Please enable JavaScript to use CodeHS

Standards Mapping

for Florida Conceptual Cybersecurity

110

Standards in this Framework

110

Standards Mapped

100%

Mapped to Course

Standard Lessons
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration.
  1. 12.1 Engineering Design Process
SC.912.CC.1.2
Utilize tools within a project environment to communicate.
  1. 12.1 Engineering Design Process
SC.912.CC.1.3
Present information and data using presentation software.
  1. 7.1 Project: Password Authenticator
  2. 10.10 Mini-Project: Findings
  3. 12.7 Showcase Your Creation!
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
  5. 12.7 Showcase Your Creation!
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
  1. 12.1 Engineering Design Process
  2. 12.4 Ideate
  3. 12.5 Prototype
  4. 12.6 Test
  5. 12.7 Showcase Your Creation!
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts.
  1. 12.7 Showcase Your Creation!
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability.
  1. 4.7 Errors and Debugging
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products.
  1. 12.7 Showcase Your Creation!
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
  1. 9.1 Software Engineer
  2. 9.2 QA Engineer
  3. 9.3 Designer
  4. 9.4 Project Manager
SC.912.CO.1.2
Identify and select the file format based on trade-offs.
  1. 3.7 Compatibility
SC.912.CO.1.3
Select and use the correct file type for specific tasks.
  1. 3.7 Compatibility
SC.912.CO.1.4
Describe the relationship between drivers, hardware and operating systems.
  1. 3.1 Internal Components
  2. 3.3 Peripheral Devices
  3. 3.6 Hardware and Software
SC.912.CO.1.5
Describe the organization of a computer and its principal components.
  1. 3.1 Internal Components
  2. 3.3 Peripheral Devices
  3. 3.4 Storage Options
  4. 3.5 Network Devices
SC.912.CO.1.7
Describe the process of protecting computer hardware from exploitation.
  1. 1.7 Cybersecurity Essentials
  2. 1.9 Application Security
  3. 1.11 System Administration
  4. 1.13 Environmental Controls
  5. 1.14 Cryptography
SC.912.CO.1.8
Describe how the Internet facilitates global communication.
  1. 2.1 What is the Internet?
  2. 2.5 Emerging Technologies and Society
  3. 3.9 Network Options
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
  1. 1.4 Can All Information Be Trusted?
  2. 11.5 Who Builds AI?
SC.912.CO.2.1
Explore the function of Basic Input/Output System (BIOS) and Unified Extensible Firmware Interface (UEFI) in a computer.
  1. 1.12 Internal Threats
SC.912.CO.2.2
Explore motherboard variations.
  1. 3.1 Internal Components
SC.912.CO.2.3
Discuss the central processing unit (CPU).
  1. 3.1 Internal Components
SC.912.CO.2.4
Explore the role of a power supply unit (PSU) in relation to a computer system.
  1. 3.1 Internal Components
SC.912.CO.2.5
Analyze the purpose of various random-access memory (RAM) speeds and storage sizes.
  1. 3.4 Storage Options
SC.912.CO.2.7
Evaluate various forms of input and output (IO).
  1. 3.3 Peripheral Devices
  2. 4.5 User Input
  3. 10.7 Pandas DataFrames
  4. 10.9 Using Functions
SC.912.CO.2.8
Evaluate the basic components of wired computer networks.
  1. 3.2 Sequential, Parallel & Distributed Computing
  2. 3.5 Network Devices
SC.912.CO.2.9
Evaluate the basic components of wireless computer networks.
  1. 3.2 Sequential, Parallel & Distributed Computing
  2. 3.5 Network Devices
SC.912.CO.2.11
Investigate the issues that impact network functionality.
  1. 2.2 IP Addresses
  2. 2.4 How Do Websites Work?
  3. 3.2 Sequential, Parallel & Distributed Computing
  4. 3.5 Network Devices
  5. 3.9 Network Options
  6. 3.14 Network Communication
SC.912.CO.2.12
Describe common network protocols.
  1. 2.3 Routing and Packets
  2. 2.4 How Do Websites Work?
SC.912.CO.2.13
Discern how common network protocols are applied by client-server and peer-to-peer networks.
  1. 3.11 Networking Services
SC.912.CO.2.14
Explore the role of dynamic host control protocol (DHCP) in a networking system.
  1. 3.13 Build and Secure a Network
SC.912.CO.2.15
Analyze the importance of subnetting.
  1. 3.10 Network Design
SC.912.CO.2.16
Describe how devices are identified on a network.
  1. 2.2 IP Addresses
SC.912.CO.2.17
Identify similarities and differences between Internet protocol versions.
  1. 2.2 IP Addresses
  2. 3.10 Network Design
SC.912.CO.2.18
Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks.
  1. 3.9 Network Options
SC.912.CO.3.1
Analyze various operating systems.
  1. 3.6 Hardware and Software
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem.
  1. 12.1 Engineering Design Process
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software.
  1. 3.6 Hardware and Software
SC.912.CO.3.4
Explain how automated software testing can reduce the cost of the testing effort.
  1. 12.6 Test
SC.912.CS.1.1
Identify possible risks to maintaining data confidentiality.
  1. 1.7 Cybersecurity Essentials
  2. 1.9 Application Security
SC.912.CS.1.2
Describe computer security vulnerabilities.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
  3. 1.9 Application Security
SC.912.CS.1.3
Evaluate computer security vulnerabilities.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
  3. 1.9 Application Security
SC.912.CS.2.1
Analyze security and privacy issues that relate to computer networks and network connected devices.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
  3. 1.9 Application Security
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.3 Personal Data and Collection
  3. 1.4 Can All Information Be Trusted?
  4. 1.6 Personal Data Security
SC.912.CS.2.3
Apply network security concepts and strategies to real-world simulations.
  1. 3.14 Network Communication
SC.912.CS.3.1
Investigate ransomware attacks.
  1. 1.7 Cybersecurity Essentials
  2. 1.8 Common Cyber Attacks and Prevention
SC.912.CS.3.2
Explore access control rules.
  1. 1.11 System Administration
SC.912.CS.3.3
Analyze the limitations of a program’s temporary storage and the security vulnerabilities.
  1. 1.10 Dev Tools Capture the Flag
SC.912.CS.3.4
Trace the social engineering attack cycle.
  1. 1.8 Common Cyber Attacks and Prevention
SC.912.ET.1.1
Describe the emerging features of mobile devices, smart devices and vehicles.
  1. 1.7 Cybersecurity Essentials
SC.912.ET.1.2
Describe the physical and cognitive challenges faced by users when learning to use computer interfaces.
  1. 9.3 Designer
  2. 12.2 Research and Analyze
  3. 12.6 Test
SC.912.ET.1.4
Examine device-to-device interactions that exclude human input.
  1. 1.7 Cybersecurity Essentials
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
  1. 1.2 Social Media Impacts
  2. 2.5 Emerging Technologies and Society
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online.
  1. 1.2 Social Media Impacts
  2. 1.3 Personal Data and Collection
  3. 1.6 Personal Data Security
SC.912.HS.1.2
Evaluate the consequences of cyberbullying.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.5 Cyber Ethics and Laws
SC.912.HS.1.3
Determine the consequences of inaction when witnessing unsafe Internet practices.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.5 Cyber Ethics and Laws
  3. 1.8 Common Cyber Attacks and Prevention
SC.912.HS.1.4
Examine the positive outcomes when someone reports suspicious behavior on the Internet.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.5 Cyber Ethics and Laws
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet.
  1. 1.3 Personal Data and Collection
  2. 1.6 Personal Data Security
  3. 1.8 Common Cyber Attacks and Prevention
SC.912.HS.1.6
Describe the impact of permissible privacy and security.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.6 Personal Data Security
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.1
Discuss the permanency of data on the Internet.
  1. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Social Media Impacts
SC.912.PE.1.1
Write code segments.
  1. 4.5 User Input
  2. 5.1 Booleans
  3. 5.2 If Statements
  4. 5.4 Logical Operators
  5. 8.1 Functions
  6. 8.2 Functions and Parameters
  7. 8.4 Functions and Return Values
  8. 10.9 Using Functions
SC.912.PE.1.2
Create iterative and non-iterative structures within a program.
  1. 5.2 If Statements
  2. 5.4 Logical Operators
  3. 6.1 While Loops
  4. 6.2 For Loops
  5. 6.4 Nested Control Structures
SC.912.PE.1.3
Create selection structures within a program.
  1. 5.2 If Statements
  2. 5.4 Logical Operators
SC.912.PE.1.4
Write a void function that does not return a value.
  1. 8.1 Functions
  2. 8.2 Functions and Parameters
  3. 8.3 Namespaces in Functions
  4. 8.4 Functions and Return Values
SC.912.PE.1.5
Write a non-void function that will return a value.
  1. 8.1 Functions
  2. 8.2 Functions and Parameters
  3. 8.3 Namespaces in Functions
  4. 8.4 Functions and Return Values
SC.912.PE.1.10
Write programs that validate user input.
  1. 7.1 Project: Password Authenticator
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used.
  1. 8.1 Functions
  2. 10.3 Exploring Data Using Python
  3. 10.7 Pandas DataFrames
  4. 10.8 Selecting Columns
SC.912.PE.1.16
Explain the distinction between a programming language’s standard library and the Application Programming Interface (API).
  1. 10.4 Modules, Packages & Libraries
SC.912.PE.1.23
Compile, run, test and debug a digital artifact.
  1. 4.7 Errors and Debugging
  2. 7.1 Project: Password Authenticator
SC.912.PE.2.3
Compare techniques for analyzing massive data collections.
  1. 10.3 Exploring Data Using Python
  2. 10.4 Modules, Packages & Libraries
  3. 10.7 Pandas DataFrames
SC.912.PE.3.5
Differentiate automated testing platforms and their uses.
  1. 12.6 Test
SC.912.PE.3.18
Explain the principles of cryptography.
  1. 1.14 Cryptography
  2. 1.15 Asymmetric Encryption
SC.912.PE.3.19
Determine which encryption method is suitable for an intended task.
  1. 1.14 Cryptography
  2. 1.15 Asymmetric Encryption
SC.912.TI.1.1
Analyze historical trends in hardware and software.
  1. 1.14 Cryptography
  2. 3.6 Hardware and Software
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society.
  1. 2.5 Emerging Technologies and Society
SC.912.TI.1.10
Analyze technology-related career paths.
  1. 9.1 Software Engineer
  2. 9.2 QA Engineer
  3. 9.3 Designer
  4. 9.4 Project Manager
SC.912.TI.1.12
Examine the history of networking devices.
  1. 3.5 Network Devices
SC.912.TI.2.1
Research how social media and technology can be used to distort, exaggerate or misrepresent information.
  1. 1.2 Social Media Impacts
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points.
  1. 3.5 Network Devices
SC.912.TI.2.4
Explore the legal ramifications of technology use.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
  1. 3.8 Software Licenses
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property.
  1. 3.8 Software Licenses
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.11
Utilize citation tools when using digital information.
  1. 1.5 Cyber Ethics and Laws
SC.912.TI.2.12
Describe legal regulations that govern Internet usage and interaction.
  1. 1.5 Cyber Ethics and Laws
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
  1. 10.2 Gathering Data
  2. 12.1 Engineering Design Process
  3. 12.4 Ideate
  4. 12.5 Prototype
  5. 12.6 Test
  6. 12.7 Showcase Your Creation!
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
  1. 4.2 How to Think Like a Programmer
  2. 12.3 Define
SC.K12.CTR.3.1
Complete tasks with digital fluency.
  1. 4.5 User Input
  2. 10.2 Gathering Data
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
SC.K12.CTR.4.1
Express solutions as computational steps.
  1. 10.2 Gathering Data
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
  1. 7.1 Project: Password Authenticator
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
  1. 12.2 Research and Analyze
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
  1. 7.1 Project: Password Authenticator
  2. 10.2 Gathering Data
  3. 12.1 Engineering Design Process
  4. 12.2 Research and Analyze
  5. 12.3 Define
  6. 12.4 Ideate
  7. 12.5 Prototype
  8. 12.6 Test
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
  1. 5.5 Floating Point Numbers and Rounding
  2. 7.1 Project: Password Authenticator
  3. 10.2 Gathering Data
  4. 12.1 Engineering Design Process
  5. 12.2 Research and Analyze
  6. 12.3 Define
  7. 12.4 Ideate
  8. 12.5 Prototype
  9. 12.6 Test
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
  1. 10.1 What is Data Science?
  2. 10.7 Pandas DataFrames
  3. 10.10 Mini-Project: Findings
  4. 12.2 Research and Analyze
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
  1. 4.5 User Input
  2. 4.6 Mathematical Operators
  3. 10.5 Series and Central Tendency
  4. 10.6 Measures of Spread
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
  1. 4.3 Printing in Python
  2. 4.4 Variables and Types
  3. 4.7 Errors and Debugging
  4. 4.8 String Operators
  5. 5.1 Booleans
  6. 5.2 If Statements
  7. 12.1 Engineering Design Process
  8. 12.2 Research and Analyze
  9. 12.3 Define
  10. 12.4 Ideate
  11. 12.5 Prototype
  12. 12.6 Test
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
  1. 10.5 Series and Central Tendency
  2. 10.6 Measures of Spread
  3. 10.7 Pandas DataFrames
  4. 12.2 Research and Analyze
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
  1. 5.5 Floating Point Numbers and Rounding
  2. 7.1 Project: Password Authenticator
  3. 10.5 Series and Central Tendency
  4. 10.10 Mini-Project: Findings
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. 4.6 Mathematical Operators
  2. 7.1 Project: Password Authenticator
  3. 10.5 Series and Central Tendency
  4. 10.6 Measures of Spread
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
  1. 10.2 Gathering Data
  2. 10.9 Using Functions
  3. 10.10 Mini-Project: Findings
  4. 12.2 Research and Analyze
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
  1. 9.2 QA Engineer
  2. 11.3 Large Language Models
ELA.K12.EE.3.1
Make inferences to support comprehension.
  1. 10.1 What is Data Science?
  2. 10.2 Gathering Data
  3. 10.9 Using Functions
  4. 10.10 Mini-Project: Findings
  5. 12.2 Research and Analyze
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
  1. 9.1 Software Engineer
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
  1. 7.1 Project: Password Authenticator
  2. 10.10 Mini-Project: Findings
  3. 12.1 Engineering Design Process
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
  1. 7.1 Project: Password Authenticator
  2. 12.1 Engineering Design Process
  3. 12.2 Research and Analyze
  4. 12.3 Define
  5. 12.4 Ideate
  6. 12.5 Prototype
  7. 12.6 Test
ELD.K12.ELL.MA.1
English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.
  1. 4.3 Printing in Python
  2. 4.4 Variables and Types
  3. 4.5 User Input
  4. 4.6 Mathematical Operators
  5. 4.7 Errors and Debugging
  6. 4.8 String Operators
  7. 5.1 Booleans
  8. 5.2 If Statements
  9. 12.1 Engineering Design Process
  10. 12.2 Research and Analyze
  11. 12.3 Define
  12. 12.4 Ideate
  13. 12.5 Prototype
  14. 12.6 Test