Please enable JavaScript to use CodeHS

Texas Foundations of Cybersecurity Standards Mapping

to

Texas Foundations of Cybersecurity

Clear
102 Standards in this Framework 102 Standards Mapped 100% Mapped to Course


Standard Lessons
127.769.1A (A) identify and demonstrate employable work behaviors such as regular attendance, punctuality, maintenance of a professional work environment, and effective written and verbal communication;
  1. 8.1 Project: Security Assessment Report
  2. 11.1 Methodology
  3. 11.2 Support Practice
  4. 12.2 Communication is Key!
  5. 12.3 Building a Knowledge Base
  6. 12.4 Star in a Video!
127.769.1B (B) identify and demonstrate positive personal qualities such as authenticity, resilience, initiative, and a willingness to learn new knowledge and skills;
  1. 11.1 Methodology
  2. 11.2 Support Practice
  3. 12.2 Communication is Key!
  4. 12.3 Building a Knowledge Base
  5. 12.4 Star in a Video!
127.769.1C (C) solve problems and think critically;
  1. 4.3 Basic Crypto Systems: Caesar Cipher
  2. 4.4 Basic Crypto Systems: Cracking Caesar
  3. 4.5 Basic Crypto Systems: Vigenere Cipher
  4. 4.6 Hash Functions
  5. 4.7 Hash Function Development
  6. 7.3 Basic Querying in SQL
  7. 7.5 SQL Injection Overview
  8. 7.6 Types of SQLi and Prevention
  9. 8.1 Project: Security Assessment Report
  10. 11.1 Methodology
  11. 11.2 Support Practice
  12. 12.3 Building a Knowledge Base
  13. 14.5 Cross-site Scripting
  14. 21.2 Programming with Karel
  15. 21.3 Looping
  16. 21.4 Branching
  17. 21.5 Arrays and Objects
  18. 21.6 Organizational Techniques
  19. 21.7 Programming Fundamentals Quiz
127.769.1D (D) demonstrate leadership skills and function effectively as a team member; and
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Security Assessment Report
  4. 11.1 Methodology
  5. 11.2 Support Practice
127.769.1E (E) demonstrate an understanding of ethical and legal responsibilities in relation to the field of cybersecurity.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 2.7 Hacking Ethics
  5. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.2A (A) identify job and internship opportunities as well as accompanying duties and tasks;
  1. 12.2 Communication is Key!
127.769.2B (B) research careers in cybersecurity and information assurance along with the education and job skills required for obtaining a job in both the public and private sectors;
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 7.4 Common Security Problems
  4. 7.6 Types of SQLi and Prevention
  5. 12.2 Communication is Key!
127.769.2C (C) identify and discuss certifications for cybersecurity-related careers; and
  1. 12.2 Communication is Key!
127.769.2D (D) research and develop resumes, digital portfolios, or professional profiles in the cybersecurity field.
  1. 12.1 Building a Resume
  2. 12.3 Building a Knowledge Base
  3. 12.4 Star in a Video!
127.769.3A (A) demonstrate and advocate for ethical and legal behaviors both online and offline among peers, family, community, and employers;
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.8 Digital Citizenship and Cyber Hygiene Quiz
  4. 3.1 Project: Public Service Announcement
127.769.3B (B) research local, state, national, and international cyber law such as the PATRIOT Act of 2001, General Data Protection Regulation, and Digital Millennium Copyright Act;
  1. 2.6 Creative Credit & Copyright
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.3C (C) research historic cases or events regarding cyber;
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
127.769.3D (D) demonstrate an understanding of ethical and legal behavior when presented with various scenarios related to cyber activities;
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.7 Hacking Ethics
  5. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.3E (E) define and identify techniques such as hacking, phishing, social engineering, online piracy, spoofing, and data vandalism; and
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 2.4 Privacy & Security
  5. 2.7 Hacking Ethics
  6. 7.4 Common Security Problems
  7. 7.5 SQL Injection Overview
  8. 14.5 Cross-site Scripting
127.769.3F (F) identify and use appropriate methods for citing sources.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.4A (A) identify motivations for hacking;
  1. 1.2 What is Cybersecurity?
  2. 2.7 Hacking Ethics
  3. 2.8 Digital Citizenship and Cyber Hygiene Quiz
  4. 7.4 Common Security Problems
127.769.4B (B) identify and describe the impact of cyberattacks on the global community, society, and individuals;
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.5 What is Cybersecurity? Quiz
  4. 7.4 Common Security Problems
127.769.4C (C) distinguish between a cyber attacker and a cyber defender;
  1. 2.7 Hacking Ethics
  2. 7.4 Common Security Problems
127.769.4D (D) differentiate types of hackers such as black hats, white hats, and gray hats;
  1. 2.7 Hacking Ethics
127.769.4E (E) determine possible outcomes and legal ramifications of ethical versus malicious hacking practices; and
  1. 2.7 Hacking Ethics
  2. 7.4 Common Security Problems
127.769.4F (F) debate the varying perspectives of ethical versus malicious hacking.
  1. 2.7 Hacking Ethics
127.769.5A (A) define cyberterrorism, state-sponsored cyberterrorism, and hacktivism;
  1. 1.2 What is Cybersecurity?
  2. 14.2 Malware Types and Prevention
127.769.5B (B) compare and contrast physical terrorism and cyberterrorism, including domestic and foreign actors;
  1. 14.2 Malware Types and Prevention
127.769.5C (C) define and explain intelligence gathering and counterterrorism;
  1. 14.2 Malware Types and Prevention
127.769.5D (D) identify the role of cyber defenders in protecting national interests and corporations;
  1. 1.3 Impact of Cybersecurity
  2. 2.7 Hacking Ethics
127.769.5E (E) identify the role of cyber defense in society and the global economy; and
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
127.769.5F (F) explain the importance of protecting public infrastructures such as electrical power grids, water systems, pipelines, transportation, and nuclear plants.
  1. 14.2 Malware Types and Prevention
127.769.6A (A) identify and understand the nature and value of privacy;
  1. 2.4 Privacy & Security
127.769.6B (B) analyze the positive and negative implications of a digital footprint and the maintenance and monitoring of an online presence;
  1. 2.1 Digital Footprint and Reputation
127.769.6C (C) discuss the role and impact of technology on privacy;
  1. 2.4 Privacy & Security
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.6D (D) identify the signs, emotional effects, and legal consequences of cyberbullying and cyberstalking; and
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.6E (E) identify and discuss effective ways to prevent, deter, and report cyberbullying.
  1. 2.2 Cyberbullying
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.7A (A) define information security and cyber defense;
  1. 14.1 Network Attacks
  2. 14.2 Malware Types and Prevention
127.769.7B (B) identify basic risk management and risk assessment principles related to cybersecurity threats and vulnerabilities;
  1. 2.4 Privacy & Security
  2. 6.6 Application Security
  3. 14.1 Network Attacks
127.769.7C (C) explain the fundamental concepts of confidentiality, integrity, availability, authentication, and authorization;
  1. 1.4 The CIA Triad
  2. 1.5 What is Cybersecurity? Quiz
127.769.7D (D) describe the inverse relationship between privacy and security;
  1. 2.4 Privacy & Security
127.769.7E (E) identify and analyze cybersecurity breaches and incident responses;
  1. 7.4 Common Security Problems
  2. 14.2 Malware Types and Prevention
127.769.7F (F) identify and analyze security concerns in areas such as physical, network, cloud, and web;
  1. 7.4 Common Security Problems
  2. 7.5 SQL Injection Overview
  3. 7.6 Types of SQLi and Prevention
127.769.7G (G) define and discuss challenges faced by cybersecurity professionals;
  1. 7.4 Common Security Problems
  2. 11.1 Methodology
  3. 11.2 Support Practice
127.769.7H (H) identify common risks, alerts, and warning signs of compromised computer and network systems;
  1. 7.4 Common Security Problems
127.769.7I (I) understand and explore the vulnerability of network-connected devices; and
  1. 1.2 What is Cybersecurity?
  2. 7.4 Common Security Problems
127.769.7J (J) use appropriate cybersecurity terminology.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.4 The CIA Triad
  4. 7.4 Common Security Problems
127.769.8A (A) define malware, including spyware, ransomware, viruses, and rootkits;
  1. 1.2 What is Cybersecurity?
  2. 1.5 What is Cybersecurity? Quiz
  3. 6.6 Application Security
  4. 7.4 Common Security Problems
127.769.8B (B) identify the transmission and function of malware such as Trojans, worms, and viruses;
  1. 14.2 Malware Types and Prevention
127.769.8C (C) discuss the impact malware has had on the cybersecurity landscape;
  1. 14.2 Malware Types and Prevention
127.769.8D (D) explain the role of reverse engineering for detecting malware and viruses;
  1. 14.2 Malware Types and Prevention
127.769.8E (E) compare free and commercial antivirus software alternatives; and
  1. 6.6 Application Security
127.769.8F (F) compare free and commercial anti-malware software alternatives.
  1. 6.6 Application Security
127.769.9A (A) define system hardening;
  1. 6.8 System Administration
127.769.9B (B) demonstrate basic use of system administration privileges;
  1. 6.8 System Administration
127.769.9C (C) explain the importance of patching operating systems;
  1. 6.4 Software and Applications
  2. 6.6 Application Security
  3. 6.7 Browser Configuration
127.769.9D (D) explain the importance of software updates;
  1. 2.4 Privacy & Security
  2. 6.4 Software and Applications
  3. 6.6 Application Security
  4. 6.7 Browser Configuration
127.769.9E (E) describe standard practices to configure system services;
  1. 6.8 System Administration
127.769.9F (F) explain the importance of backup files; and
  1. 6.4 Software and Applications
  2. 6.6 Application Security
  3. 6.7 Browser Configuration
127.769.9G (G) research and understand standard practices for securing computers, networks, and operating systems.
  1. 6.6 Application Security
  2. 6.8 System Administration
  3. 7.6 Types of SQLi and Prevention
  4. 10.4 Storage Options
  5. 10.6 Network Communication
127.769.10A (A) identify basic network addressing and devices, including switches and routers;
  1. 9.1 Introduction to the Internet
  2. 9.4 Internet Hardware and Sending Information
  3. 10.3 Network Devices
  4. 10.8 IT Infrastructure Quiz
127.769.10B (B) analyze incoming and outgoing rules for traffic passing through a firewall;
  1. 10.6 Network Communication
127.769.10C (C) identify well known ports by number and service provided, including port 22 (ssh), port 80 (http), and port 443 (https);
  1. 10.6 Network Communication
  2. 10.8 IT Infrastructure Quiz
127.769.10D (D) identify commonly exploited ports and services, including ports 20 and 21 (ftp) and port 23 (telnet); and
  1. 10.6 Network Communication
  2. 10.8 IT Infrastructure Quiz
127.769.10E (E) identify common tools for monitoring ports and network traffic.
  1. 10.6 Network Communication
127.769.11A (A) define what constitutes a secure password;
  1. 2.4 Privacy & Security
  2. 2.8 Digital Citizenship and Cyber Hygiene Quiz
127.769.11B (B) create a secure password policy, including length, complexity, account lockout, and rotation;
  1. 2.4 Privacy & Security
127.769.11C (C) identify methods of password cracking such as brute force and dictionary attacks; and
  1. 2.4 Privacy & Security
127.769.11D (D) examine and configure security options to allow and restrict access based on user roles.
  1. 6.8 System Administration
127.769.12A (A) identify the different types of user accounts and groups on an operating system;
  1. 6.8 System Administration
127.769.12B (B) explain the fundamental concepts and standard practices related to access control, including authentication, authorization, and accounting;
  1. 6.8 System Administration
127.769.12C (C) compare methods for single- and dual-factor authentication such as passwords, biometrics, personal identification numbers (PINs), and security tokens;
  1. 9.10 Access Control
127.769.12D (D) define and explain the purpose of an air-gapped computer; and
  1. 14.6 Internal Threats
127.769.12E (E) explain how hashes and checksums may be used to validate the integrity of transferred data.
  1. 4.6 Hash Functions
127.769.13A (A) explain the importance of digital forensics to law enforcement, government agencies, and corporations;
  1. 1.3 Impact of Cybersecurity
  2. 13.1 Digital Forensics
127.769.13B (B) identify the role of chain of custody in digital forensics;
  1. 13.1 Digital Forensics
127.769.13C (C) explain the four steps of the forensics process, including collection, examination, analysis, and reporting;
  1. 13.1 Digital Forensics
127.769.13D (D) identify when a digital forensics investigation is necessary;
  1. 13.1 Digital Forensics
127.769.13E (E) identify information that can be recovered from digital forensics investigations such as metadata and event logs; and
  1. 13.1 Digital Forensics
127.769.13F (F) analyze the purpose of event logs and identify suspicious activity.
  1. 10.7 Network Management
  2. 13.1 Digital Forensics
127.769.14A (A) explain the purpose of cryptography and encrypting data;
  1. 4.1 Cryptography, Cryptology, Cryptanalysis
  2. 4.9 The ABCs of Cryptography Quiz
127.769.14B (B) research historical uses of cryptography; and
  1. 4.2 History of Cryptography
127.769.14C (C) review simple cryptography methods such as shift cipher and substitution cipher.
  1. 4.3 Basic Crypto Systems: Caesar Cipher
  2. 4.4 Basic Crypto Systems: Cracking Caesar
  3. 4.5 Basic Crypto Systems: Vigenere Cipher
  4. 4.9 The ABCs of Cryptography Quiz
127.769.15A (A) define and describe vulnerability, payload, exploit, port scanning, and packet sniffing as they relate to hacking;
  1. 14.5 Cross-site Scripting
  2. 16.1 Identifying Risks
  3. 16.2 Assessing Risks
  4. 16.4 Penetration Testing
127.769.15B (B) define and describe cyberattacks, including man-in-the-middle, distributed denial of service, and spoofing;
  1. 4.8 Digital Certificates
  2. 14.3 Common Network Attacks
  3. 14.4 Additional Attacks
127.769.15C (C) explain how computer vulnerabilities leave systems open to cyberattacks;
  1. 16.1 Identifying Risks
  2. 16.2 Assessing Risks
127.769.15D (D) identify threats to systems such as back-door attacks and insider threats;
  1. 14.6 Internal Threats
127.769.15E (E) differentiate types of social engineering attacks such as phishing, shoulder surfing, hoaxes, and dumpster diving;
  1. 14.3 Common Network Attacks
  2. 14.4 Additional Attacks
127.769.15F (F) explain how users are the most common vehicle for compromising a system at the application level; and
  1. 14.6 Internal Threats
127.769.15G (G) identify various types of application-specific attacks.
  1. 6.6 Application Security
  2. 7.5 SQL Injection Overview
  3. 7.6 Types of SQLi and Prevention
127.769.16A (A) identify internal and external threats to computer systems;
  1. 14.3 Common Network Attacks
  2. 14.6 Internal Threats
127.769.16B (B) identify the capabilities of vulnerability assessment tools, including open source tools; and
  1. 16.1 Identifying Risks
  2. 16.2 Assessing Risks
127.769.16C (C) explain the concept of penetration testing, tools, and techniques.
  1. 16.4 Penetration Testing
127.769.17A (A) compare risks associated with connecting devices to public and private wireless networks;
  1. 16.2 Assessing Risks
127.769.17B (B) explain device vulnerabilities and security solutions on a wireless network;
  1. 10.6 Network Communication
  2. 10.7 Network Management
  3. 16.2 Assessing Risks
127.769.17C (C) compare wireless encryption protocols;
  1. 10.5 Network Options
127.769.17D (D) debate the broadcasting or hiding of a wireless service set identifier (SSID); and
  1. 10.5 Network Options
127.769.17E (E) research and discuss wireless threats such as MAC spoofing and war driving.
  1. 14.6 Internal Threats
127.769.18A (A) define application security;
  1. 6.6 Application Security
127.769.18B (B) identify methods of application security such as secure development practices;
  1. 6.6 Application Security
  2. 7.6 Types of SQLi and Prevention
127.769.18C (C) discuss methods of online spoofing such as web links in email, instant messaging, social media, and other online communication with malicious links;
  1. 1.3 Impact of Cybersecurity
  2. 14.3 Common Network Attacks
127.769.18D (D) explain the purpose and function of vulnerability scanners;
  1. 16.2 Assessing Risks
127.769.18E (E) explain how coding errors may create system vulnerabilities; and
  1. 7.5 SQL Injection Overview
  2. 7.6 Types of SQLi and Prevention
  3. 16.2 Assessing Risks
127.769.18F (F) analyze the risks of distributing insecure programs.
  1. 16.2 Assessing Risks
127.769.19A (A) describe the impact of granting applications unnecessary permissions;
  1. 16.2 Assessing Risks
127.769.19B (B) describe the risks of granting third parties access to personal and proprietary data on social media and systems; and
  1. 6.7 Browser Configuration
127.769.19C (C) describe the risks involved with accepting Terms of Service (ToS) or End User License Agreements (EULA) without a basic understanding of the terms or agreements.
  1. 6.5 Software Licenses