Please enable JavaScript to use CodeHS

Mississippi 11-12 Standards Mapping


Fundamentals of Cybersecurity

28 Standards in this Framework 12 Standards Mapped 42% Mapped to Course

Standard Lessons
CS.3B.1 Categorize the roles of operating system software
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
CS.3B.2 Illustrate ways computing systems implement logic, input, and output through hardware components.
  1. 10.2 Notational Systems
  2. 11.1 Internal Components
  3. 11.2 Peripheral Devices
NI.3B.1 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
  3. 11.5 Network Options
NI.3B.2 Compare ways software developers protect devices and information from unauthorized access
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 8.9 Common Security Problems
  4. 8.11 Types of SQLi and Prevention
DA.3B.1 Use data analysis tools and techniques to identify patterns in data representing complex systems.
DA.3B.2 Select data collection tools and techniques to generate data sets that support a claim or communicate information.
DA.3B.3 Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
AP.3B.1 Describe how artificial intelligence drives many software and physical systems.
AP.3B.2 Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
  1. 23.1 Control Structures Challenges
AP.3B.3 Use and adapt classic algorithms to solve computational problems.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
AP.3B.4 Evaluate algorithms in terms of their efficiency, correctness, and clarity.
AP.3B.5 Compare and contrast fundamental data structures and their uses.
  1. 4.5 Arrays and Objects
AP.3B.6 Illustrate the flow of execution of a recursive algorithm.
AP.3B.7 Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
AP.3B.8 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
AP.3B.9 Demonstrate code reuse by creating programming solutions using libraries and APIs.
AP.3B.10 Plan and develop programs for broad audiences using a software life cycle process.
AP.3B.11 Explain security issues that might lead to compromised computer programs
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 8.9 Common Security Problems
  4. 8.11 Types of SQLi and Prevention
AP.3B.12 Develop programs for multiple computing platforms
AP.3B.13 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project
AP.3B.14 Develop and use a series of test cases to verify that a program performs according to its design specifications.
AP.3B.15 Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
AP.3B.16 Evaluate key qualities of a program through a process such as a code review
AP.3B.17 Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 4.1 Programming Concepts
IC.3B.1 Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
IC.3B.2 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
IC.3B.3 Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 10.10 Impact of the Internet
IC.3B.4 Debate laws and regulations that impact the development and use of software
  1. 7.5 Software Licenses