Please enable JavaScript to use CodeHS

Standards Framework

for Nevada Cybersecurity 2


Standards in this Framework

Standard Description
8.1.1 Describe the steps of the cybersecurity lifecycle (e.g., people, process and tools)
8.1.2 Write a set of principles, rules, and practices to provide guidance and direction
8.1.3 Follow appropriate decision-making model to determine correct response procedures
8.2.1 Plan, prepare, and develop scope for a Cyber Incident Response Plan
8.2.2 Determine correct detection, mitigation, and reporting processes
8.2.3 Evaluate assessment and decision-making steps when handling an incident or event
8.2.4 Determine correct investigative procedures
8.2.5 Gather intelligence from a variety of sources including open source and others
8.2.6 Document intelligence gathering efforts including who, what, when, where, why, and how
8.2.7 Determine extent of event or incident scope including severity
8.2.8 Determine correct containment steps based on the type of incident or event encountered
8.2.9 Implement the correct eradication response and processes
8.2.10 Determine next steps post investigation (post breach) from legal, HR, news media response
8.3.1 Determine the appropriate security control, technique or process based on the property, system or data you are protecting
8.3.2 Explain the importance of security controls, techniques, and threat risk assessments
8.3.3 Select the appropriate solution to eliminate vulnerabilities and establish a security baseline
8.3.4 Develop plans to protect a variety of property, systems, or data
8.3.5 Implement the appropriate controls to ensure security of property, systems, or data
8.3.6 Compare and contrast alternative methods to mitigate security risks for data in transit and data at rest
8.4.1 Describe the digital chain of custody process for tracking data and equipment (legal evidence)
8.4.2 Describe all steps to capture and maintain evidence
8.4.3 Follow chain of custody procedures
8.4.4 Maintain detailed records (e.g., chain of custody forms, evidence collection forms, etc.)
8.4.5 Track digital evidence (e.g., how it has been gathered, tracked, and protected)
8.4.6 Describe a chain of custody
8.4.7 Develop a plan for data transport, encryption to avoid alteration of data and legal holds
8.4.8 Develop a plan for recovery, disposal of evidence, and follow up
8.4.9 Write a forensics summary report
9.1.1 Summarize basic forensic concepts and practices including eDiscovery, documentation, chain of custody, and data transport
9.1.2 Determine a first responder’s logical approach during an investigation with objective, evidence-based research
9.1.3 Review the First Responder steps and processes for proper documentation
9.1.4 Explain what eDiscovery is including the contextual process for electronic evidence collection (Electronically Stored Information ESI)
9.1.5 Observe and discuss legal restrictions, stipulations, regulatory compliance, and confidentiality when gathering evidence
9.1.6 Summarize Chain of Custody processes during investigations
9.2.1 Explain the proper use of penetration testing versus vulnerability scanning
9.2.2 Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters
9.2.3 Discover the common types of cyber threat actors including Cybercriminals, Attention-Seekers, Hacktivists, Jihadi Hackers, and Nation States
9.2.4 Explain and summarize the common cybersecurity attacks including the preferred tactics, techniques, and procedures (TTPS) of threat actors
9.2.5 Examine and summarize the targets of cyber threat actors including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications
9.2.6 Review and examine geopolitical flashpoints (e.g., U.S.-China Relations, Iranian Nuclear Accord, Economic Sanctions on Russia, Syrian Conflict, ISIS-related Activity, North Korean Policy, StateSponsored Cyber Activity, Cybersecurity Regulations)
9.3.1 Describe and demonstrate various methods and tools for threat detection and eDiscovery
9.3.2 Describe and demonstrate vulnerability management methods, practices, and scanning tools
9.3.3 Describe and demonstrate various practices, methods, and tools for penetration testing
9.3.4 Identify encryption methods and demonstrate tools to decipher encrypted data
9.3.5 Review basic cryptography concepts, methods, and its relationship to forensics
9.3.6 Identify Web application exploits, vulnerabilities
9.3.7 Describe and demonstrate Web Application Security and Scanning methods and tools
9.3.8 Identify methods or tools to eliminate cloud exploits and vulnerabilities
9.3.9 Describe and demonstrate a working knowledge of phishing attacks and mitigation steps
9.4.1 Explain what malware is including its history
9.4.2 Review and define the most common malware terminologies
9.4.3 Describe the ways and methods malware is spread
9.4.4 Review the types of malware specifically examining viruses, worms, trojan horses, rootkits ransomware, keyloggers, and grayware attack
9.4.5 Choose one malware scenario and select the appropriate type of mitigation and deterrent techniques
9.4.6 Use appropriate tools and techniques to eliminate malware from spreading
10.1.1 Explain Artificial Intelligence (AI), potential applications, concerns, and opportunities in relation to security issues
10.1.2 Describe machine learning and potential applications, concerns, and opportunities
10.1.3 Explain the role of ethics as it relates to security and emerging technologies
10.2.1 Describe job skills needed for potential careers in new and emerging technologies
10.2.2 Explore potential uses for and industries that may use emerging technologies