Please enable JavaScript to use CodeHS

Nevada CS III Standards Mapping

to

Fundamentals of Cybersecurity

19 Standards in this Framework 8 Standards Mapped 42% Mapped to Course


Standard Lessons
CS.1.1.5 Develop classic algorithms in code to solve computational problems
CS.1.1.6 Evaluate algorithms in terms of their efficiency, correctness, and clarity
  1. 21.1 Challenge Problems
  2. 22.6 General For Loops
  3. 22.10 Loop and a Half
  4. 23.1 Control Structures Challenges
CS.1.2.3 Illustrate the flow of execution of a recursive algorithm
CS.1.2.4 Implement conditional controls in code
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.4 If Statements
  5. 22.5 For Loops in JavaScript
  6. 22.9 While Loops
  7. 22.10 Loop and a Half
  8. 23.1 Control Structures Challenges
CS.1.2.5 Implement recursive algorithms in code
CS.1.3.3 Implement arrays in code
  1. 4.5 Arrays and Objects
CS.1.3.4 Implement ArrayLists and LinkedLists in code
CS.1.4.5 Demonstrate code reuse by creating programming solutions using libraries and APIs
CS.1.5.12 Evaluate key qualities of a program through a process such as a code review
CS.1.5.13 Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems
  1. 4.1 Programming Concepts
CS.3.2.3 Select data collection tools and techniques to generate data sets that support a claim or communicate information
CS.3.3.2 Evaluate the ability of models and simulations to test and support the refinement of hypotheses
CS.4.1.6 Create computational artifacts to maximize their beneficial effects and minimize harmful effects on society
CS.4.1.7 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
CS.4.1.8 Predict how computational innovations that have revolutionized aspects of our culture might evolve
CS.4.2.2 Use tools and methods for collaboration to increase the productivity of a team
CS.4.3.5 Debate laws and regulations that impact the development and use of software
  1. 7.5 Software Licenses
CS.5.1.2 Describe the issues that impact network functionality, e.g., bandwidth, load, delay, topology
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
CS.5.2.5 Compare ways software developers protect devices and information from unauthorized access
  1. 7.6 Application Security
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention