  2. 8.4 Databases
74
Identify ways to control and protect personal data
  1. 2.4 Privacy & Security
  2. 8.9 Common Security Problems
75
Demonstrate net etiquette (netiquette) as it relates to cybersecurity
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.8 Digital Citizenship and Cyber Hygiene Quiz
76
Analyze the social and legal significance of the ongoing collection of personal digital information
  1. 2.4 Privacy & Security
  2. 8.4 Databases
77
Distinguish between data, information, and knowledge
  1. 8.4 Databases
78
Identify the most common ways data is collected
  1. 8.4 Databases
79
Identify the most common ways data can be stored
  1. 8.4 Databases
80
Explain the difference between data at rest, data in transit, and data being processed
  1. 8.4 Databases
81
Identify the most common ways data is used
  1. 8.3 The Value of Data
  2. 8.4 Databases
82
Discuss how data can be compromised, corrupted, or lost
  1. 8.10 SQL Injection Overview
  2. 8.11 Types of SQLi and Prevention
  3. 9.1 Project: Security Assessment Report
83
Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)
  1. 7.6 Application Security
  2. 8.11 Types of SQLi and Prevention
  3. 9.1 Project: Security Assessment Report
  4. 11.6 Network Communication
84
Define the function of a computer operating system
  1. 7.1 Operating Systems
85
Identify the components of an operating system
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
86
List types of operating systems
  1. 7.2 Comparing Operating Systems
87
Evaluate the potential vulnerabilities, threats, and common exploits to an operating system
  1. 7.6 Application Security
88
Identify best practices for protecting operating systems
  1. 7.6 Application Security
89
Describe the concept of malware and techniques to guard against it
  1. 7.6 Application Security
90
Evaluate critical operating system security parameters
  1. 7.6 Application Security
91
Describe security and auditing logs
  1. 11.7 Network Management
92
Describe the role of a system backup
  1. 7.6 Application Security
93
Define virtualization technology
  1. 7.1 Operating Systems
94
Identify advantages and disadvantages of using virtual machines
  1. 7.1 Operating Systems
95
Define programming in the context of cybersecurity
  1. 8.11 Types of SQLi and Prevention
96
Differentiate between computer programming languages
  1. 4.1 Programming Concepts
  2. 8.1 Inside Web Apps
97
Evaluate common programming flaws that lead to vulnerabilities
  1. 8.1 Inside Web Apps
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
98
Identify best practices in secure coding and design
  1. 8.1 Inside Web Apps
  2. 8.11 Types of SQLi and Prevention
99
Identify ubiquitous computing
  1. 1.2 What is Cybersecurity?
100
Discuss security and privacy implications of ubiquitous computing
  1. 1.2 What is Cybersecurity?
101
Research career opportunities for cybersecurity professionals
  1. 1.3 Impact of Cybersecurity
  2. 8.4 Databases
  3. 8.9 Common Security Problems
102
Identify the educational pathways for emerging cybersecurity professionals
103
Identify the educational pathways for emerging cybersecurity professionals
104
Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters
  1. 1.3 Impact of Cybersecurity
  2. 8.4 Databases
  3. 8.9 Common Security Problems
105
Research the cyber threats and security measures related to career pathways
  1. 1.3 Impact of Cybersecurity
  2. 8.9 Common Security Problems
106
Identify testing skills/strategies for a certification examination
107
Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course
108
Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams)
109
Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA)