Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado Cybersecurity II

33

Standards in this Framework

22

Standards Mapped

66%

Mapped to Course

Standard Lessons
CYBII.1
Analyze current legislation that governs computer related crimes.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
  3. Advanced Cybersecurity
  4. 7.4 Level 4: Data and Licenses
CYBII.2
Research and report on current legal cases involving acts of computer crime.
  1. Advanced Cybersecurity
  2. 5.2 Malware Types and Prevention
CYBII.3
Analyze methods used to collect evidence to support legal cases involving computer related crimes.
  1. Advanced Cybersecurity
  2. 5.2 Malware Types and Prevention
  3. 8.1 Identifying Risks
CYBII.4
Determine various forms of malware.
  1. Advanced Cybersecurity
  2. 5.2 Malware Types and Prevention
CYBII.5
Analyze methods to handle malware. a) Encryption techniques, b) Basic input/output system (BIOS) features, c) Strategies for dealing with malware
  1. Advanced Cybersecurity
  2. 5.2 Malware Types and Prevention
CYBII.6
Differentiate among various types of attacks on systems and networks. a) Virus, b) Worms, c) Trojans, d) Unpatched software, e) Password cracking, f) Advanced persistent threat, g) Reconnaissance/footprinting, h) Infiltration, i) Network breach, j) Network exploitation, k) Attack for effects (e.g., deceive, disrupt, degrade, and destroy), l) DoS/DDoS, session hijacking, m) HTTP spoofing, n) DNS attacks, o) Switch attacks, p) Main-in-the-middle (MITM) attacks, q) Cross site scripting, r) Drive-by-attacks
  1. Advanced Cybersecurity
  2. 5.3 Common Network Attacks
  3. 5.4 Additional Attacks
CYBII.7
Analyze cryptographic tools, procedures for use, and products. a) PKI Certificates, b) PGP, c) Certificate authorities
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.3 Advanced Cryptography
  5. 1.4 Hash Functions
  6. 1.7 Digital Certificates
CYBII.8
Develop a simple public key infrastructure to be used in a small business.
CYBII.9
Demonstrate the create of a self-signed certificate for use on a web server by using command line or online tools.
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.7 Digital Certificates
CYBII.10
Analyze attack methods on wireless networks.
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
  3. 5.1 Network Attacks
CYBII.11
Demonstrate the use of wireless security protocols.
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
CYBII.12
Evaluate the capabilities of WPA, WPA-2, and WEP and the effectiveness of the security protocols and demonstrate how to use them appropriately.
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
CYBII.13
Analyze, define, and demonstrate the use of environmental controls.
  1. Advanced Cybersecurity
  2. 3.2 Environmental Controls
CYBII.14
Work collaboratively to develop simple policies that support the operations of security in an organization.
  1. Advanced Cybersecurity
  2. 7.3 Level 3: Incident Response
CYBII.15
Research and analyze security awareness in organizations. a) Security policy training and procedures, b) Personally identifiable information, c) Information classifications, d) Data labeling, handling, and disposal, e) Compliance with laws, best practices, and standards, f) User habits, g) Threat awareness, h) Use of social networking
  1. Advanced Cybersecurity
  2. 7.2 Level 2: User Training
CYBII.16
Analyze and define the impact of security incidents on an organization.
  1. Advanced Cybersecurity
  2. 7.3 Level 3: Incident Response
  3. 7.5 Level 5: Change Management
CYBII.17
Research and define what a disaster recovery (DR) plan is and how to develop one. a) Preventative measures, b) Detective measures, c) Corrective measures
  1. Advanced Cybersecurity
  2. 7.3 Level 3: Incident Response
CYBII.18
Explore and identify various assessment methods including but not limited to network penetration and vulnerability testing.
  1. Advanced Cybersecurity
  2. 8.1 Identifying Risks
  3. 8.4 Penetration Testing
CYBII.19
Identify and explain the use of security testing tools.
  1. Advanced Cybersecurity
  2. 8.1 Identifying Risks
CYBII.20
Demonstrate and compare effectiveness of Nessus and Nmap.
CYBII.21.a
Evaluate the patch status on a machine.
CYBII.21.b
Demonstrate knowledge of packet-level analysis in order to install and view packets.
CYBII.21.c
Perform secure data destruction (e.g. Secure Erase, BCWipe).
CYBII.22
Demonstrate proper secure network configuration and administration.
CYBII.22.a
Applying and implementing secure network administration principles.
  1. Advanced Cybersecurity
  2. 3.1 Network Administrator
CYBII.22.b
Demonstrating knowledge of how network services and protocols interact to provide network communications in order to securely implement and use common protocols.
CYBII.22.c
Identify commonly used default network ports.
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
CYBII.22.d
Setting up a Network Address Translation (NAT) device.
CYBII.22.e
Configuring a Virtual Private Network (VPN).
CYBII.22.f
Configuring a remote access policy Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP).
CYBII.22.g
Demonstrating knowledge protocols (e.g., Transmission Control Protocol and Internet Protocol (TCP/IP), Dynamic Host Configuration Protocol (DHCP) and directory services (e.g., Domain Name System (DNS) by setting up common protocols, e.g., Secure Shell (SSH), netstat, Simple Mail Transfer Protocol (SMTP), nslookup, Telent, DNS/Bind, FTP, IIS/Web Pages, DHCP/DNS server).
  1. Advanced Cybersecurity
  2. 3.3 Protocols and Standards
CYBII.22.h
Locating open ports by completing a port scan.
CYBII.22.i
Demonstrating the knowledge and use of network statistics (netstat).
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication