Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Cybersecurity Capstone

58

Standards in this Framework

49

Standards Mapped

84%

Mapped to Course

Standard Lessons
127.770.1A
(A) identify and demonstrate employable work behaviors such as regular attendance, punctuality, maintenance of a professional work environment, and effective written and verbal communication;
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. 9.1 The Game of Risk
  7. Advanced Cybersecurity
  8. 10.1 Level 1: Entry Event
127.770.1B
(B) identify and demonstrate positive personal qualities such as authenticity, resilience, initiative, and a willingness to learn new knowledge and skills;
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. 9.1 The Game of Risk
  7. Advanced Cybersecurity
  8. 10.1 Level 1: Entry Event
127.770.1C
(C) solve problems and think critically;
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
  3. 9.1 The Game of Risk
  4. 13.3 Looping
  5. 13.4 Branching
  6. Advanced Cybersecurity
  7. 2.1 Project: Steganography
  8. 5.2 Forensic Case 1: Logs
  9. 5.3 Forensic Case 2: File Metadata
  10. 5.4 Forensic Case 3: Exif Data
  11. 10.1 Level 1: Entry Event
127.770.1D
(D) demonstrate leadership skills and function effectively as a team member; and
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. 9.1 The Game of Risk
  7. Advanced Cybersecurity
  8. 10.1 Level 1: Entry Event
127.770.1E
(E) demonstrate an understanding of ethical and legal responsibilities in relation to the field of cybersecurity.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. Advanced Cybersecurity
  4. 9.4 Penetration Testing
  5. 10.4 Level 4: Data and Licenses
127.770.2A
(A) develop a personal career plan along with the education, job skills, and experience necessary to achieve career goals;
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
127.770.2B
(B) develop a resume or a portfolio appropriate to a chosen career plan; and
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. 16.3 Resume and Interview Prep
  6. Advanced Cybersecurity
  7. 20.3 Resume and Interview Prep
127.770.2C
(C) illustrate interview skills for successful job placement.
  1. Fundamentals of Cybersecurity
  2. 16.3 Resume and Interview Prep
  3. Advanced Cybersecurity
  4. 20.3 Resume and Interview Prep
127.770.3A
(A) analyze and apply to a scenario local, state, national, and international cyber law such as David's Law and Digital Millennium Copyright Act;
127.770.3B
(B) evaluate historic cases or events regarding cyber; and
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. Advanced Cybersecurity
  4. 4.2 Cyber Case Investigation
  5. 4.3 Security Breaches
  6. 9.2 Assessing Risks
127.770.3C
(C) explore compliance requirements such as Section 508 of the Rehabilitation Act of 1973, Family Educational Rights and Privacy Act of 1974 (FERPA), Health Insurance Portability and Accountability Act of 1996 (HIPAA), and Gramm-Leach-Bliley Act (GLBA).
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. Advanced Cybersecurity
  5. 10.4 Level 4: Data and Licenses
127.770.4A
(A) debate the relationship between privacy and security; and
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
  3. Advanced Cybersecurity
  4. 3.1 Network Attacks
127.770.4B
(B) identify ethical or unethical behavior when presented with various scenarios related to cyber activities.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. Advanced Cybersecurity
  4. 4.2 Cyber Case Investigation
  5. 4.3 Security Breaches
  6. 9.4 Penetration Testing
  7. 10.3 Level 3: Incident Response
127.770.5A
(A) define the phases of penetration testing, including plan, discover, attack, and report;
  1. Fundamentals of Cybersecurity
  2. 8.6 Checking for Vulnerabilities
  3. 8.7 Risky Business
  4. Advanced Cybersecurity
  5. 9.4 Penetration Testing
127.770.5B
(B) develop a plan to gain authorization for penetration testing;
127.770.5C
(C) identify commonly used vulnerability scanning tools such as port scanning, packet sniffing, and password crackers;
  1. Advanced Cybersecurity
  2. 7.4 Networking Services
  3. 9.1 Identifying Risks
127.770.5D
(D) develop a list of exploits based on results of scanning tool reports; and
  1. Advanced Cybersecurity
  2. 7.4 Networking Services
  3. 9.1 Identifying Risks
  4. 9.2 Assessing Risks
127.770.5E
(E) prioritize a list of mitigations based on results of scanning tool reports.
  1. Advanced Cybersecurity
  2. 7.4 Networking Services
  3. 9.3 Risk Response
127.770.6A
(A) evaluate symmetric and asymmetric algorithms such as substitution cipher, Advanced Encryption Standard (AES), Diffie-Hellman, and Rivest-Shamir-Adleman (RSA);
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.3 Asymmetric Encryption
  4. 2.4 Authentication Methods
  5. Advanced Cybersecurity
  6. 1.1 Advanced Cryptography
  7. 1.4 Asymmetric Encryption
127.770.6B
(B) explain the purpose of hashing algorithms, including blockchain;
  1. Advanced Cybersecurity
  2. 1.2 Hash Functions
  3. 1.3 Hash Function Development
127.770.6C
(C) explain the function of password salting;
  1. Advanced Cybersecurity
  2. 1.2 Hash Functions
127.770.6D
(D) explain and create a digital signature; and
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
  3. Advanced Cybersecurity
  4. 1.5 Digital Certificates
127.770.6E
(E) explain steganography.
  1. Advanced Cybersecurity
  2. 2.1 Project: Steganography
127.770.7A
(A) explain the purpose of establishing system baselines;
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
  3. Advanced Cybersecurity
  4. 4.5 Security Baseline
127.770.7B
(B) evaluate the role of physical security;
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
127.770.7C
(C) evaluate the functions of network security devices such as firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and intrusion detection prevention systems (IDPS);
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
127.770.7D
(D) analyze log files for anomalies; and
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
  3. Advanced Cybersecurity
  4. 5.2 Forensic Case 1: Logs
127.770.7E
(E) develop a plan demonstrating the concept of defense in depth.
127.770.8A
(A) explain the benefits of network segmentation, including sandboxes, air gaps, and virtual local area networks (VLAN);
  1. Advanced Cybersecurity
  2. 7.3 Network Design
127.770.8B
(B) investigate the role of software-managed networks, including virtualization;
127.770.8C
(C) discuss the role of honeypots and honeynets in networks; and
  1. Advanced Cybersecurity
  2. 9.2 Assessing Risks
127.770.8D
(D) create an incoming and outgoing network policy for a firewall.
127.770.9A
(A) identify cyberattacks by their signatures;
127.770.9B
(B) explain proper data acquisition;
  1. Fundamentals of Cybersecurity
  2. 8.1 Data as a Resource
127.770.9C
(C) examine evidence from devices for suspicious activities; and
  1. Fundamentals of Cybersecurity
  2. 6.11 Network Management
  3. Advanced Cybersecurity
  4. 5.2 Forensic Case 1: Logs
127.770.9D
(D) research current cybercrime cases involving digital forensics.
127.770.10A
(A) describe the integration of artificial intelligence and machine learning in cybersecurity;
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
127.770.10B
(B) investigate impacts made by predictive analytics on cybersecurity; and
  1. Advanced Cybersecurity
  2. 9.2 Assessing Risks
127.770.10C
(C) research other emerging trends such as augmented reality and quantum computing.
  1. Fundamentals of Cybersecurity
  2. 2.1 Cryptography: Then, Now, and Future
127.770.11A
(A) issue commands via the command line interface (CLI) such as ls, cd, pwd, cp, mv, chmod, ps, sudo, and passwd;
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 6.11 Network Management
127.770.11B
(B) describe the file system structure for multiple operating systems;
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
127.770.11C
(C) manipulate and edit files within the CLI; and
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
127.770.11D
(D) determine network status using the CLI with commands such as ping, ifconfig/ipconfig, traceroute/tracert, and netstat.
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
127.770.12A
(A) collaborate with others to create a technical report;
  1. Advanced Cybersecurity
  2. 10.1 Level 1: Entry Event
127.770.12B
(B) create, review, and edit a report summarizing technical findings; and
  1. Advanced Cybersecurity
  2. 10.1 Level 1: Entry Event
127.770.12C
(C) present technical information to a non-technical audience.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
127.770.13A
(A) differentiate types of attacks, including operating systems, software, hardware, network, physical, social engineering, and cryptographic;
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
  4. Advanced Cybersecurity
  5. 3.1 Network Attacks
  6. 3.2 Malware Types and Prevention
  7. 3.3 Common Network Attacks
  8. 3.4 Additional Attacks
  9. 3.6 Internal Threats
  10. 9.2 Assessing Risks
127.770.13B
(B) explain blended threats such as combinations of software, hardware, network, physical, social engineering, and cryptographic;
  1. Advanced Cybersecurity
  2. 3.4 Additional Attacks
  3. 9.2 Assessing Risks
127.770.13C
(C) discuss risk response techniques, including accept, transfer, avoid, and mitigate;
  1. Advanced Cybersecurity
  2. 9.3 Risk Response
127.770.13D
(D) develop a plan of preventative measures to address cyberattacks;
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
  3. Advanced Cybersecurity
  4. 9.3 Risk Response
127.770.13E
(E) describe common web vulnerabilities such as cross-site scripting, buffer overflow, injection, spoofing, and denial of service;
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
  3. Advanced Cybersecurity
  4. 3.5 Cross-site Scripting
  5. 9.2 Assessing Risks
127.770.13F
(F) describe common data destruction and media sanitation practices such as wiping, shredding, and degaussing; and
127.770.13G
(G) develop an incident response plan for a given scenario or recent attack.
  1. Advanced Cybersecurity
  2. 10.3 Level 3: Incident Response
127.770.14A
(A) describe various access control methods such as mandatory access control (MAC), role-based access control (RBAC), and discretionary access control (DAC);
127.770.14B
(B) develop and defend a plan for multi-factor access control using components such as biometric verification systems, key cards, tokens, and passwords; and
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
  3. Advanced Cybersecurity
  4. 6.5 Access Control
127.770.14C
(C) review a disaster recovery plan (DRP) that includes backups, redundancies, system dependencies, and alternate sites.
  1. Advanced Cybersecurity
  2. 10.3 Level 3: Incident Response
127.770.15A
(A) explain commonly used physical security controls, including lock types, fences, barricades, security doors, and mantraps; and
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
127.770.15B
(B) describe the role of embedded systems such as fire suppression; heating, ventilation, and air conditioning (HVAC) systems; security alarms; and video monitoring.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls