Please enable JavaScript to use CodeHS

Standards Mapping

for Nevada Cybersecurity 1

109

Standards in this Framework

60

Standards Mapped

55%

Mapped to Course

Standard Lessons
1.1.1
Demonstrate the proper use of safety devices
  1. 3.2 Environmental Controls
  2. 17.2 Lab: Computer Disassembly
1.1.2
Research the environmental impact of production
  1. 3.2 Environmental Controls
1.1.3
Research local, state, and federal regulations related to material handling
  1. 3.2 Environmental Controls
1.1.4
Demonstrate secure disposal of technology materials
  1. 3.2 Environmental Controls
1.1.5
Describe Material Safety Data Sheets (MSDS)
  1. 3.2 Environmental Controls
1.1.6
Explain the relationship between organization and safety
  1. 3.2 Environmental Controls
  2. 17.2 Lab: Computer Disassembly
1.1.7
Demonstrate an organized work environment
  1. 3.2 Environmental Controls
  2. 17.2 Lab: Computer Disassembly
1.1.8
Demonstrate electrical safety (e.g., grounding, ESD (static), etc.)
  1. 3.2 Environmental Controls
  2. 17.2 Lab: Computer Disassembly
1.1.9
Apply installation safety (e.g., lifting, overhead movements, etc.)
  1. 17.2 Lab: Computer Disassembly
1.1.10
Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems)
1.2.1
Explain common tools used in computer repair
  1. 17.2 Lab: Computer Disassembly
1.2.2
Demonstrate the use of common networking and repair tools
  1. 17.2 Lab: Computer Disassembly
1.2.3
Select the proper tool for diagnostic and troubleshooting procedures
1.2.4
Compare and contrast fire suppression systems in IT environments
1.2.5
Describe the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems for IT systems
  1. 3.2 Environmental Controls
2.1.1
Analyze legal issues in technology
  1. 7.4 Level 4: Data and Licenses
2.1.2
Evaluate intellectual property laws
  1. 7.4 Level 4: Data and Licenses
2.1.3
Explain differences between licensing, copyright, and infringement
  1. 7.4 Level 4: Data and Licenses
2.1.4
Explain the differences between restricted content, prohibited or illegal content
2.1.5
Examine state, federal, and international regulations related to technology (e.g.; legal holds, disposal methods, data retention, discoverability, data protection, etc.)
  1. 7.4 Level 4: Data and Licenses
2.2.1
Analyze acceptable use policies
  1. 7.4 Level 4: Data and Licenses
2.2.2
Explain the difference between technology policies, privacy standards, and best practices
  1. 7.4 Level 4: Data and Licenses
2.2.3
Explain data and privacy encryption issues related to using technology
2.2.4
Evaluate appropriate consent policies to monitoring various stakeholders
  1. 7.4 Level 4: Data and Licenses
2.2.5
Explain appropriate data classification
  1. 7.4 Level 4: Data and Licenses
2.3.1
Communicate with customers to ensure understanding of customer requirements, scope, and concerns
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
2.3.2
Utilize appropriate documentation systems
  1. 4.2 Building a Knowledge Base
  2. 7.3 Level 3: Incident Response
  3. 7.4 Level 4: Data and Licenses
2.3.3
Explain the purpose of business agreements (i.e., memos of understanding, service level agreement, statement of work, master services agreement)
3.1.1
Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, CPU features, memory module attributes, and expansion business types)
3.1.2
Use industry standard vocabulary to identify components
3.2.1
Select and install appropriate system unit components to meet customer specifications
3.2.2
Interpret BIOS/UEFI settings for basic hardware components
  1. 5.6 Internal Threats
3.2.3
Configure the settings of basic hardware components
  1. 17.3 Lab: SOHO Devices
3.2.4
Troubleshoot basic hardware components and resolve issues
3.3.1
Categorize audio and video device components, connectors, and cables
3.3.2
Install appropriate sound and video cards to match specifications and end-user requirements
3.3.3
Configure display and video settings
3.3.4
Manage sound card and audio device settings
3.4.1
Identify external device components, connectors, and cables
  1. 17.3 Lab: SOHO Devices
3.4.2
Connect external devices using the appropriate connectors and cables
  1. 17.3 Lab: SOHO Devices
3.4.3
Manage device driver updates and roll back drivers
3.4.4
Enable or disable devices
3.4.5
Install drivers for external devices
3.4.6
Prepare devices for safe removal
  1. 4.3 Star in a Video!
3.4.7
Manipulate system utilities to configure storage and external devices
  1. 17.3 Lab: SOHO Devices
3.5.1
Install SOHO multifunction device / printers and configure appropriate settings
  1. 3.4 Private Networks
  2. 17.3 Lab: SOHO Devices
3.5.2
Compare and contrast differences between the various print technologies and the associated imaging process
  1. 17.3 Lab: SOHO Devices
3.5.3
Perform appropriate printer maintenance
  1. 17.3 Lab: SOHO Devices
4.1.1
Use industry standard vocabulary in relation to operating systems (OS)
4.1.2
Compare and contrast Microsoft Windows Operating Systems
4.1.3
Install and secure operating systems
4.1.4
Install and configure Windows networking
  1. 17.4 Lab: Windows Networking
4.2.1
Explain various features and tools of operating systems
4.2.2
Apply appropriate command line tools
4.2.3
Select appropriate operating system features and tools based on customer requirements
4.2.4
Configure Windows Update Settings
4.2.5
Configure local users and groups for a Windows networking system
4.2.6
Configure User Access Control (UAC)
4.2.7
Use Windows Control Panel utilities
  1. 17.4 Lab: Windows Networking
4.2.8
Perform common preventive maintenance procedures using the appropriate Windows OS tools
4.2.9
Troubleshoot common PC security issues using best practices
  1. 4.2 Building a Knowledge Base
4.3.1
Explain key terms and acronyms used in diagnostic testing and troubleshooting
4.3.2
Identify common symptoms for a given discrepancy
  1. 4.2 Building a Knowledge Base
4.3.3
Develop a solution for a given discrepancy
  1. 4.2 Building a Knowledge Base
4.3.4
Document the solution
  1. 4.2 Building a Knowledge Base
4.4.1
Identify common features and functionality of the Mac OS and Linux operating systems
4.4.2
Set up and use client-side virtualization
  1. 16.1 Advanced Networking
4.4.3
Identify basic cloud concepts
4.4.4
Summarize the properties and purpose of services provided by networked hosts
  1. 3.1 Network Administrator
4.4.5
Identify basic features of mobile operating systems
  1. 3.5 Mobile Devices
  2. 17.5 Lab: Mobile Device Connectivity
4.4.6
Install and configure basic mobile device network connectivity and email
  1. 3.3 Protocols and Standards
  2. 17.5 Lab: Mobile Device Connectivity
4.4.7
Summarize methods and data related to mobile device synchronization
  1. 3.3 Protocols and Standards
  2. 17.5 Lab: Mobile Device Connectivity
4.4.8
Compare and contrast methods to secure mobile devices
  1. 3.5 Mobile Devices
  2. 17.5 Lab: Mobile Device Connectivity
4.4.9
Explain the characteristics of various types of other mobile devices
  1. 3.5 Mobile Devices
  2. 17.5 Lab: Mobile Device Connectivity
4.4.10
Compare and contrast accessories, features, and ports of mobile and IoT devices
  1. 3.5 Mobile Devices
  2. 17.5 Lab: Mobile Device Connectivity
4.4.11
Troubleshoot common mobile OS and tablet software/hardware issues
  1. 3.5 Mobile Devices
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
  4. 17.5 Lab: Mobile Device Connectivity
4.5.1
Compare and contrast laptops, tablets, and computer form factors
4.5.2
Explain current trends in laptops and tablet applications
4.5.3
Compare laptop and tablet operating systems
4.5.4
Explain the function of components within the display of a laptop and tablet
4.5.5
Compare and contrast accessories, features, and ports of laptops and tablets
5.1.1
Describe the OSI model and relate to hardware in a network
  1. 16.1 Advanced Networking
5.1.2
Implement the appropriate industry policy and procedures
  1. 7.4 Level 4: Data and Licenses
5.1.3
Compare and contrast the ports and protocols (HTTP, NetBIOS, SMTP, TCP, UDP, etc.)
  1. 3.3 Protocols and Standards
5.1.4
Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.)
  1. 3.3 Protocols and Standards
5.1.5
Utilize appropriate wired connections
5.1.6
Utilize appropriate wireless connections
5.2.1
Describe encapsulation/de-encapsulation
  1. 16.1 Advanced Networking
5.2.2
Explain modulation techniques
5.2.3
Apply numbering systems (e.g., binary, octal, hexadecimal)
5.2.4
Demonstrate addressing and subnetting techniques
5.2.5
Compare broadband/baseband
  1. 16.1 Advanced Networking
5.2.6
Compare and contrast bit rates vs. baud rates
  1. 16.1 Advanced Networking
5.2.7
Describe CDMA
  1. 17.5 Lab: Mobile Device Connectivity
5.2.8
Explain the difference between CSMA/CD-CSMA/CA
  1. 16.1 Advanced Networking
5.2.9
Describe wavelength
  1. 3.3 Protocols and Standards
5.2.10
Apply TCP/IP suite (TCP, UDP, ICMP)
  1. 3.3 Protocols and Standards
5.3.1
Compare Main (MDF) and intermediate distribution frame (IDF)
5.3.2
Implement a cable management solution
5.3.3
Analyze and create a power management plan (i.e., power converters, circuits, UPS {Power redundancy}, inverters, load capacity, etc.)
5.3.4
Determine proper airflow for optimal performance
  1. 3.2 Environmental Controls
5.3.5
Utilize correct rack systems for location and operation
  1. 3.2 Environmental Controls
5.3.6
Employ consistent labeling methodologies (port, system, circuit, patch panel)
5.3.7
Develop a plan to monitor rack security and environmental conditions
  1. 3.2 Environmental Controls
6.3.3
Troubleshoot and resolve common wireless issues
6.3.4
Troubleshoot and resolve common copper and fiber cable issues
6.3.5
Troubleshoot and resolve common network issues
6.3.6
Troubleshoot and resolve common security issues
6.3.7
Troubleshoot and resolve common WAN issues