Please enable JavaScript to use CodeHS

Standards Mapping

for Florida Conceptual Cybersecurity

110

Standards in this Framework

53

Standards Mapped

48%

Mapped to Course

Standard Lessons
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration.
SC.912.CC.1.2
Utilize tools within a project environment to communicate.
SC.912.CC.1.3
Present information and data using presentation software.
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts.
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability.
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products.
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
SC.912.CO.1.2
Identify and select the file format based on trade-offs.
SC.912.CO.1.3
Select and use the correct file type for specific tasks.
SC.912.CO.1.4
Describe the relationship between drivers, hardware and operating systems.
  1. 4.1 Operating Systems
  2. 6.1 Internal Components
SC.912.CO.1.5
Describe the organization of a computer and its principal components.
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
  3. 6.4 Storage Options
  4. 6.5 Network Devices
SC.912.CO.1.7
Describe the process of protecting computer hardware from exploitation.
  1. 1.6 Cybersecurity Essentials
SC.912.CO.1.8
Describe how the Internet facilitates global communication.
  1. 5.9 Impact of the Internet
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
  1. 1.3 Can All Information Be Trusted?
SC.912.CO.2.1
Explore the function of Basic Input/Output System (BIOS) and Unified Extensible Firmware Interface (UEFI) in a computer.
SC.912.CO.2.2
Explore motherboard variations.
SC.912.CO.2.3
Discuss the central processing unit (CPU).
  1. 6.1 Internal Components
SC.912.CO.2.4
Explore the role of a power supply unit (PSU) in relation to a computer system.
SC.912.CO.2.5
Analyze the purpose of various random-access memory (RAM) speeds and storage sizes.
  1. 6.4 Storage Options
SC.912.CO.2.7
Evaluate various forms of input and output (IO).
  1. 6.3 Peripheral Devices
SC.912.CO.2.8
Evaluate the basic components of wired computer networks.
  1. 6.5 Network Devices
SC.912.CO.2.9
Evaluate the basic components of wireless computer networks.
  1. 6.5 Network Devices
SC.912.CO.2.11
Investigate the issues that impact network functionality.
  1. 6.7 Network Options
  2. 6.10 Network Communication
SC.912.CO.2.12
Describe common network protocols.
  1. 5.6 Routing and Packets
  2. 5.7 How Do Websites Work?
  3. 5.8 OSI Model
SC.912.CO.2.13
Discern how common network protocols are applied by client-server and peer-to-peer networks.
SC.912.CO.2.14
Explore the role of dynamic host control protocol (DHCP) in a networking system.
SC.912.CO.2.15
Analyze the importance of subnetting.
SC.912.CO.2.16
Describe how devices are identified on a network.
  1. 5.5 IP Addresses
SC.912.CO.2.17
Identify similarities and differences between Internet protocol versions.
  1. 5.8 OSI Model
SC.912.CO.2.18
Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks.
  1. 6.7 Network Options
SC.912.CO.3.1
Analyze various operating systems.
  1. 4.1 Operating Systems
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem.
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software.
  1. 4.1 Operating Systems
SC.912.CO.3.4
Explain how automated software testing can reduce the cost of the testing effort.
SC.912.CS.1.1
Identify possible risks to maintaining data confidentiality.
  1. 1.6 Cybersecurity Essentials
  2. 4.8 Application Security
SC.912.CS.1.2
Describe computer security vulnerabilities.
  1. 1.6 Cybersecurity Essentials
  2. 4.8 Application Security
  3. 8.6 Checking for Vulnerabilities
SC.912.CS.1.3
Evaluate computer security vulnerabilities.
  1. 1.6 Cybersecurity Essentials
  2. 4.8 Application Security
  3. 8.6 Checking for Vulnerabilities
SC.912.CS.2.1
Analyze security and privacy issues that relate to computer networks and network connected devices.
  1. 1.6 Cybersecurity Essentials
  2. 4.8 Application Security
  3. 8.6 Checking for Vulnerabilities
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
  1. 1.5 Personal Data Security
SC.912.CS.2.3
Apply network security concepts and strategies to real-world simulations.
SC.912.CS.3.1
Investigate ransomware attacks.
  1. 1.6 Cybersecurity Essentials
SC.912.CS.3.2
Explore access control rules.
  1. 4.10 System Administration
SC.912.CS.3.3
Analyze the limitations of a program’s temporary storage and the security vulnerabilities.
  1. 8.4 Dev Tools Capture the Flag
SC.912.CS.3.4
Trace the social engineering attack cycle.
SC.912.ET.1.1
Describe the emerging features of mobile devices, smart devices and vehicles.
  1. 1.6 Cybersecurity Essentials
SC.912.ET.1.2
Describe the physical and cognitive challenges faced by users when learning to use computer interfaces.
SC.912.ET.1.4
Examine device-to-device interactions that exclude human input.
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
  1. 5.9 Impact of the Internet
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
SC.912.HS.1.2
Evaluate the consequences of cyberbullying.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.1.3
Determine the consequences of inaction when witnessing unsafe Internet practices.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.4 Cyber Ethics and Laws
  3. 1.7 Common Cyber Attacks and Prevention
SC.912.HS.1.4
Examine the positive outcomes when someone reports suspicious behavior on the Internet.
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet.
  1. 1.5 Personal Data Security
SC.912.HS.1.6
Describe the impact of permissible privacy and security.
  1. 1.5 Personal Data Security
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.1
Discuss the permanency of data on the Internet.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures.
  1. 1.1 Digital Footprint and Responsibility
SC.912.PE.1.1
Write code segments.
SC.912.PE.1.2
Create iterative and non-iterative structures within a program.
SC.912.PE.1.3
Create selection structures within a program.
SC.912.PE.1.4
Write a void function that does not return a value.
SC.912.PE.1.5
Write a non-void function that will return a value.
SC.912.PE.1.10
Write programs that validate user input.
  1. 8.3 Security in Coding
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used.
  1. 4.11 Command Line Interface
  2. 6.10 Network Communication
SC.912.PE.1.16
Explain the distinction between a programming language’s standard library and the Application Programming Interface (API).
SC.912.PE.1.23
Compile, run, test and debug a digital artifact.
SC.912.PE.2.3
Compare techniques for analyzing massive data collections.
SC.912.PE.3.5
Differentiate automated testing platforms and their uses.
SC.912.PE.3.18
Explain the principles of cryptography.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
SC.912.PE.3.19
Determine which encryption method is suitable for an intended task.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
SC.912.TI.1.1
Analyze historical trends in hardware and software.
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning.
  1. 16.2 Alternative Learning Opportunities
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society.
  1. 5.9 Impact of the Internet
SC.912.TI.1.10
Analyze technology-related career paths.
  1. 7.1 Communication is Key!
  2. 10.1 After Fundamentals of Cybersecurity
SC.912.TI.1.12
Examine the history of networking devices.
  1. 6.5 Network Devices
SC.912.TI.2.1
Research how social media and technology can be used to distort, exaggerate or misrepresent information.
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
  1. 1.4 Cyber Ethics and Laws
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points.
SC.912.TI.2.4
Explore the legal ramifications of technology use.
  1. 1.4 Cyber Ethics and Laws
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices.
  1. 1.4 Cyber Ethics and Laws
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects.
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
  1. 4.7 Software Licenses
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own.
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property.
  1. 4.7 Software Licenses
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information.
  1. 1.4 Cyber Ethics and Laws
SC.912.TI.2.11
Utilize citation tools when using digital information.
  1. 1.4 Cyber Ethics and Laws
SC.912.TI.2.12
Describe legal regulations that govern Internet usage and interaction.
  1. 1.4 Cyber Ethics and Laws
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
SC.K12.CTR.3.1
Complete tasks with digital fluency.
SC.K12.CTR.4.1
Express solutions as computational steps.
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
  1. 5.2 Bits, Text, and Numbers
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. 5.2 Bits, Text, and Numbers
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
ELA.K12.EE.3.1
Make inferences to support comprehension.
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
ELD.K12.ELL.MA.1
English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.