Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado Cybersecurity II

33

Standards in this Framework

20

Standards Mapped

60%

Mapped to Course

Standard Lessons
CYBII.1
Analyze current legislation that governs computer related crimes.
  1. 10.4 Level 4: Data and Licenses
CYBII.2
Research and report on current legal cases involving acts of computer crime.
  1. 3.2 Malware Types and Prevention
CYBII.3
Analyze methods used to collect evidence to support legal cases involving computer related crimes.
  1. 3.2 Malware Types and Prevention
  2. 9.1 Identifying Risks
CYBII.4
Determine various forms of malware.
  1. 3.2 Malware Types and Prevention
CYBII.5
Analyze methods to handle malware. a) Encryption techniques, b) Basic input/output system (BIOS) features, c) Strategies for dealing with malware
  1. 3.2 Malware Types and Prevention
CYBII.6
Differentiate among various types of attacks on systems and networks. a) Virus, b) Worms, c) Trojans, d) Unpatched software, e) Password cracking, f) Advanced persistent threat, g) Reconnaissance/footprinting, h) Infiltration, i) Network breach, j) Network exploitation, k) Attack for effects (e.g., deceive, disrupt, degrade, and destroy), l) DoS/DDoS, session hijacking, m) HTTP spoofing, n) DNS attacks, o) Switch attacks, p) Main-in-the-middle (MITM) attacks, q) Cross site scripting, r) Drive-by-attacks
  1. 3.3 Common Network Attacks
  2. 3.4 Additional Attacks
CYBII.7
Analyze cryptographic tools, procedures for use, and products. a) PKI Certificates, b) PGP, c) Certificate authorities
  1. 1.1 Advanced Cryptography
  2. 1.2 Hash Functions
  3. 1.5 Digital Certificates
CYBII.8
Develop a simple public key infrastructure to be used in a small business.
CYBII.9
Demonstrate the create of a self-signed certificate for use on a web server by using command line or online tools.
  1. 1.5 Digital Certificates
CYBII.10
Analyze attack methods on wireless networks.
  1. 3.1 Network Attacks
  2. 6.2 Protocols and Standards
CYBII.11
Demonstrate the use of wireless security protocols.
  1. 6.2 Protocols and Standards
CYBII.12
Evaluate the capabilities of WPA, WPA-2, and WEP and the effectiveness of the security protocols and demonstrate how to use them appropriately.
  1. 6.2 Protocols and Standards
CYBII.13
Analyze, define, and demonstrate the use of environmental controls.
CYBII.14
Work collaboratively to develop simple policies that support the operations of security in an organization.
  1. 10.3 Level 3: Incident Response
CYBII.15
Research and analyze security awareness in organizations. a) Security policy training and procedures, b) Personally identifiable information, c) Information classifications, d) Data labeling, handling, and disposal, e) Compliance with laws, best practices, and standards, f) User habits, g) Threat awareness, h) Use of social networking
  1. 10.2 Level 2: User Training
CYBII.16
Analyze and define the impact of security incidents on an organization.
  1. 10.3 Level 3: Incident Response
  2. 10.5 Level 5: Change Management
CYBII.17
Research and define what a disaster recovery (DR) plan is and how to develop one. a) Preventative measures, b) Detective measures, c) Corrective measures
  1. 10.3 Level 3: Incident Response
CYBII.18
Explore and identify various assessment methods including but not limited to network penetration and vulnerability testing.
  1. 9.1 Identifying Risks
  2. 9.4 Penetration Testing
CYBII.19
Identify and explain the use of security testing tools.
  1. 9.1 Identifying Risks
CYBII.20
Demonstrate and compare effectiveness of Nessus and Nmap.
CYBII.21.a
Evaluate the patch status on a machine.
CYBII.21.b
Demonstrate knowledge of packet-level analysis in order to install and view packets.
CYBII.21.c
Perform secure data destruction (e.g. Secure Erase, BCWipe).
CYBII.22
Demonstrate proper secure network configuration and administration.
CYBII.22.a
Applying and implementing secure network administration principles.
  1. 6.1 Network Administrator
CYBII.22.b
Demonstrating knowledge of how network services and protocols interact to provide network communications in order to securely implement and use common protocols.
CYBII.22.c
Identify commonly used default network ports.
  1. 6.2 Protocols and Standards
CYBII.22.d
Setting up a Network Address Translation (NAT) device.
CYBII.22.e
Configuring a Virtual Private Network (VPN).
CYBII.22.f
Configuring a remote access policy Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP).
CYBII.22.g
Demonstrating knowledge protocols (e.g., Transmission Control Protocol and Internet Protocol (TCP/IP), Dynamic Host Configuration Protocol (DHCP) and directory services (e.g., Domain Name System (DNS) by setting up common protocols, e.g., Secure Shell (SSH), netstat, Simple Mail Transfer Protocol (SMTP), nslookup, Telent, DNS/Bind, FTP, IIS/Web Pages, DHCP/DNS server).
  1. 6.2 Protocols and Standards
CYBII.22.h
Locating open ports by completing a port scan.
CYBII.22.i
Demonstrating the knowledge and use of network statistics (netstat).