Please enable JavaScript to use CodeHS

Nevada CS II Standards Mapping


Fundamentals of Cybersecurity

21 Standards in this Framework 7 Standards Mapped 33% Mapped to Course

Standard Lessons
CS.1.1.2 Describe how artificial intelligence drives many software and physical systems
CS.1.1.3 Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem
CS.1.1.4 Use and adapt classic algorithms to solve computational problems
CS.1.1.5 Develop classic algorithms in code to solve computational problems
CS.1.2.2 Design and iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions
CS.1.3.3 Implement arrays in code
  1. 4.5 Arrays and Objects
CS.1.3.4 Implement ArrayLists and LinkedLists in code
CS.1.4.3 Construct solutions to problems using student-created components, such as procedures, modules and/or objects
CS.1.4.4 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution
  1. 21.1 Challenge Problems
CS.1.4.5 Demonstrate code reuse by creating programming solutions using libraries and APIs
CS.1.5.6 Plan and develop programs for broad audiences using a software life cycle process
CS.1.5.7 Explain security issues that might lead to compromised computer programs
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
CS.1.5.8 Develop programs for multiple computing platforms
CS.1.5.9 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project
CS.1.5.10 Develop and use a series of test cases to verify that a program performs according to its design specifications
  1. 4.3 Looping
  2. 4.4 Branching
CS.1.5.11 Modify an existing program to add additional functionality and discuss intended and unintended implications, e.g., breaking other functionality
CS.2.2.2 Categorize the roles of operating system software
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
CS.2.3.2 Illustrate ways computing systems implement logic, input, and output through hardware components
  1. 10.2 Notational Systems
  2. 11.2 Peripheral Devices
CS.3.1.3 Demonstrate the ability to store bit representation of real-world phenomena, characters, numbers, and images
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
CS.4.1.5 Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society
CS.4.3.4 Discuss the role of ethics in emerging technologies