Please enable JavaScript to use CodeHS

Missouri 11-12 Standards Mapping


Fundamentals of Cybersecurity

29 Standards in this Framework 15 Standards Mapped 51% Mapped to Course

Standard Lessons
CS.D.01 Illustrate ways computing systems implement logic through hardware components.
  1. 10.2 Notational Systems
  2. 11.1 Internal Components
  3. 11.2 Peripheral Devices
CS.HS.01 Describe and categorize roles of an operating system.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
CS.T.01 Describe how hardware components facilitate logic, input, output and storage in computing systems.
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
NI.NCO.01 Analyze the relationship between routers, switches, servers, topology and addressing.
  1. 10.4 Internet Hardware and Sending Information
  2. 10.7 Routing
  3. 11.3 Network Devices
NI.NCO.02 Describe key protocols and underlying processes of internet-based services (e.g., http/https and Simple Mail Transfer Protocol (SMTP)/internet Message Access Protocol (IMAP), routing protocols).
  1. 10.8 Packets & Protocols
  2. 11.6 Network Communication
NI.NCO.03 Explain how the characteristics of the internet influence the systems developed on it.
  1. 10.7 Routing
  2. 10.9 Viewing a Webpage
NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 8.9 Common Security Problems
NI.C.02 Analyze cryptographic techniques to model the secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
DA.S.01 Compare different bit representations of data types, such as characters, Booleans and numbers while recognizing when using each data type is appropriate.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
DA.CVT.01 Generate data sets that use a variety of data collection tools and analysis techniques to support a claim and/or communicate information.
DA.IM.01 Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
AP.A.01 Critically examine and trace classic algorithms (e.g., selection sort, insertion sort, binary search, linear search).
AP.A.02 Implement an artificial intelligence algorithm to interact with a human or solve a problem.
AP.A.03 Describe how artificial intelligence algorithms drive many software and physical systems (e.g., autonomous robots, computer vision, pattern recognition, text analysis).
AP.A.04 Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency and clarity.
AP.V.01 Create problem solutions that utilize data structures (e.g., lists, arrays, ArrayLists).
  1. 4.5 Arrays and Objects
AP.C.01 Trace the execution of iteration (e.g., loops, recursion), illustrating output and changes in values of named variables.
  1. 22.5 For Loops in JavaScript
  2. 22.9 While Loops
  3. 22.10 Loop and a Half
AP.M.01 Construct solutions to problems using student-created components (e.g., procedures, modules, objects).
AP.M.02 Create programming solutions by reusing existing code (e.g., libraries, Application Programming Interface (APIs), code repositories).
AP.M.03 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
AP.PD.01 Use integrated development environments (IDEs) and collaborative tools and practices (code documentation) in a software project.
AP.PD.02 Plan and develop programs using a development process (e.g., waterfall, iterative, spiral, rapid application development, agile).
AP.PD.03 Identify and compare features of various programming languages that make them useful for solving problems and developing systems.
  1. 4.1 Programming Concepts
AP.PD.04 Design software using version control.
AP.PD.05 Develop and use a series of test cases to verify that a program performs according to its design specifications.
AP.PD.06 Explain security issues that might lead to compromised computer programs.
  1. 1.2 What is Cybersecurity?
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
AP.PD.07 Evaluate key qualities of a program through a process such as a code review.
IC.C.01 Evaluate the impact of equity, access and influence on the distribution of computing resources in a global society.
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
IC.SLE.01 Debate laws and regulations that impact the development and use of software.
  1. 7.5 Software Licenses