Please enable JavaScript to use CodeHS

Standards Mapping

for Arkansas Networking

61

Standards in this Framework

38

Standards Mapped

62%

Mapped to Course

Standard Lessons
1.1.1
Analyze how networks are used in various industries (e.g., retail, healthcare, and education).
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
  3. 6.8 Lab: SOHO Devices
  4. Advanced Cybersecurity
  5. 6.1 Network Administrator
  6. 7.3 Network Design
  7. 7.5 Build and Secure a Network
  8. 8.1 Project: The Inside Scoop on LANs
1.1.2
Compare and contrast entry-level networking jobs, outlining requirements and career paths.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
  4. Advanced Cybersecurity
  5. 6.1 Network Administrator
  6. 16.1 After Advanced Cybersecurity
1.1.3
Justify the importance of essential skills and networking certifications (e.g., Network+, CCNA, and MTA) in the job market.
  1. Fundamentals of Cybersecurity
  2. 10.1 After Fundamentals of Cybersecurity
  3. Advanced Cybersecurity
  4. 16.1 After Advanced Cybersecurity
1.2.1
Describe the function of common network devices in a physical or simulated network setup (e.g., NIC, switch, access point, and router).
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
1.2.2
Use common networking terms in written and oral communication (e.g., host, LAN, WAN, subnet, and bandwidth).
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
  3. Advanced Cybersecurity
  4. 7.3 Network Design
  5. 7.4 Networking Services
  6. 8.1 Project: The Inside Scoop on LANs
1.2.3
Analyze network traffic in a physical or simulated LAN using packet capture data (e.g. switching, unicast/broadcast communication)
  1. Advanced Cybersecurity
  2. 7.4 Networking Services
1.2.4
Explain the role of MAC addresses in network communication.
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
  3. Advanced Cybersecurity
  4. 6.3 Private Networks
1.2.5
Demonstrate the use of VLANs to segment physical or simulated networks.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
  3. Advanced Cybersecurity
  4. 7.3 Network Design
1.3.1
Use packet capture data to explain the interaction of OSI model layers (e.g., link layer delivers network layer data which delivers transport layer data and so-on).
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
1.3.2
Explain the role of Internet Protocol (IP) in network communication.
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
1.3.3
Compare and contrast TCP and UDP using packet capture data.
  1. Fundamentals of Cybersecurity
  2. 5.7 How Do Websites Work?
  3. 5.8 OSI Model
1.3.4
Analyze packet capture data to identify the ports and protocols used by different applications.
  1. Advanced Cybersecurity
  2. 7.4 Networking Services
1.3.5
Describe data flow between networks (e.g., encapsulation/de-encapsulation and routing) in a physical or simulated WAN.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
2.1.1
Describe the structure and function of IPv4 and IPv6 addresses (e.g. address classes, network IDs, and host addresses).
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
2.1.2
Calculate and justify IP addressing schemes for networks of varying complexity (e.g., classful vs CIDR network, subnet calculation given number of devices).
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
  3. Advanced Cybersecurity
  4. 7.3 Network Design
2.1.3
Build physical or simulated networks of varying complexity and justify design choices in given scenarios (e.g. simple wireless home network, complex enterprise network with multiple geographic locations and network segmentation requirements).
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. 7.3 Network Design
  4. 7.4 Networking Services
2.1.4
Create detailed network diagrams using standard symbols (e.g., router icons, switch shapes, and connection lines).
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. 7.3 Network Design
  4. 7.4 Networking Services
2.2.1
Analyze and trace the DNS resolution process from domain name to IP address (e.g., by observing DNS queries using packet capture software like Wireshark, comparing DNS responses from different servers, or manually querying authoritative DNS servers with `dig` or `nslookup`).
  1. Advanced Cybersecurity
  2. 7.5 Build and Secure a Network
2.2.2
Describe the function of DHCP from packet capture data.(e.g. DISCOVER, OFFER, REQUEST, ACK).
  1. Advanced Cybersecurity
  2. 7.5 Build and Secure a Network
2.2.3
Identify the operation of HTTP within packet capture data (e.g. GET, POST).
2.2.4
Analyze packet capture data to identify how common protocols (e.g., HTTP, DNS, and SSH) use TCP and UDP.
2.3.1
Configure a DHCP server in a physical or simulated network (e.g., configure IP range, default gateway, and lease time).
2.3.2
Implement a local DNS server in a physical or simulated environment and create and test an A record (e.g. dnsmasq, BIND in WSL or Linux, MaraDNS).
2.3.3
Investigate the use of public DNS services (e.g., Google DNS and Microsoft DNS).
2.3.4
Configure an SSID and network services on a physical or simulated access point or wireless router.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
3.1.1
Configure operating system firewalls (e.g., Windows Firewall, MacOS Network Firewall, and ufw) to allow or block applications.
3.1.2
Configure and test a router ACL in a physical or simulated network.
3.1.3
Configure wireless security in a physical or simulated network (e.g., WEP, WPA, and WPA2/3 ).
3.1.4
Compare wireless security protocols by analyzing packet capture data (e.g., WEP vs WPA 4-way handshake).
3.1.5
Analyze packet capture data to understand encryption methods used in wireless security (e.g., TKIP vs AES vs CCMP w/ AES).
3.2.1
Simulate and analyze a man-in-the-middle attack on a physical or simulated network.
3.2.2
Compare HTTP and HTTPS traffic using packet capture data.
3.2.3
Compare SSH and Telnet sessions using packet capture data.
3.2.4
Configure and test a VPN connection between two routers in a physical or simulated network.
3.3.1
Use a network scanning tool to identify open ports and services on a network. (e.g., Nmap port scan).
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. Advanced Cybersecurity
  4. 9.4 Penetration Testing
3.3.2
Identify vulnerabilities associated with default network device configurations (e.g., default passwords and open management interfaces).
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. Advanced Cybersecurity
  4. 9.1 Identifying Risks
  5. 9.4 Penetration Testing
3.3.3
Implement basic hardening steps to mitigate identified vulnerabilities in various devices (e.g., changing default passwords, disabling unnecessary services, and closing unused ports).
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. Advanced Cybersecurity
  4. 9.1 Identifying Risks
  5. 9.3 Risk Response
  6. 9.4 Penetration Testing
3.3.4
Analyze security advisories from vendors to address known vulnerabilities in network devices or software (e.g., update firmware and install patches).
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. Advanced Cybersecurity
  4. 9.2 Assessing Risks
4.1.1
Interpret the output of common network commands to identify network status information (e.g., ping, ipconfig, tracert, and nslookup).
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 5.6 Routing and Packets
  4. 6.10 Network Communication
4.1.2
Analyze test results to identify potential network performance issues. (e.g., speedtest.net, WiFi analyzer, and cable tester).
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
4.1.3
Categorize common network error messages and explain the underlying network issues (e.g., "No internet connection", DNS errors, and IP conflicts).
4.2.1
Describe the common causes of wireless connectivity issues (e.g., weak signal strength, wireless interference, and channel congestion).
  1. Advanced Cybersecurity
  2. 6.2 Protocols and Standards
4.2.2
Analyze how IP address conflicts arise in network scenarios (e.g.,static IP assignments and overlapping DHCP scopes) and describe the methods used to detect them.
4.2.3
Describe troubleshooting steps to isolate the source of internet connection problems (e.g., DNS, router malfunction, and ISP outages).
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
4.3.1
Explain the importance of detailed documentation in problem resolution.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
  3. Advanced Cybersecurity
  4. 10.3 Level 3: Incident Response
4.3.2
Communicate technical problems in simple terms (e.g., user descriptions and status updates).
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.3 Building a Knowledge Base
4.3.3
Create basic network status reports (e.g., uptime logs, bandwidth utilization and issue summaries).
4.4.1
Explain why precise identification and documentation of the initial network problem (e.g., "Can't print," "Slow internet", and "No WiFi") is essential for effective troubleshooting.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
4.4.2
Describe techniques used to isolate network issues (e.g., reviewing recent changes and using network diagnostic tools).
4.4.3
Explain the importance of making only one change at a time and verifying the results.
4.4.4
Explain the value of documenting problem solutions (e.g., fix steps and prevention tips).
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
5.1.1
Create strong, unique passwords for various online accounts.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
5.1.2
Demonstrate the use of a password manager to improve online security.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
5.1.3
Categorize different types of sensitive personal data (e.g., financial, medical, communication) and explain why each category requires specific security measures.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
5.1.4
Identify which actions are responsible and irresponsible in terms of bandwidth and data usage in network scenarios (e.g., downloading large files, streaming media, file sharing).
5.2.1
Analyze an acceptable use policy (AUP) and identify ethical guidelines regarding network usage.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
5.2.2
Simulate scenarios involving online communication and file sharing and demonstrate respect for user privacy and data confidentiality (e.g., secure file sharing practices, avoiding phishing attempts).
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
5.2.3
Justify resource allocation in a given network scenario (e.g., data limits in a cloud storage scenario, device storage quotas in a shared network drive).
5.3.1
Implement basic security measures (e.g., access controls, encryption principles) to protect simulated network information like network diagrams and IP address schemes from unauthorized access in a lab setting.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 2.2 Symmetric Encryption
  4. 2.3 Asymmetric Encryption
  5. 2.4 Authentication Methods
  6. Advanced Cybersecurity
  7. 1.1 Advanced Cryptography
  8. 1.2 Hash Functions
  9. 6.5 Access Control
5.3.2
Create clear and concise documentation for simulated network changes (e.g., adding a user, changing a router configuration).
5.3.3
Justify the appropriate level of access and sharing for different types of network documentation and explain the potential ethical implications of over-sharing or under-sharing network information (e.g. “need-to-know”).