Please enable JavaScript to use CodeHS

Nevada 6-8 Standards Mapping

to

Fundamentals of Cybersecurity

24 Standards in this Framework 19 Standards Mapped 79% Mapped to Course


Standard Lessons
6-8.AP.A.1 Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
  3. 21.1 Challenge Problems
6-8.AP.V.1 Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
  6. 22.5 For Loops in JavaScript
  7. 22.6 General For Loops
  8. 22.7 For Loop Practice
  9. 22.9 While Loops
  10. 22.10 Loop and a Half
6-8.AP.C.1 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
6-8.AP.M.1 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 21.1 Challenge Problems
6-8.AP.M.2 Create procedures with parameters to organize code and make it easier to reuse.
6-8.AP.PD.1 Design meaningful solutions for others, incorporating data from collaborative team members and the end user, to meet the end user’s needs.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
6-8.AP.PD.2 Incorporate existing code, media, and libraries into original programs, and give attribution.
  1. 2.6 Creative Credit & Copyright
  2. 6.1 Project: Classic Cipher Newscast
6-8.AP.PD.3 Systematically test and refine programs using a range of test cases.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.1 Booleans
  5. 22.2 Logical Operators
  6. 22.3 Comparison Operators
  7. 22.4 If Statements
  8. 22.7 For Loop Practice
  9. 22.10 Loop and a Half
6-8.AP.PD.4 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
6-8.AP.PD.5 Document programs (throughout the design, development, troubleshooting, and user experience phases) in order to make them easier to follow, test, and debug by others.
  1. 4.6 Organizational Techniques
  2. 21.1 Challenge Problems
6-8.CS.D.1 Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices, noting that advantages may have disadvantages and unintended consequences.
6-8.CS.HS.1 Design and evaluate projects that combine hardware and software components to collect and exchange data.
6-8.CS.T.1 Systematically identify and fix problems with computing devices and their components.
  1. 12.1 Methodology
  2. 12.2 Support Practice
6-8.DA.S.1 Model encoding schema used by software tools to access data, stored as bits, into forms more easily understood by people (e.g., encoding schema include binary and ASCII).
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6-8.DA.CVT.1 Collect data using computational tools and transform the data to make it more meaningful and useful.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
6-8.DA.IM.1 Refine computational models based on the reliability and validity of the data they generate.
6-8.IC.C.1 Compare tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  1. 2.1 Digital Footprint and Reputation
  2. 10.10 Impact of the Internet
6-8.IC.C.2 Discuss and evaluate issues of bias and accessibility in the design of existing technologies.
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
6-8.IC.SI.1 Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
  1. 6.1 Project: Classic Cipher Newscast
6-8.IC.SLE.1 Identify risks associated with sharing information digitally (e.g., phishing, identity theft, hacking).
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention
6-8.IC.SLE.2 Evaluate how legal and ethical issues shape computing practices
  1. 2.6 Creative Credit & Copyright
  2. 2.7 Hacking Ethics
  3. 7.5 Software Licenses
6-8.NI.NCO.1 Compare and contrast modeled protocols used in transmitting data across networks and the Internet.
  1. 10.8 Packets & Protocols
  2. 10.9 Viewing a Webpage
  3. 11.6 Network Communication
6-8.NI.C.1 Explain how physical and digital security measures protect electronic information.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.11 Types of SQLi and Prevention
  7. 11.6 Network Communication
  8. 11.7 Network Management
6-8.NI.C.2 Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
  3. 5.3 Basic Crypto Systems: Caesar Cipher
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
  6. 6.1 Project: Classic Cipher Newscast