Please enable JavaScript to use CodeHS

California 6-8 Standards Mapping


Fundamentals of Cybersecurity

24 Standards in this Framework 14 Standards Mapped 58% Mapped to Course

Standard Lessons
6-8.AP.10 Use flowcharts and/or pseudocode to design and illustrate algorithms that solve complex problems.
  1. 4.6 Organizational Techniques
6-8.AP.11 Create clearly named variables that store data, and perform operations on their contents.
  1. 4.1 Programming Concepts
6-8.AP.12 Design and iteratively develop programs that combine control structures and use compound conditions.
  1. 4.3 Looping
  2. 22.4 If Statements
  3. 22.7 For Loop Practice
  4. 22.9 While Loops
6-8.AP.13 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
6-8.AP.14 Create procedures with parameters to organize code and make it easier to reuse.
6-8.AP.15 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
6-8.AP.16 Incorporate existing code, media, and libraries into original programs, and give attribution.
6-8.AP.17 Systematically test and refine programs using a range of test cases.
  1. 4.3 Looping
  2. 4.4 Branching
6-8.AP.18 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.19 Document programs in order to make them easier to use, read, test, and debug.
  1. 4.6 Organizational Techniques
6-8.CS.1 Design modifications to computing devices in order to improve the ways users interact with the devices.
6-8.CS.2 Design a project that combines hardware and software components to collect and exchange data.
6-8.CS.3 Systematically apply troubleshooting strategies to identify and resolve hardware and software problems in computing systems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
6-8.DA.7 Represent data in multiple ways.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6-8.DA.8 Collect data using computational tools and transform the data to make it more useful.
6-8.DA.9 Test and analyze the effects of changing variables while using computational models.
6-8.IC.20 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 2.1 Digital Footprint and Reputation
  2. 10.10 Impact of the Internet
6-8.IC.21 Discuss issues of bias and accessibility in the design of existing technologies.
6-8.IC.22 Collaborate with many contributors when creating a computational artifact.
  1. 3.1 Project: Public Service Announcement
6-8.IC.23 Compare tradeoffs associated with licenses for computational artifacts to balance the protection of the creators' rights and the ability for others to use and modify the artifacts.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
6-8.IC.24 Compare tradeoffs between allowing information to be public and keeping information private and secure.
  1. 2.1 Digital Footprint and Reputation
  2. 2.4 Privacy & Security
6-8.NI.4 Model the role of protocols in transmitting data across networks and the Internet.
  1. 10.8 Packets & Protocols
  2. 10.9 Viewing a Webpage
6-8.NI.5 Explain potential security threats and security measures to mitigate threats.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
  7. 11.6 Network Communication
6-8.NI.6 Apply multiple methods of information protection to model the secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.3 Basic Crypto Systems: Caesar Cipher
  3. 5.4 Basic Crypto Systems: Cracking Caesar
  4. 5.5 Basic Crypto Systems: Vigenere Cipher