Please enable JavaScript to use CodeHS

Kentucky 6-8 Standards Mapping


Fundamentals of Cybersecurity

25 Standards in this Framework 14 Standards Mapped 56% Mapped to Course

Standard Lessons
M-NI-01 Model how different sets of rules (protocols) are used to transmit different types of data across networks and the Internet.
  1. 10.8 Packets & Protocols
  2. 11.6 Network Communication
  3. 19.13 Viewing Websites
M-NI-02 Model how information is disguised using different methods of encryption to secure it during transmission from one point to another.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.3 Basic Crypto Systems: Caesar Cipher
M-NI-03 Explain how physical and digital security practices and measures proactively address the threat of breaches to personal and private data.
  1. 2.4 Privacy & Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.11 Types of SQLi and Prevention
  6. 11.6 Network Communication
M-DA-01 Store data using multiple encoding methods.
M-DA-02 Collect data using computational tools and transform the data to make it more useful and reliable.
M-DA-03 Refine computational models based on the data they have generated.
M-AP-01 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
M-AP-02 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
M-AP-03 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
M-AP-04 Create flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
M-AP-05 Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
M-AP-06 Create procedures with parameters to organize code and make it easier to reuse.
M-AP-07 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 22.4 If Statements
  3. 22.5 For Loops in JavaScript
  4. 22.9 While Loops
  5. 22.10 Loop and a Half
M-AP-08 Incorporate existing code, media, and libraries into original programs, and give attribution.
M-AP-09 Systematically test and refine programs using a range of test cases.
  1. 4.3 Looping
  2. 4.4 Branching
M-AP-10 Document programs in order to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
M-AP-11 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
M-AP-12 Develop a process creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
M-IC-01 Discuss issues of bias and accessibility in existing technologies.
  1. 10.10 Impact of the Internet
M-IC-02 Compare the positive & negative effects of computing technologies on society.
  1. 10.10 Impact of the Internet
M-IC-03 Collaborate with others using appropriate tools at the local, national, and/or international levels.
  1. 3.1 Project: Public Service Announcement
M-IC-04 Discuss the benefits and consequences of making information either public or private.
  1. 2.1 Digital Footprint and Reputation
  2. 2.6 Creative Credit & Copyright
M-CS-01 Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
M-CS-02 Design projects that combine hardware and software components to collect and exchange data.
M-CS-03 Identify and fix problems with computing devices and their components systematically.
  1. 12.1 Methodology
  2. 12.2 Support Practice