Please enable JavaScript to use CodeHS

Standards Mapping

for California Networking Pathway

39

Standards in this Framework

17

Standards Mapped

43%

Mapped to Course

Standard Lessons
B1.1
Define the terminology used in the design, assembly, configuration, and implementation of networks.
B1.2
List the fundamental elements of the major networking models established by the industry standards of recognized organizations: the Open System Interconnect (OSI) or transmission-control/Internet protocol (TCP/IP) models.
  1. 9.5 Internet Addresses
  2. 9.8 Packets & Protocols
B1.3
Identify and explain how data, voice, and video/communications are carried through the most common network media.
  1. 9.4 Internet Hardware and Sending Information
B1.4
List the characteristics, advantages, and disadvantages of the various networking presentation functions, data formatting, data encryption, and data compression.
B1.5
Explain the characteristics of networking hardware and applications and the methods to deploy them.
  1. 9.4 Internet Hardware and Sending Information
B1.6
Design and document data/communication systems networks.
B2.1
Use appropriate wiring and wireless standards and plan, install, and maintain media (copper, fiber, and wireless) for a variety of network systems.
B2.2
Demonstrate standard procedures and practices for safely using tools and working safely around the electrical environment in various networking systems.
B2.3
Test and maintain wired and wireless network communications components and systems.
B3.1
Identify and describe the functions of various network devices, including network connectivity hardware.
  1. 10.3 Network Devices
B3.2
Describe the differences between various network environments: peer-to-peer, client-server, thin client, virtualized, internetworks, intranets, and extranets.
  1. 8.5 Clients and Servers
B3.3
Distinguish between the topologies and protocols of local area networks and those of wide area networks.
  1. 10.5 Network Options
B3.4
Confirm operating parameters, apply test procedures, make necessary adjustments, and assemble the components of a network system or subsystem.
B3.5
Configure the major addressing and routing protocols used in networking.
  1. 9.5 Internet Addresses
  2. 9.7 Routing
  3. 9.8 Packets & Protocols
B3.6
Implement a functional wired and wireless network, including the installation and configuration of components, software, and plug-ins.
B3.7
Evaluate, select, and deploy a variety of network architectures, information and communication technologies, and protocols.
B4.1
Identify and use network tools to troubleshoot and verify network availability and performance.
  1. 11.1 Methodology
  2. 11.2 Support Practice
B4.2
Identify common customer policies and procedures, including those for management of incidents.
B4.3
Identify the implications of major protocols and international standards and their impact on network management.
  1. 9.8 Packets & Protocols
B4.4
Apply appropriate technologies to improve network performance for data, voice, and video transmission.
B4.5
Apply the proper security patches, updates, and procedures necessary to maintain and support a network.
  1. 11.1 Methodology
  2. 11.2 Support Practice
B4.6
Use common help-desk tools and resources, such as incident tracking, knowledge database, and staffing to administer and manage a network.
B4.7
Apply known effective methods of disseminating information and instruction to users.
  1. 6.1 Project: Classic Cipher Newscast
B4.8
Use project management skills and tools for managing and maintaining various types of networks.
B4.9
Analyze network system interdependencies and constraints.
B5.1
Classify and use various electronic components, symbols, abbreviations, and media common to network topology diagrams.
B5.2
Interpret, organize, and communicate complex network diagrams by using information collected from detailed drawings.
B6.1
Identify and document the appropriate uses of networking services, products, and applications.
  1. 7.4 Software and Applications
  2. 9.1 Introduction to the Internet
B6.2
Evaluate the features of communications software products in terms of their appropriateness to organizational tasks.
B6.3
Configure compatible systems across various platforms and types of media.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
B7.1
Describe the effective management of human, financial, and communications resources from the standpoints of the user and the provider.
B7.2
Diagram physical and logical layouts of networks that support information and communication technologies.
  1. 10.5 Network Options
B7.3
Evaluate emerging products, services, and business models in relation to the creation, setup, and management of networks that support information and communication technologies.
  1. 10.2 Peripheral Devices
  2. 10.3 Network Devices
  3. 10.4 Storage Options
  4. 10.5 Network Options
B7.4
Evaluate, create, and process voice, video, and data transmissions.
B8.1
Identify and define command network security threats: hackers, crackers, viruses, worms, and Trojan horses.
  1. 1.2 What is Cybersecurity?
  2. 7.6 Application Security
  3. 8.10 SQL Injection Overview
B8.2
Describe the importance of classifying appropriate monitoring devices and procedures for quick identification and prevention of security violations.
B8.3
List the policies and procedures for routine administration, such as user agreement, incident reporting, and recovery for users.
B8.4
Identify common potential risks and entrance points, including internal and external risks, and the tools used to neutralize them: firewalls; monitoring; and antivirus, spyware, and spam protection.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 7.6 Application Security
B8.5
Identify and apply common techniques for disaster prevention and recovery.