Please enable JavaScript to use CodeHS

Kentucky 9-12 Standards Mapping


Fundamentals of Cybersecurity

51 Standards in this Framework 25 Standards Mapped 49% Mapped to Course

Standard Lessons
H-NI-01 Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, end devices, topology, and addressing.
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 11.3 Network Devices
  4. 11.6 Network Communication
H-NI-02 Give examples to illustrate how sensitive data can be affected by viruses, malware and other attacks.
  1. 1.3 Impact of Cybersecurity
  2. 7.6 Application Security
  3. 8.9 Common Security Problems
  4. 8.11 Types of SQLi and Prevention
H-NI-03 Recommend security measures to address various scenarios based on factors such as usability, efficiency, feasibility, and ethical impacts.
  1. 7.6 Application Security
H-NI-04 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology). *
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
  3. 11.6 Network Communication
  4. 11.7 Network Management
H-NI-05 Compare ways software developers protect devices and information from unauthorized access. *
  1. 8.9 Common Security Problems
  2. 8.11 Types of SQLi and Prevention
H-DA-01 Evaluate the tradeoffs in how data elements are organized and where data is stored.*
  1. 4.5 Arrays and Objects
  2. 8.4 Databases
H-DA-02 Collect data using appropriate data collection tools and techniques to support a claim or to communicate information.
  1. 8.3 The Value of Data
H-DA-03 Understand and design database structures to optimize search and retrieval.*
  1. 8.4 Databases
  2. 8.6 What is SQL?
  3. 8.7 Basic Querying in SQL
  4. 8.8 Filtering Queries in SQL
  5. 18.1 More Filtering Practice
  6. 18.2 Ordering Results
H-DA-04 Explain the privacy concerns related to the collection and generation of data.
  1. 2.4 Privacy & Security
  2. 8.9 Common Security Problems
H-DA-05 Use data analysis tools (e.g. formulas and other software data / statistical tools) to process and transform the data to make it more useful and reliable.
H-DA-06 Use data analysis tools and techniques to identify patterns and analyze data represented in complex systems.
  1. 8.3 The Value of Data
H-DA-07 Create computational models that represent the relationships among different elements of data.
H-DA-08 Create interactive data visualizations using software tools to help others better understand real-world phenomena.
H-DA-09 Evaluate the ability of models and simulations to test and support the refinement of hypotheses.*
H-AP-01 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries.
H-AP-02 Use a development process in creating a computational artifact that leads to a minimum viable product followed by reflection, analysis, and iteration.
H-AP-03 Use functions, data structures or objects to simplify solutions, generalizing computational problems instead of repeated use of simple variables.
  1. 4.2 Programming with Karel
  2. 4.5 Arrays and Objects
H-AP-04 Design and iteratively develop event-driven computational artifacts for practical intent, personal expression, or to address a societal issue.
  1. 3.1 Project: Public Service Announcement
H-AP-05 Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
H-AP-06 Justify the selection of specific control structures when tradeoffs involve implementation, readability, and program performance and explain the benefits and drawbacks of choices made.
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
  3. 22.9 While Loops
  4. 22.10 Loop and a Half
H-AP-07 Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
H-AP-08 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
H-AP-09 Evaluate and refine computational artifacts to make them more usable and accessible using systematic testing and debugging.
H-AP-10 Systematically design and develop programs for broad audiences by incorporating feedback from users.
H-AP-11 Design and develop computational artifacts working in team roles using collaborative tools.*
H-AP-12 Describe how artificial intelligence drives many software and physical systems.*
H-AP-13 Use and adapt classic algorithms to solve computational problems.*
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
H-AP-14 Evaluate algorithms in terms of their efficiency, correctness, and clarity.*
H-AP-15 Compare and contrast fundamental data structures and their uses.*
  1. 4.5 Arrays and Objects
H-AP-16 Illustrate the flow of execution of a recursive algorithm.*
H-AP-17 Construct solutions to problems using student-created components, such as procedures, modules and/or objects.*
H-AP-18 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.*
H-AP-19 Select and employ an appropriate component or library to facilitate programming solutions.*
H-AP-20 Develop programs for multiple computing platforms.*
H-AP-21 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.*
H-AP-22 Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., introducing errors).*
H-AP-23 Evaluate key qualities (including correctness, usability, readability, and efficiency) of a program.*
H-AP-24 Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.*
  1. 4.1 Programming Concepts
H-IC-01 Reduce bias and equity deficits through the design of accessible computational artifacts.
H-IC-02 Evaluate and assess how computing impacts personal, ethical, social, economic, and cultural practices.
  1. 10.10 Impact of the Internet
H-IC-03 Research how computational innovations that have revolutionized aspects of our culture might have evolved from a need to solve a problem.
  1. 10.10 Impact of the Internet
H-IC-04 Explain the beneficial and harmful effects that laws governing data (intellectual property, privacy etc.) can have on innovation.
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
H-IC-05 Evaluate and design computational artifacts to maximize their benefit to society.*
  1. 3.1 Project: Public Service Announcement
H-IC-06 Evaluate the impact of the digital divide (i.e. inequity of computing access, education and influence) on the development of local communities and society.
  1. 10.10 Impact of the Internet
H-IC-07 Demonstrate ways computational design (i.e. algorithms, abstractions and analysis) can apply to problems across disciplines.*
H-IC-08 Debate laws and regulations that impact the development and use of software and the protection of privacy.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
H-CS-01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
H-CS-02 Compare levels of abstraction and interactions between application software, system software and hardware layers.
H-CS-03 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
H-CS-04 Categorize the roles of operating system software.
  1. 7.1 Operating Systems
H-CS-05 Illustrate ways computing systems implement logic, input, and output through hardware components.*
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices