Please enable JavaScript to use CodeHS

Standards Framework

for Colorado Cybersecurity I

47

Standards in this Framework

Standard Description
CYBI.1 Analyze ethical security practices, including but not limited to the issues of a) Data security, b) Confidentiality, c) Integrity, d) Availability, e) Authentication, f) Nonrepudiation, g) Physical security, h) HIPPA Laws, i) Payment Card Industry (PCI) Compliance
CYBI.2 Understand the importance of ISO27000 standards
CYBI.3 Research current events on breaches with focus on particular Information Assurance (IA) areas that were compromised
CYBI.4 Analyze security threats, vulnerabilities, and exploits a) Explain how they impact an organization
CYBI.5 Read and interpret technical information to define risk management and how it applies to information security
CYBI.6 Perform a simulated risk assessment by using the common industry framework from ISO
CYBI.7 Explain the core concepts of access control as they relate to authentication and authorization
CYBI.8 Analyze the use of administrative, logical (technical) and physical controls applied to systems and organizations
CYBI.9 Demonstrate the use of access controls that apply to user account management, including basic and advanced techniques
CYBI.10 Identify and describe common Local Area Network (LAN) methodologies
CYBI.11 Analyze the various LAN topologies including perimeter networks which may include the use of a Demilitarized zone (DMZ)
CYBI.12 Indicate and explain the standards of Ethernet
CYBI.13 Describe the characteristics of LAN cabling
CYBI.14 Explain industry standards used in wireless networks including security protocols used to protect the wireless network
CYBI.15 Describe how routing protocols are used in the differences between static and dynamic methods of routing
CYBI.16 Explain how to install and configure Routing and Remote Access Service (RRAS) to function as a network router and how to install and configure Routing Information Protocols
CYBI.17 Choose between technologies and topologies used for wide area networks (WAN)
CYBI.18 Explain how the different types of personal and small business internet connectivity has changed throughout history and identify current internet systems most commonly used
CYBI.19 Summarize the common OSI model and the function used by each layer
CYBI.20 Analyze and describe the differences between the Transmission Control Protocol/Internet Protocol (TCP/IP) and OSI models for networking
CYBI.21 Define and describe the various services used by networks for the transmission of data such as DNS, NAT, and DHCP
CYBI.22 Analyze the differences among the addressing techniques used by networks, including IPv4 and basic IPv6
CYBI.23 Demonstrate the use of subnets in an organization's network environment
CYBI.24 Research the features and requirements of a working model of a client-server network and how services function in a networked Windows environment
CYBI.25 Compare and contrast the differences and uses of the Internet, Intranets, and Extranets
CYBI.26 Research and describe the most common methods and technology used to secure networks
CYBI.27 Investigate and distinguish among the following common methods to secure a network a) VPNs for remote access b) Firewalls c) Perimeter network designs d) Preventative technologies
CYBI.28 Research the different applications of network security devices a) Optical drives b) Combo drives and burners c) Connection types d) Hard drives e) Solid state/flash drives f) RAID types g) Floppy drive h) Tape drive i) Media capacity
CYBI.29 Demonstrate secure networking techniques by designing a simple secure network
CYBI.30 Analyze the various networking commands used to test and examine networks
CYBI.31 Research the features and uses of command line utilities to configure and examine networking services and construct a flow chart that a security analyst could reference
CYBI.32 Explore various operating and file systems used in networks
CYBI.33 Identify the pros and cons of how systems are designed to provide the security necessary in a multiuser environment
CYBI.34 Describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc.
CYBI.35 Distinguish among the following common prevention methods to secure a computer system a) Physical security (e.g., lock doors, tailgating, biometrics, badges, key fobs, retinal, etc.) b) Digital security (e.g., antivirus, firewalls, antispyware, user authentication, etc.) c) User education d) Principles of least privilege
CYBI.36 Report on recent threats and vulnerabilities to systems in networking environments
CYBI.37 Differentiate between threats and vulnerabilities and what constitutes a network attack
CYBI.38 Identify how to differentiate between the different types of applications attacks
CYBI.39 Explain ways to install and configure antivirus software
CYBI.40 Research the features and requirements of common security procedures used to protect system resources on a network
CYBI.41 Describe the differences among various methods to create baseline security measures
CYBI.42 Research storage devices and backup media outlining their purpose, characteristics, proper maintenance, and methods used to back up and protect data from unauthorized use and access of data a) Optical drives b) Combo drives and burners c) Connection types d) Hard drives e) Solid state/flash drives f) RAID types g) Floppy drive h) Tape drive i) Media capacity
CYBI.43 Demonstrate the methods used to protect against unauthorized use of files
CYBI.44 Configure file and folder permissions
CYBI.45 Analyze various protocols and services used by systems for securing them in a network environment
CYBI.46 Illustrate cryptology’s historical evolution including but not limited to public key infrastructures, asymmetric and symmetric encryptions
CYBI.47 Analyze common methods and use of cryptology to protect data