Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina Cybersecurity Fundamentals

Clear selection Print / Download

103

Standards in this Framework

102

Standards Mapped

99%

Mapped to Course

Standard Lessons
A.1
Review school safety policies and procedures.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.4 Personal Safety
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.4 Personal Safety
A.2
Review classroom safety rules and procedures.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.4 Personal Safety
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.4 Personal Safety
A.3
Review safety procedures for using equipment in the classroom.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.4 Personal Safety
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.4 Personal Safety
A.4
Identify major causes of work-related accidents in office environments.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.4 Personal Safety
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.4 Personal Safety
A.5
Demonstrate safety skills in an office/work environment.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.4 Personal Safety
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.4 Personal Safety
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.1 Student Organizations
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.1 Student Organizations
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.1 Student Organizations
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.1 Student Organizations
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.1 Student Organizations
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.1 Student Organizations
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.1 Student Organizations
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.1 Student Organizations
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.1 Student Organizations
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 13.1 Student Organizations
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation (e.g., keying speed).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.10 Command Line Interface
  3. Fundamentals of Cybersecurity
  4. 4.11 Command Line Interface
  5. 8.2 Using Databases
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 4.11 Command Line Interface
  8. 8.2 Using Databases
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.1 Digital Footprint and Reputation
  3. Fundamentals of Cybersecurity
  4. 1.1 Digital Footprint and Responsibility
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 1.1 Digital Footprint and Responsibility
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.3 What is Cybersecurity?
  3. 2.3 Internet Safety
  4. Fundamentals of Cybersecurity
  5. 1.4 Cyber Ethics and Laws
  6. 1.5 Personal Data Security
  7. 1.6 Cybersecurity Essentials
  8. 1.7 Common Cyber Attacks and Prevention
  9. South Carolina Cybersecurity Fundamentals (NEW)
  10. 1.4 Cyber Ethics and Laws
  11. 1.5 Personal Data Security
  12. 1.6 Cybersecurity Essentials
  13. 1.7 Common Cyber Attacks and Prevention
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. South Carolina Cybersecurity Fundamentals
  2. 2.2 Cyberbullying
  3. 2.6 Creative Credit & Copyright
  4. 2.7 Hacking Ethics
  5. Fundamentals of Cybersecurity
  6. 1.1 Digital Footprint and Responsibility
  7. 1.4 Cyber Ethics and Laws
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 1.1 Digital Footprint and Responsibility
  10. 1.4 Cyber Ethics and Laws
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.6 Creative Credit & Copyright
  3. 2.7 Hacking Ethics
  4. Fundamentals of Cybersecurity
  5. 1.4 Cyber Ethics and Laws
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.4 Cyber Ethics and Laws
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-and personal-related information.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.4 Privacy & Security
  3. 2.7 Hacking Ethics
  4. Fundamentals of Cybersecurity
  5. 1.4 Cyber Ethics and Laws
  6. 1.5 Personal Data Security
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 1.4 Cyber Ethics and Laws
  9. 1.5 Personal Data Security
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.4 Privacy & Security
  3. 5.7 Digital Certificates
  4. 7.6 Application Security
  5. 7.7 Browser Configuration
  6. 8.2 Malware Types and Prevention
  7. Fundamentals of Cybersecurity
  8. 1.6 Cybersecurity Essentials
  9. 1.7 Common Cyber Attacks and Prevention
  10. 2.4 Authentication Methods
  11. 4.8 Application Security
  12. 4.9 Browser Configuration
  13. South Carolina Cybersecurity Fundamentals (NEW)
  14. 1.6 Cybersecurity Essentials
  15. 1.7 Common Cyber Attacks and Prevention
  16. 2.4 Authentication Methods
  17. 4.8 Application Security
  18. 4.9 Browser Configuration
D.1
Demonstrate creativity and innovation.
  1. South Carolina Cybersecurity Fundamentals
  2. 6.1 Project: Steganography
  3. Fundamentals of Cybersecurity
  4. 3.1 Create an Escape Room
  5. 9.1 The Game of Risk
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 3.1 Create an Escape Room
  8. 9.1 The Game of Risk
D.2
Demonstrate critical thinking and problem-solving skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 6.1 Project: Steganography
  3. Fundamentals of Cybersecurity
  4. 3.1 Create an Escape Room
  5. 7.2 Troubleshooting Methodology
  6. 9.1 The Game of Risk
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 3.1 Create an Escape Room
  9. 7.2 Troubleshooting Methodology
  10. 9.1 The Game of Risk
D.3
Demonstrate initiative and self-direction.
  1. South Carolina Cybersecurity Fundamentals
  2. 6.1 Project: Steganography
  3. Fundamentals of Cybersecurity
  4. 7.1 Communication is Key!
  5. 7.2 Troubleshooting Methodology
  6. 7.3 Building a Knowledge Base
  7. 7.4 Star in a Video!
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 7.1 Communication is Key!
  10. 7.2 Troubleshooting Methodology
  11. 7.3 Building a Knowledge Base
  12. 7.4 Star in a Video!
D.4
Demonstrate integrity.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. 6.1 Project: Steganography
  4. Fundamentals of Cybersecurity
  5. 7.1 Communication is Key!
  6. 7.2 Troubleshooting Methodology
  7. 7.3 Building a Knowledge Base
  8. 7.4 Star in a Video!
  9. South Carolina Cybersecurity Fundamentals (NEW)
  10. 7.1 Communication is Key!
  11. 7.2 Troubleshooting Methodology
  12. 7.3 Building a Knowledge Base
  13. 7.4 Star in a Video!
D.5
Demonstrate work ethic.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 7.1 Communication is Key!
  5. 7.2 Troubleshooting Methodology
  6. 7.3 Building a Knowledge Base
  7. 7.4 Star in a Video!
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 7.1 Communication is Key!
  10. 7.2 Troubleshooting Methodology
  11. 7.3 Building a Knowledge Base
  12. 7.4 Star in a Video!
D.6
Demonstrate conflict resolution skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 7.1 Communication is Key!
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 7.1 Communication is Key!
D.7
Demonstrate listening and speaking skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 7.1 Communication is Key!
  5. 7.2 Troubleshooting Methodology
  6. 7.3 Building a Knowledge Base
  7. 7.4 Star in a Video!
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 7.1 Communication is Key!
  10. 7.2 Troubleshooting Methodology
  11. 7.3 Building a Knowledge Base
  12. 7.4 Star in a Video!
D.8
Demonstrate respect for diversity.
  1. South Carolina Cybersecurity Fundamentals
  2. 10.10 Impact of the Internet
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 5.9 Impact of the Internet
  6. 8.1 Data as a Resource
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 1.6 Cybersecurity Essentials
  9. 5.9 Impact of the Internet
  10. 8.1 Data as a Resource
D.9
Demonstrate customer service orientation.
  1. South Carolina Cybersecurity Fundamentals
  2. 9.1 Project: Security Assessment Report
  3. 12.1 Methodology
  4. 12.2 Support Practice
  5. Fundamentals of Cybersecurity
  6. 7.1 Communication is Key!
  7. 7.2 Troubleshooting Methodology
  8. 7.3 Building a Knowledge Base
  9. 7.4 Star in a Video!
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 7.1 Communication is Key!
  12. 7.2 Troubleshooting Methodology
  13. 7.3 Building a Knowledge Base
  14. 7.4 Star in a Video!
D.10
Demonstrate teamwork.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. 6.1 Project: Steganography
  4. Fundamentals of Cybersecurity
  5. 3.1 Create an Escape Room
  6. 9.1 The Game of Risk
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 3.1 Create an Escape Room
  9. 9.1 The Game of Risk
E.1
Demonstrate global or “big picture” thinking.
  1. South Carolina Cybersecurity Fundamentals
  2. 10.10 Impact of the Internet
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. 5.9 Impact of the Internet
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.6 Cybersecurity Essentials
  8. 5.9 Impact of the Internet
E.2
Demonstrate career and life management skills and goal-making.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.2 Alternative Learning Opportunities
  5. 18.3 Resume and Interview Prep
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 13.2 Alternative Learning Opportunities
  8. 13.3 Resume and Interview Prep
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 18.2 Alternative Learning Opportunities
  5. 18.3 Resume and Interview Prep
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 13.2 Alternative Learning Opportunities
  8. 13.3 Resume and Interview Prep
E.4
Demonstrate time and resource management skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 3.1 Create an Escape Room
  5. 7.3 Building a Knowledge Base
  6. 7.4 Star in a Video!
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 3.1 Create an Escape Room
  9. 7.3 Building a Knowledge Base
  10. 7.4 Star in a Video!
E.5
Demonstrates information literacy skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.5 Information Literacy
  3. Fundamentals of Cybersecurity
  4. 1.3 Can All Information Be Trusted?
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 1.3 Can All Information Be Trusted?
E.6
Demonstrates information security skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.4 Privacy & Security
  3. Fundamentals of Cybersecurity
  4. 1.2 Personal Data and Collection
  5. 1.5 Personal Data Security
  6. 1.6 Cybersecurity Essentials
  7. 1.7 Common Cyber Attacks and Prevention
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 1.2 Personal Data and Collection
  10. 1.5 Personal Data Security
  11. 1.6 Cybersecurity Essentials
  12. 1.7 Common Cyber Attacks and Prevention
E.7
Demonstrates information technology skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.3 Internet Safety
  3. 11.1 Internal Components
  4. Fundamentals of Cybersecurity
  5. 5.1 Computers Speak Binary
  6. 6.1 Internal Components
  7. 7.2 Troubleshooting Methodology
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 5.1 Computers Speak Binary
  10. 6.1 Internal Components
  11. 7.2 Troubleshooting Methodology
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. South Carolina Cybersecurity Fundamentals
  2. 9.1 Project: Security Assessment Report
  3. 12.1 Methodology
  4. 12.2 Support Practice
  5. Fundamentals of Cybersecurity
  6. 7.1 Communication is Key!
  7. 7.2 Troubleshooting Methodology
  8. 7.3 Building a Knowledge Base
  9. 7.4 Star in a Video!
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 7.1 Communication is Key!
  12. 7.2 Troubleshooting Methodology
  13. 7.3 Building a Knowledge Base
  14. 7.4 Star in a Video!
E.9
Demonstrate job-specific mathematics skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 5.4 Hash Functions
  3. 5.5 Hash Function Development
  4. Fundamentals of Cybersecurity
  5. 2.3 Asymmetric Encryption
  6. 5.1 Computers Speak Binary
  7. 5.2 Bits, Text, and Numbers
  8. 8.2 Using Databases
  9. 8.3 Security in Coding
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 2.3 Asymmetric Encryption
  12. 5.1 Computers Speak Binary
  13. 5.2 Bits, Text, and Numbers
  14. 8.2 Using Databases
  15. 8.3 Security in Coding
E.10
Demonstrates professionalism in the workplace.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
  6. Fundamentals of Cybersecurity
  7. 7.1 Communication is Key!
  8. 7.2 Troubleshooting Methodology
  9. 7.3 Building a Knowledge Base
  10. 7.4 Star in a Video!
  11. South Carolina Cybersecurity Fundamentals (NEW)
  12. 7.1 Communication is Key!
  13. 7.2 Troubleshooting Methodology
  14. 7.3 Building a Knowledge Base
  15. 7.4 Star in a Video!
E.11
Demonstrate reading and writing skills.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
  6. Fundamentals of Cybersecurity
  7. 7.1 Communication is Key!
  8. 7.2 Troubleshooting Methodology
  9. 7.3 Building a Knowledge Base
  10. 7.4 Star in a Video!
  11. South Carolina Cybersecurity Fundamentals (NEW)
  12. 7.1 Communication is Key!
  13. 7.2 Troubleshooting Methodology
  14. 7.3 Building a Knowledge Base
  15. 7.4 Star in a Video!
E.12
Demonstrates workplace safety.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.1 Welcome to Cybersecurity Fundamentals
  3. Fundamentals of Cybersecurity
  4. 8.5 Environmental Controls
  5. 18.4 Personal Safety
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 8.5 Environmental Controls
  8. 13.4 Personal Safety
F.1
Define terms related to cyber security (e.g., cyber security, information assurance, risk, risk management, cyber security services).
  1. South Carolina Cybersecurity Fundamentals
  2. 1.3 What is Cybersecurity?
  3. 1.4 Impact of Cybersecurity
  4. 13.1 Identifying Risks
  5. 13.3 Risk Response
  6. Fundamentals of Cybersecurity
  7. 1.6 Cybersecurity Essentials
  8. 8.7 Risky Business
  9. South Carolina Cybersecurity Fundamentals (NEW)
  10. 1.6 Cybersecurity Essentials
  11. 8.7 Risky Business
F.2
Explain the importance of information and internet security (e.g., browser, cloud, network).
  1. South Carolina Cybersecurity Fundamentals
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. Fundamentals of Cybersecurity
  6. 4.8 Application Security
  7. 4.9 Browser Configuration
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 4.8 Application Security
  10. 4.9 Browser Configuration
F.3
Explain the concepts of confidentiality, integrity, and availability (CIA).
  1. South Carolina Cybersecurity Fundamentals
  2. 1.5 The CIA Triad
  3. Fundamentals of Cybersecurity
  4. 1.6 Cybersecurity Essentials
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 1.6 Cybersecurity Essentials
F.4
Identify the concepts of cyber security risk management. (e.g., vulnerability identification, management, and mitigation; active and passive reconnaissance; testing port scanning, automation).
  1. South Carolina Cybersecurity Fundamentals
  2. 13.1 Identifying Risks
  3. 13.2 Assessing Risks
  4. 13.3 Risk Response
  5. Fundamentals of Cybersecurity
  6. 8.6 Checking for Vulnerabilities
  7. 8.7 Risky Business
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 8.6 Checking for Vulnerabilities
  10. 8.7 Risky Business
F.5
Explain vulnerability management (e.g., identification, management, mitigation, testing).
  1. South Carolina Cybersecurity Fundamentals
  2. 13.1 Identifying Risks
  3. 13.2 Assessing Risks
  4. 13.3 Risk Response
  5. Fundamentals of Cybersecurity
  6. 8.3 Security in Coding
  7. 8.6 Checking for Vulnerabilities
  8. 8.7 Risky Business
  9. South Carolina Cybersecurity Fundamentals (NEW)
  10. 8.3 Security in Coding
  11. 8.6 Checking for Vulnerabilities
  12. 8.7 Risky Business
F.6
Describe cyber security threats to an organization and why organizations need to manage risk.
  1. South Carolina Cybersecurity Fundamentals
  2. 13.1 Identifying Risks
  3. 13.2 Assessing Risks
  4. 13.3 Risk Response
  5. Fundamentals of Cybersecurity
  6. 8.3 Security in Coding
  7. 8.6 Checking for Vulnerabilities
  8. 8.7 Risky Business
  9. South Carolina Cybersecurity Fundamentals (NEW)
  10. 8.3 Security in Coding
  11. 8.6 Checking for Vulnerabilities
  12. 8.7 Risky Business
F.7
Research potential consequences of various forms of security incidents.
  1. South Carolina Cybersecurity Fundamentals
  2. 8.8 Types of SQLi and Prevention
  3. 13.1 Identifying Risks
  4. 13.2 Assessing Risks
  5. 13.3 Risk Response
  6. 17.11 Types of SQLi and Prevention
  7. Fundamentals of Cybersecurity
  8. 8.6 Checking for Vulnerabilities
  9. 8.7 Risky Business
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 8.6 Checking for Vulnerabilities
  12. 8.7 Risky Business
F.8
Compare and contrast the various types of security (e.g., physical security, technological, administrative).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. 18.2 Environmental Controls
  4. Fundamentals of Cybersecurity
  5. 1.7 Common Cyber Attacks and Prevention
  6. 4.10 System Administration
  7. 8.5 Environmental Controls
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 1.7 Common Cyber Attacks and Prevention
  10. 4.10 System Administration
  11. 8.5 Environmental Controls
F.9
Research national or industry standards/regulations that relate to cyber security and their impact on people, processes, and technology (e.g., news, reports, policies, subscriptions, incidents).
  1. South Carolina Cybersecurity Fundamentals
  2. 2.7 Hacking Ethics
  3. 19.4 Level 4: Data and Licenses
  4. Fundamentals of Cybersecurity
  5. 1.4 Cyber Ethics and Laws
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.4 Cyber Ethics and Laws
F.10
Investigate the origins and history of cyber security and its impact on society.
  1. South Carolina Cybersecurity Fundamentals
  2. 1.3 What is Cybersecurity?
  3. 4.2 History of Cryptography
  4. Fundamentals of Cybersecurity
  5. 2.1 Cryptography: Then, Now, and Future
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 2.1 Cryptography: Then, Now, and Future
F.11
Describe the role that cyber security plays in the private or public sector.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.4 Software and Applications
  3. 7.5 Software Licenses
  4. Fundamentals of Cybersecurity
  5. 4.6 Software and Applications
  6. 4.7 Software Licenses
  7. 8.1 Data as a Resource
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 4.6 Software and Applications
  10. 4.7 Software Licenses
  11. 8.1 Data as a Resource
F.12
Discuss and develop a code of ethics as related to the field of cyber security.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.7 Hacking Ethics
  3. 13.4 Penetration Testing
  4. Fundamentals of Cybersecurity
  5. 1.4 Cyber Ethics and Laws
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.4 Cyber Ethics and Laws
G.1
Describe the characteristics of cyber threats, attacks, and vulnerabilities
  1. South Carolina Cybersecurity Fundamentals
  2. 1.3 What is Cybersecurity?
  3. 13.1 Identifying Risks
  4. Fundamentals of Cybersecurity
  5. 1.6 Cybersecurity Essentials
  6. 8.7 Risky Business
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 1.6 Cybersecurity Essentials
  9. 8.7 Risky Business
G.2
Analyze types of current cyber threats (e.g., DDoS, Phishing, cracking, social engineering).
  1. South Carolina Cybersecurity Fundamentals
  2. 1.4 Impact of Cybersecurity
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 8.2 Malware Types and Prevention
  6. 8.6 Common Security Problems
  7. 8.8 Types of SQLi and Prevention
  8. 17.9 Common Security Problems
  9. 17.11 Types of SQLi and Prevention
  10. Fundamentals of Cybersecurity
  11. 1.7 Common Cyber Attacks and Prevention
  12. 4.8 Application Security
  13. 4.9 Browser Configuration
  14. 8.3 Security in Coding
  15. 8.6 Checking for Vulnerabilities
  16. South Carolina Cybersecurity Fundamentals (NEW)
  17. 1.7 Common Cyber Attacks and Prevention
  18. 4.8 Application Security
  19. 4.9 Browser Configuration
  20. 8.3 Security in Coding
  21. 8.6 Checking for Vulnerabilities
G.3
Categorize sources/originators of different types of malicious attacks (e.g., nation states, cyber criminals, hacktivists, insiders).
  1. South Carolina Cybersecurity Fundamentals
  2. 1.4 Impact of Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 1.4 Cyber Ethics and Laws
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 1.4 Cyber Ethics and Laws
G.4
Compare and contrast cyber-attack surfaces of differing organizations.
  1. South Carolina Cybersecurity Fundamentals
  2. 13.3 Risk Response
  3. Fundamentals of Cybersecurity
  4. 8.6 Checking for Vulnerabilities
  5. 8.7 Risky Business
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 8.6 Checking for Vulnerabilities
  8. 8.7 Risky Business
G.5
Explain types of malware (e.g., viruses, polymorphic viruses; worms, Trojan horses, spyware, ransomware, adware).
  1. South Carolina Cybersecurity Fundamentals
  2. 8.2 Malware Types and Prevention
  3. Fundamentals of Cybersecurity
  4. 1.7 Common Cyber Attacks and Prevention
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 1.7 Common Cyber Attacks and Prevention
G.6
Demonstrate familiarity with malware removal (e.g. scanning systems, reviewing scan logs, malware remediation).
  1. South Carolina Cybersecurity Fundamentals
  2. 8.1 Network Attacks
  3. 8.2 Malware Types and Prevention
  4. 13.2 Assessing Risks
  5. Fundamentals of Cybersecurity
  6. 1.7 Common Cyber Attacks and Prevention
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 1.7 Common Cyber Attacks and Prevention
G.7
Explain types of attacks (e.g., wireless, application, social engineering, buffer overflow attacks, backdoor).
  1. South Carolina Cybersecurity Fundamentals
  2. 8.1 Network Attacks
  3. 8.2 Malware Types and Prevention
  4. 13.2 Assessing Risks
  5. Fundamentals of Cybersecurity
  6. 1.7 Common Cyber Attacks and Prevention
  7. 8.3 Security in Coding
  8. South Carolina Cybersecurity Fundamentals (NEW)
  9. 1.7 Common Cyber Attacks and Prevention
  10. 8.3 Security in Coding
G.8
Define strategies necessary to prevent attacks.
  1. South Carolina Cybersecurity Fundamentals
  2. 13.2 Assessing Risks
  3. Fundamentals of Cybersecurity
  4. 1.7 Common Cyber Attacks and Prevention
  5. 8.7 Risky Business
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.7 Common Cyber Attacks and Prevention
  8. 8.7 Risky Business
H.1
Define terms related to computer networking (e.g., LAN, WAN, wireless, protocols, topology, firewalls).
  1. South Carolina Cybersecurity Fundamentals
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
  4. 11.5 Network Options
  5. 11.6 Network Communication
  6. Fundamentals of Cybersecurity
  7. 5.4 What is the Internet?
  8. 5.5 IP Addresses
  9. 5.6 Routing and Packets
  10. 6.7 Network Options
  11. 6.10 Network Communication
  12. South Carolina Cybersecurity Fundamentals (NEW)
  13. 5.4 What is the Internet?
  14. 5.5 IP Addresses
  15. 5.6 Routing and Packets
  16. 6.7 Network Options
  17. 6.10 Network Communication
H.2
Compare and contrast OSI and TCP/IP models and encapsulation concepts.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 5.8 OSI Model
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 5.6 Routing and Packets
  7. 5.7 How Do Websites Work?
  8. 5.8 OSI Model
H.3
Compare and contrast wired versus wireless networks.
  1. South Carolina Cybersecurity Fundamentals
  2. 11.5 Network Options
  3. 11.8 Private Networks
  4. 18.4 Private Networks
  5. Fundamentals of Cybersecurity
  6. 6.7 Network Options
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 6.7 Network Options
H.4
Examine the concept of the internet as a network of connected systems.
  1. South Carolina Cybersecurity Fundamentals
  2. 10.7 Routing
  3. Fundamentals of Cybersecurity
  4. 5.4 What is the Internet?
  5. 5.6 Routing and Packets
  6. 5.7 How Do Websites Work?
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 5.4 What is the Internet?
  9. 5.6 Routing and Packets
  10. 5.7 How Do Websites Work?
H.5
Design a basic network topology.
  1. South Carolina Cybersecurity Fundamentals
  2. 11.5 Network Options
  3. 11.8 Private Networks
  4. 18.4 Private Networks
  5. Fundamentals of Cybersecurity
  6. 6.7 Network Options
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 6.7 Network Options
I.1
Define terms related to network security (e.g., routing, perimeter networks, security layering, Virtual Private Network (VPN), isolation).
  1. South Carolina Cybersecurity Fundamentals
  2. 8.1 Network Attacks
  3. 11.6 Network Communication
  4. 11.8 Private Networks
  5. 18.4 Private Networks
  6. Fundamentals of Cybersecurity
  7. 5.6 Routing and Packets
  8. 6.5 Network Devices
  9. 6.10 Network Communication
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 5.6 Routing and Packets
  12. 6.5 Network Devices
  13. 6.10 Network Communication
I.2
Explain the concepts of protocol security (e.g., protocol spoofing, tunneling, network sniffing, denial of service).
  1. South Carolina Cybersecurity Fundamentals
  2. 13.2 Assessing Risks
I.3
Analyze and implement security layering.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. 13.4 Penetration Testing
  4. Fundamentals of Cybersecurity
  5. 4.10 System Administration
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 4.10 System Administration
I.4
Identify vulnerabilities and common attack methods.
  1. South Carolina Cybersecurity Fundamentals
  2. 13.2 Assessing Risks
  3. Fundamentals of Cybersecurity
  4. 8.3 Security in Coding
  5. 8.6 Checking for Vulnerabilities
  6. 8.7 Risky Business
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 8.3 Security in Coding
  9. 8.6 Checking for Vulnerabilities
  10. 8.7 Risky Business
I.5
Use strategies necessary to prevent network attacks.
  1. South Carolina Cybersecurity Fundamentals
  2. 8.1 Network Attacks
  3. 8.8 Types of SQLi and Prevention
  4. 13.2 Assessing Risks
  5. 17.11 Types of SQLi and Prevention
  6. Fundamentals of Cybersecurity
  7. 8.6 Checking for Vulnerabilities
  8. 8.7 Risky Business
  9. South Carolina Cybersecurity Fundamentals (NEW)
  10. 8.6 Checking for Vulnerabilities
  11. 8.7 Risky Business
I.6
Identify tools and techniques used for security layering.
  1. South Carolina Cybersecurity Fundamentals
  2. 13.4 Penetration Testing
  3. Fundamentals of Cybersecurity
  4. 8.6 Checking for Vulnerabilities
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 8.6 Checking for Vulnerabilities
I.7
Determine characteristics of firewalls (hardware and software) and when to use them.
  1. South Carolina Cybersecurity Fundamentals
  2. 11.3 Network Devices
  3. 11.6 Network Communication
  4. Fundamentals of Cybersecurity
  5. 6.10 Network Communication
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 6.10 Network Communication
I.8
Set up Port/Network Address Translation (NAT/PAT).
  1. South Carolina Cybersecurity Fundamentals
  2. 11.8 Private Networks
  3. 18.4 Private Networks
I.9
Explain how network addresses impact network security (e.g., IPv4 and IPv6 addressing, CIDR notation, public vs private networks.
  1. South Carolina Cybersecurity Fundamentals
  2. 11.8 Private Networks
  3. 18.4 Private Networks
  4. Fundamentals of Cybersecurity
  5. 5.5 IP Addresses
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 5.5 IP Addresses
I.10
Use a basic command line interface (Windows and Linux) to configure communications (e.g., ipconfig, ifconfig, and net config, ping).
  1. South Carolina Cybersecurity Fundamentals
  2. 11.7 Network Management
  3. Fundamentals of Cybersecurity
  4. 6.11 Network Management
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 6.11 Network Management
J.1
Compare and contrast common operating systems (e.g., Windows, Linux, iOS, Android).
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
  4. South Carolina Cybersecurity Fundamentals (NEW)
  5. 4.1 Operating Systems
  6. 4.3 Comparing Operating Systems
J.2
Identify best practices for protecting operating systems (e.g., access control, separation of duties, least privilege).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.10 System Administration
J.3
Compare and contrast common file systems (e.g., FAT, NTFS, HFS).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.2 Comparing Operating Systems
  3. Fundamentals of Cybersecurity
  4. 4.3 Comparing Operating Systems
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.3 Comparing Operating Systems
J.4
Describe the various types of file permissions (e.g., registry, Active Directory, basic and advanced).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.10 System Administration
J.5
Implement group and audit policies.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.10 System Administration
J.6
Explain the purpose and location of security and auditing logs.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
  5. 8.6 Checking for Vulnerabilities
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 4.10 System Administration
  8. 8.6 Checking for Vulnerabilities
J.7
Define virtualization and identify its advantages and disadvantages.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. South Carolina Cybersecurity Fundamentals (NEW)
  4. 4.1 Operating Systems
J.8
Define strategies necessary to prevent operating system attacks.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.6 Application Security
  3. Fundamentals of Cybersecurity
  4. 4.8 Application Security
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.8 Application Security
K.1
Define terms related to identity, authorization, and authentication (e.g., passwords, biometrics, multi-factor, certificates).
  1. South Carolina Cybersecurity Fundamentals
  2. 2.4 Privacy & Security
  3. Fundamentals of Cybersecurity
  4. 1.5 Personal Data Security
  5. 8.5 Environmental Controls
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.5 Personal Data Security
  8. 8.5 Environmental Controls
K.2
Describe the various types of permissions (e.g., basic, administrative, elevated).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
  5. 8.6 Checking for Vulnerabilities
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 4.10 System Administration
  8. 8.6 Checking for Vulnerabilities
K.3
Identify types of access control (e.g., role-based access control (RBAC), mandatory access control, discretionary-based control).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. 7.9 Access Control
  4. 18.6 Access Control
  5. Fundamentals of Cybersecurity
  6. 4.10 System Administration
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 4.10 System Administration
K.4
Describe the importance of Multifactor authentication.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. 7.9 Access Control
  4. 18.6 Access Control
  5. Fundamentals of Cybersecurity
  6. 4.10 System Administration
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 4.10 System Administration
K.5
Analyze best practices for end-user password development and usage.
  1. South Carolina Cybersecurity Fundamentals
  2. 2.4 Privacy & Security
  3. Fundamentals of Cybersecurity
  4. 1.5 Personal Data Security
  5. 1.6 Cybersecurity Essentials
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.5 Personal Data Security
  8. 1.6 Cybersecurity Essentials
K.6
Identify the system administrator’s role in setting system policies and procedures.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.8 System Administration
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.10 System Administration
K.7
Compare and contrast backup and restore methods.
  1. South Carolina Cybersecurity Fundamentals
  2. 7.6 Application Security
  3. Fundamentals of Cybersecurity
  4. 4.8 Application Security
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.8 Application Security
K.8
Explain the importance of disaster recovery and business continuity planning (e.g., disaster recovery plans and controls, business continuity plans, backups).
  1. South Carolina Cybersecurity Fundamentals
  2. 19.3 Level 3: Incident Response
K.9
Secure servers (e.g., DNS/BIND, web, email, messaging, FTP, directory services, DHCP, file and print servers).
  1. South Carolina Cybersecurity Fundamentals
  2. 10.9 Viewing a Webpage
  3. 11.8 Private Networks
  4. 18.4 Private Networks
L.1
Define cryptography and its related terms (e.g., encryption, decryption, public key, and private key).
  1. South Carolina Cybersecurity Fundamentals
  2. 5.2 Encryption Algorithms
  3. 5.3 Advanced Cryptography
  4. 5.6 Asymmetric Encryption
  5. Fundamentals of Cybersecurity
  6. 2.1 Cryptography: Then, Now, and Future
  7. 2.2 Symmetric Encryption
  8. 2.3 Asymmetric Encryption
  9. 2.4 Authentication Methods
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 2.1 Cryptography: Then, Now, and Future
  12. 2.2 Symmetric Encryption
  13. 2.3 Asymmetric Encryption
  14. 2.4 Authentication Methods
L.2
Identify encryption methods (e.g., symmetric and asymmetric).
  1. South Carolina Cybersecurity Fundamentals
  2. 5.2 Encryption Algorithms
  3. 5.3 Advanced Cryptography
  4. 5.6 Asymmetric Encryption
  5. Fundamentals of Cybersecurity
  6. 2.1 Cryptography: Then, Now, and Future
  7. 2.2 Symmetric Encryption
  8. 2.3 Asymmetric Encryption
  9. 2.4 Authentication Methods
  10. South Carolina Cybersecurity Fundamentals (NEW)
  11. 2.1 Cryptography: Then, Now, and Future
  12. 2.2 Symmetric Encryption
  13. 2.3 Asymmetric Encryption
  14. 2.4 Authentication Methods
L.3
Determine appropriate uses for encrypting data and connections (e.g., email, files, network, VPN).
  1. South Carolina Cybersecurity Fundamentals
  2. 11.8 Private Networks
  3. 18.4 Private Networks
  4. Fundamentals of Cybersecurity
  5. 2.4 Authentication Methods
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 2.4 Authentication Methods
L.4
Explain how the design and functionality of various encryption methods support the security of data.
  1. South Carolina Cybersecurity Fundamentals
  2. 5.6 Asymmetric Encryption
  3. Fundamentals of Cybersecurity
  4. 2.2 Symmetric Encryption
  5. 2.4 Authentication Methods
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 2.2 Symmetric Encryption
  8. 2.4 Authentication Methods
L.5
Demonstrate various encryption techniques (e.g., encryption algorithms, Encrypting File System (EFS), hashing, public and private keys, Public Key Infrastructure (PKI), token devices, Trusted Platform Module (TPM), Transport Layer Security (TLS).
  1. South Carolina Cybersecurity Fundamentals
  2. 5.3 Advanced Cryptography
  3. 5.6 Asymmetric Encryption
  4. Fundamentals of Cybersecurity
  5. 2.2 Symmetric Encryption
  6. 2.4 Authentication Methods
  7. South Carolina Cybersecurity Fundamentals (NEW)
  8. 2.2 Symmetric Encryption
  9. 2.4 Authentication Methods
M.1
Analyze and differentiate between types of system attacks (e.g., operating systems, files, and applications).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.6 Application Security
  3. Fundamentals of Cybersecurity
  4. 1.7 Common Cyber Attacks and Prevention
  5. 4.8 Application Security
  6. South Carolina Cybersecurity Fundamentals (NEW)
  7. 1.7 Common Cyber Attacks and Prevention
  8. 4.8 Application Security
M.2
Implement security patches and updates (e.g., Active X, Java).
  1. South Carolina Cybersecurity Fundamentals
  2. 7.6 Application Security
  3. Fundamentals of Cybersecurity
  4. 4.8 Application Security
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 4.8 Application Security
M.3
Implement strategies necessary to prevent attacks (e.g., buffer overflow, application, input validation, scripting).
  1. South Carolina Cybersecurity Fundamentals
  2. 13.2 Assessing Risks
  3. Fundamentals of Cybersecurity
  4. 8.3 Security in Coding
  5. South Carolina Cybersecurity Fundamentals (NEW)
  6. 8.3 Security in Coding
N.1
Monitor security events and know when escalation is required (e.g., role of SIEM and SOAR, packet captures, log file entries, identifying suspicious events).
N.2
Explain digital forensics and attack attribution processes (cyber kill chain, sources of evidence, evidence handling).
  1. South Carolina Cybersecurity Fundamentals
  2. 20.1 Digital Forensics
N.3
Explain the impact of compliance frameworks on incident handling (e.g., compliance frameworks (GDPR, HIPAA, PCI-DSS, FERPA, FISMA), reporting and notification requirements).
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. South Carolina Cybersecurity Fundamentals (NEW)
  4. 1.2 Personal Data and Collection
N.4
Describe the elements of cybersecurity incident response (e.g., policy plan procedure elements, incident response lifecycle stages).
  1. South Carolina Cybersecurity Fundamentals
  2. 19.3 Level 3: Incident Response