Please enable JavaScript to use CodeHS

Standards Mapping

for Alabama Introduction to Cybersecurity

41

Standards in this Framework

36

Standards Mapped

87%

Mapped to Course

Standard Lessons
F1
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
F2
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
F3
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
  1. 7.3 Building a Knowledge Base
  2. 7.4 Star in a Video!
F4
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
  1. 1.4 Cyber Ethics and Laws
  2. 4.7 Software Licenses
F5
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
F6
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
  1. 3.1 Create an Escape Room
  2. 7.4 Star in a Video!
F7
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
  1. 3.1 Create an Escape Room
  2. 6.8 Lab: SOHO Devices
1
Investigate and report on the history and evolution of computers.
2
Identify computer peripherals and common ports related to input and output.
  1. 6.3 Peripheral Devices
3
Identify the internal components of a computer and explain their functions.
  1. 6.1 Internal Components
4
Locate, disassemble, and reassemble the internal components of a computer.
  1. 6.2 Lab: Computer Disassembly
5
Diagnose common issues related to computer hardware, utilizing the troubleshooting process.
  1. 7.2 Troubleshooting Methodology
6
Describe the binary, hexadecimal, and ASCII notational systems used in computers.
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
7
Identify different types of software.
  1. 4.6 Software and Applications
8
Compare and contrast different types of operating systems.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
9
Describe virtual machines and their purposes.
10
Contrast command line interface (CLI) and graphical user interface (GUI).
  1. 4.11 Command Line Interface
  2. 4.12 Lab: Navigating with the CLI
11
Describe various kinds of software licenses and their uses.
  1. 4.7 Software Licenses
12
Explain the importance of cybersecurity for individuals, organizations, businesses, and governments.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
13
Compare and contrast various types of malware.
  1. 1.7 Common Cyber Attacks and Prevention
14
Explain the use of cryptography in ensuring the confidentiality and integrity of both data in transit and data at rest.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
15
Explain the importance of the CIA triad (confidentiality, integrity, and availability) and how it applies to cybersecurity.
  1. 1.6 Cybersecurity Essentials
16
Demonstrate effective practices for protecting personal information and securing transactions.
  1. 1.5 Personal Data Security
  2. 4.9 Browser Configuration
17
Explain system access controls and the difference between authentication and authorization.
  1. 2.4 Authentication Methods
18
Describe various means of accessing a computing system.
  1. 5.5 IP Addresses
  2. 5.7 How Do Websites Work?
19
Describe various methods of protecting access to computer systems and data, including physical security and electronic entry systems.
  1. 6.5 Network Devices
  2. 6.6 Lab: Design a Distribution Frame
20
Describe the concept of a digital footprint.
  1. 1.1 Digital Footprint and Responsibility
21
Describe and discuss online etiquette and safety.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Personal Data and Collection
22
Identify the types of facts about individuals that are considered personally identifiable information (PII).
  1. 1.2 Personal Data and Collection
23
Explain what types of information should and should not be shared online and on social media.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
24
Discuss the responsible and legal use of technology systems and digital content.
  1. 1.4 Cyber Ethics and Laws
  2. 4.7 Software Licenses
25
Describe cyberbullying and its consequences.
26
Explain the importance of using safety procedures with mobile devices.
  1. 6.9 Lab: Mobile Device Connectivity
27
Configure safe web browser settings to protect personal privacy.
  1. 4.9 Browser Configuration
28
Identify the key components that allow users to access the Internet.
  1. 5.4 What is the Internet?
  2. 5.5 IP Addresses
29
Compare and contrast clients, servers, and databases.
  1. 5.7 How Do Websites Work?
  2. 8.2 Using Databases
30
Identify networking cable media technologies.
  1. 6.7 Network Options
31
Perform calculations to identify location of the logical and physical address of a computing device, including MAC and IP addresses.
  1. 5.5 IP Addresses
32
Describe various ways to connect to wireless networks and explain how consumers may determine the best devices to use for accessing them.
  1. 6.8 Lab: SOHO Devices
  2. 6.9 Lab: Mobile Device Connectivity
33
Explain the purpose of the Domain Name System (DNS).
  1. 5.7 How Do Websites Work?
34
Explain how network systems are connected and used.
  1. 5.6 Routing and Packets
  2. 6.10 Network Communication