Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado Cybersecurity I

47

Standards in this Framework

47

Standards Mapped

100%

Mapped to Course

Standard Lessons
CYBI.1
Analyze ethical security practices, including but not limited to the issues of a) Data security, b) Confidentiality, c) Integrity, d) Availability, e) Authentication, f) Nonrepudiation, g) Physical security, h) HIPPA Laws, i) Payment Card Industry (PCI) Compliance
  1. 1.4 Cyber Ethics and Laws
  2. 1.6 Cybersecurity Essentials
  3. 3.5 Software Licenses
CYBI.2
Understand the importance of ISO27000 standards
  1. 1.4 Cyber Ethics and Laws
  2. 1.6 Cybersecurity Essentials
  3. 3.5 Software Licenses
CYBI.3
Research current events on breaches with focus on particular Information Assurance (IA) areas that were compromised
  1. 1.7 Common Cyber Attacks and Prevention
CYBI.4
Analyze security threats, vulnerabilities, and exploits a) Explain how they impact an organization
  1. 7.7 Risky Business
CYBI.5
Read and interpret technical information to define risk management and how it applies to information security
  1. 7.6 Checking for Vulnerabilities
  2. 7.7 Risky Business
CYBI.6
Perform a simulated risk assessment by using the common industry framework from ISO
  1. 7.6 Checking for Vulnerabilities
  2. 7.7 Risky Business
  3. 7.8 Risk Response
CYBI.7
Explain the core concepts of access control as they relate to authentication and authorization
  1. 1.5 Personal Data Security
CYBI.8
Analyze the use of administrative, logical (technical) and physical controls applied to systems and organizations
  1. 3.9 System Administration
  2. 7.5 Environmental Controls
CYBI.9
Demonstrate the use of access controls that apply to user account management, including basic and advanced techniques
  1. 3.9 System Administration
CYBI.10
Identify and describe common Local Area Network (LAN) methodologies
  1. 5.9 Network Administrator
  2. 5.13 Private Networks
  3. 6.1 Project: The Inside Scoop on LANs
CYBI.11
Analyze the various LAN topologies including perimeter networks which may include the use of a Demilitarized zone (DMZ)
  1. 6.1 Project: The Inside Scoop on LANs
CYBI.12
Indicate and explain the standards of Ethernet
  1. 6.1 Project: The Inside Scoop on LANs
CYBI.13
Describe the characteristics of LAN cabling
  1. 6.1 Project: The Inside Scoop on LANs
CYBI.14
Explain industry standards used in wireless networks including security protocols used to protect the wireless network
  1. 2.4 Authentication Methods
  2. 5.12 Protocols and Standards
CYBI.15
Describe how routing protocols are used in the differences between static and dynamic methods of routing
  1. 4.6 Routing and Packets
CYBI.16
Explain how to install and configure Routing and Remote Access Service (RRAS) to function as a network router and how to install and configure Routing Information Protocols
  1. 5.15 Lab: Setting up Remote Access
CYBI.17
Choose between technologies and topologies used for wide area networks (WAN)
  1. 5.13 Private Networks
  2. 5.14 DMZs and VPNs
  3. 5.15 Lab: Setting up Remote Access
  4. 5.16 More about Networks
CYBI.18
Explain how the different types of personal and small business internet connectivity has changed throughout history and identify current internet systems most commonly used
  1. 5.13 Private Networks
  2. 5.16 More about Networks
CYBI.19
Summarize the common OSI model and the function used by each layer
  1. 4.8 OSI Model
CYBI.20
Analyze and describe the differences between the Transmission Control Protocol/Internet Protocol (TCP/IP) and OSI models for networking
  1. 4.8 OSI Model
CYBI.21
Define and describe the various services used by networks for the transmission of data such as DNS, NAT, and DHCP
  1. 5.13 Private Networks
  2. 5.14 DMZs and VPNs
CYBI.22
Analyze the differences among the addressing techniques used by networks, including IPv4 and basic IPv6
  1. 4.5 IP Addresses
CYBI.23
Demonstrate the use of subnets in an organization's network environment
  1. 5.9 Network Administrator
  2. 5.13 Private Networks
CYBI.24
Research the features and requirements of a working model of a client-server network and how services function in a networked Windows environment
  1. 5.9 Network Administrator
CYBI.25
Compare and contrast the differences and uses of the Internet, Intranets, and Extranets
  1. 5.13 Private Networks
CYBI.26
Research and describe the most common methods and technology used to secure networks
  1. 5.11 Network Management
  2. 5.13 Private Networks
  3. 5.16 More about Networks
CYBI.27
Investigate and distinguish among the following common methods to secure a network a) VPNs for remote access b) Firewalls c) Perimeter network designs d) Preventative technologies
  1. 5.11 Network Management
  2. 5.13 Private Networks
  3. 5.16 More about Networks
CYBI.28
Research the different applications of network security devices a) Optical drives b) Combo drives and burners c) Connection types d) Hard drives e) Solid state/flash drives f) RAID types g) Floppy drive h) Tape drive i) Media capacity
  1. 5.9 Network Administrator
CYBI.29
Demonstrate secure networking techniques by designing a simple secure network
  1. 5.13 Private Networks
  2. 5.14 DMZs and VPNs
  3. 5.15 Lab: Setting up Remote Access
  4. 5.16 More about Networks
CYBI.30
Analyze the various networking commands used to test and examine networks
  1. 3.10 Command Line Interface
  2. 5.10 Network Communication
  3. 5.11 Network Management
CYBI.31
Research the features and uses of command line utilities to configure and examine networking services and construct a flow chart that a security analyst could reference
  1. 3.10 Command Line Interface
  2. 5.10 Network Communication
  3. 5.11 Network Management
CYBI.32
Explore various operating and file systems used in networks
  1. 3.1 Operating Systems
CYBI.33
Identify the pros and cons of how systems are designed to provide the security necessary in a multiuser environment
  1. 1.7 Common Cyber Attacks and Prevention
  2. 3.6 Application Security
  3. 3.9 System Administration
CYBI.34
Describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc.
  1. 1.7 Common Cyber Attacks and Prevention
  2. 7.6 Checking for Vulnerabilities
CYBI.35
Distinguish among the following common prevention methods to secure a computer system a) Physical security (e.g., lock doors, tailgating, biometrics, badges, key fobs, retinal, etc.) b) Digital security (e.g., antivirus, firewalls, antispyware, user authentication, etc.) c) User education d) Principles of least privilege
  1. 3.6 Application Security
  2. 3.7 Lab: Anti-virus Software Installation
  3. 7.5 Environmental Controls
CYBI.36
Report on recent threats and vulnerabilities to systems in networking environments
  1. 1.7 Common Cyber Attacks and Prevention
CYBI.37
Differentiate between threats and vulnerabilities and what constitutes a network attack
  1. 1.7 Common Cyber Attacks and Prevention
  2. 5.6 Network Options
  3. 7.6 Checking for Vulnerabilities
  4. 7.7 Risky Business
CYBI.38
Identify how to differentiate between the different types of applications attacks
  1. 5.6 Network Options
  2. 7.6 Checking for Vulnerabilities
  3. 7.7 Risky Business
CYBI.39
Explain ways to install and configure antivirus software
  1. 3.6 Application Security
  2. 3.7 Lab: Anti-virus Software Installation
CYBI.40
Research the features and requirements of common security procedures used to protect system resources on a network
  1. 1.7 Common Cyber Attacks and Prevention
CYBI.41
Describe the differences among various methods to create baseline security measures
  1. 3.9 System Administration
CYBI.42
Research storage devices and backup media outlining their purpose, characteristics, proper maintenance, and methods used to back up and protect data from unauthorized use and access of data a) Optical drives b) Combo drives and burners c) Connection types d) Hard drives e) Solid state/flash drives f) RAID types g) Floppy drive h) Tape drive i) Media capacity
  1. 5.4 Storage Options
CYBI.43
Demonstrate the methods used to protect against unauthorized use of files
  1. 3.9 System Administration
CYBI.44
Configure file and folder permissions
  1. 3.9 System Administration
CYBI.45
Analyze various protocols and services used by systems for securing them in a network environment
  1. 5.13 Private Networks
  2. 5.16 More about Networks
CYBI.46
Illustrate cryptology’s historical evolution including but not limited to public key infrastructures, asymmetric and symmetric encryptions
  1. 2.1 Cryptography: Then, Now, and Future
CYBI.47
Analyze common methods and use of cryptology to protect data
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption