Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Foundations of Cybersecurity (NEW)

107

Standards in this Framework

107

Standards Mapped

100%

Mapped to Course

Standard Lessons
127.792.d.1.a
identify and demonstrate employable work behaviors such as regular attendance, punctuality, maintenance of a professional work environment, and effective written and verbal communication
  1. 11.2 Communication is Key!
  2. 11.3 Building a Knowledge Base
  3. 11.4 Star in a Video!
127.792.d.1.b
identify and demonstrate positive personal qualities such as authenticity, resilience, initiative, and a willingness to learn new knowledge and skills
  1. 11.2 Communication is Key!
127.792.d.1.c
solve problems and think critically
  1. 10.1 Methodology
  2. 10.2 Support Practice
  3. 11.2 Communication is Key!
  4. 11.3 Building a Knowledge Base
  5. 11.4 Star in a Video!
127.792.d.1.d
demonstrate leadership skills and function effectively as a team member
  1. 11.3 Building a Knowledge Base
  2. 11.4 Star in a Video!
  3. 14.1 Level 1: Entry Event
  4. 14.2 Level 2: User Training
  5. 14.3 Level 3: Incident Response
127.792.d.1.e
demonstrate an understanding of ethical and legal responsibilities and ramifications in relation to the field of cybersecurity
  1. 2.4 Privacy & Security
  2. 2.6 Creative Credit & Copyright
  3. 2.7 Hacking Ethics
  4. 6.5 Software Licenses
  5. 6.9 Command Line Interface
127.792.d.2.a
identify job and internship opportunities and accompanying job duties and tasks
  1. 11.2 Communication is Key!
  2. 11.3 Building a Knowledge Base
  3. 11.4 Star in a Video!
  4. 14.1 Level 1: Entry Event
127.792.d.2.b
research careers in cybersecurity and information security and develop professional profiles that match education and job skills required for obtaining a job in both the public and private sectors
  1. 11.1 Building a Resume
  2. 11.2 Communication is Key!
127.792.d.2.c
identify and discuss certifications for cybersecurity-related careers
  1. 11.2 Communication is Key!
127.792.d.2.d
explain the different types of services and roles found within a cybersecurity functional area such as a security operations center (SOC)
  1. 1.3 Impact of Cybersecurity
  2. 7.1 Clients and Servers
  3. 7.4 Common Security Problems
  4. 11.2 Communication is Key!
127.792.d.3.a
demonstrate and advocate for ethical and legal behaviors both online and offline among peers, family, community, and employers
  1. 2.2 Cyberbullying
  2. 2.7 Hacking Ethics
  3. 7.6 Types of SQLi and Prevention
  4. 15.4 Penetration Testing
127.792.d.3.b
investigate and analyze local, state, national, and international cybersecurity laws such as the USA PATRIOT Act of 2001, General Data Protection Regulation, Digital Millennium Copyright Act, Computer Fraud and Abuse Act, and Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  1. 2.7 Hacking Ethics
127.792.d.3.c
investigate and analyze noteworthy incidents or events regarding cybersecurity
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
127.792.d.3.d
communicate an understanding of ethical and legal behavior when presented with various scenarios related to cybersecurity activities
  1. 2.7 Hacking Ethics
  2. 7.6 Types of SQLi and Prevention
  3. 15.4 Penetration Testing
127.792.d.3.e
define and identify tactics used in an incident such as social engineering, malware, denial of service, spoofing, and data vandalism
  1. 9.5 Network Options
  2. 9.8 Private Networks
  3. 13.3 Common Network Attacks
  4. 13.4 Additional Attacks
  5. 14.2 Level 2: User Training
127.792.d.3.f
identify and use appropriate methods for citing sources
  1. 2.6 Creative Credit & Copyright
127.792.d.4.a
identify motivations and perspectives for hacking
  1. 2.7 Hacking Ethics
127.792.d.4.b
distinguish between types of threat actors such as hacktivists, criminals, state-sponsored actors, and foreign governments
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.7 Hacking Ethics
  4. 13.2 Malware Types and Prevention
127.792.d.4.c
identify and describe the impact of cyberattacks on the global community, society, and individuals
  1. 1.3 Impact of Cybersecurity
  2. 13.2 Malware Types and Prevention
127.792.d.4.d
differentiate between industry terminology for types of hackers such as black hats, white hats, and gray hats
  1. 2.7 Hacking Ethics
127.792.d.4.e
determine and describe possible outcomes and legal ramifications of ethical versus malicious hacking practices
  1. 2.7 Hacking Ethics
  2. 7.6 Types of SQLi and Prevention
  3. 15.4 Penetration Testing
127.792.d.5.a
define cyberterrorism, state-sponsored cyberterrorism, and hacktivism
  1. 2.7 Hacking Ethics
  2. 13.2 Malware Types and Prevention
127.792.d.5.b
compare and contrast physical terrorism and cyberterrorism, including domestic and foreign actors
  1. 2.7 Hacking Ethics
  2. 13.2 Malware Types and Prevention
127.792.d.5.c
define and explain intelligence gathering
  1. 1.3 Impact of Cybersecurity
  2. 13.2 Malware Types and Prevention
127.792.d.5.d
explain the role of cyber defense in protecting national interests and corporations
  1. 1.3 Impact of Cybersecurity
  2. 13.2 Malware Types and Prevention
  3. 15.4 Penetration Testing
127.792.d.5.e
explain the role of cyber defense in society and the global economy
  1. 1.3 Impact of Cybersecurity
  2. 13.2 Malware Types and Prevention
127.792.d.5.f
explain the importance of protecting public infrastructures such as electrical power grids, water systems, pipelines, transportation, and power generation facilities from cyberterrorism
  1. 1.3 Impact of Cybersecurity
  2. 13.2 Malware Types and Prevention
127.792.d.6.a
identify and understand the nature and value of privacy
  1. 2.4 Privacy & Security
127.792.d.6.b
analyze the positive and negative implications of a digital footprint and the maintenance and monitoring of an online presence
  1. 1.2 What is Cybersecurity?
  2. 2.1 Digital Footprint and Reputation
  3. 2.4 Privacy & Security
127.792.d.6.c
discuss the role and impact of technology on privacy
  1. 1.2 What is Cybersecurity?
  2. 2.4 Privacy & Security
127.792.d.6.d
identify the signs, emotional effects, and legal consequences of cyberbullying and cyberstalking
  1. 2.2 Cyberbullying
127.792.d.6.e
identify and discuss effective ways to deter and report cyberbullying
  1. 2.2 Cyberbullying
127.792.d.7.a
define personally identifiable information (PII)
  1. 2.3 Internet Safety
  2. 7.5 SQL Injection Overview
  3. 14.4 Level 4: Data and Licenses
127.792.d.7.b
evaluate the risks and benefits of sharing PII
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
127.792.d.7.c
describe the impact of granting applications unnecessary permissions such as mobile devices accessing camera and contacts
  1. 2.4 Privacy & Security
127.792.d.7.d
describe the risks of granting third parties access to personal and proprietary data on social media and systems
  1. 2.4 Privacy & Security
  2. 6.5 Software Licenses
127.792.d.7.e
describe the risks involved with accepting Terms of Service (ToS) or End User License Agreements (EULA) without a basic understanding of the terms or agreements
  1. 2.4 Privacy & Security
  2. 14.4 Level 4: Data and Licenses
127.792.d.8.a
define cybersecurity and information security
  1. 1.1 Module Overview - Cybersecurity
  2. 1.2 What is Cybersecurity?
  3. 13.2 Malware Types and Prevention
  4. 14.4 Level 4: Data and Licenses
127.792.d.8.b
identify basic risk management and risk assessment principles related to cybersecurity threats and vulnerabilities, including the Zero Trust model
  1. 15.1 Identifying Risks
  2. 15.2 Assessing Risks
  3. 15.3 Risk Response
127.792.d.8.c
explain the fundamental concepts of confidentiality, integrity, and availability (CIA triad)
  1. 1.4 The CIA Triad
127.792.d.8.d
describe the trade-offs between convenience and security
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
127.792.d.8.e
identify and analyze cybersecurity breaches and incident responses
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 14.3 Level 3: Incident Response
  4. 14.4 Level 4: Data and Licenses
127.792.d.8.f
identify and analyze security challenges in domains such as physical, network, cloud, and web
  1. 13.2 Malware Types and Prevention
  2. 13.4 Additional Attacks
  3. 13.6 Internal Threats
  4. 14.1 Level 1: Entry Event
  5. 14.3 Level 3: Incident Response
  6. 14.4 Level 4: Data and Licenses
  7. 15.2 Assessing Risks
127.792.d.8.g
define and discuss challenges faced by cybersecurity professionals such as internal and external threats
  1. 13.1 Network Attacks
  2. 13.2 Malware Types and Prevention
  3. 13.4 Additional Attacks
  4. 13.6 Internal Threats
  5. 15.2 Assessing Risks
127.792.d.8.h
identify indicators of compromise such as common risks, warning signs, and alerts of compromised systems
  1. 4.8 Digital Certificates
  2. 15.2 Assessing Risks
127.792.d.8.i
explore and discuss the vulnerabilities of network-connected devices such as Internet of Things (IoT)
  1. 1.2 What is Cybersecurity?
127.792.d.8.j
use appropriate cybersecurity terminology
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
127.792.d.8.k
explain the concept of penetration testing, including tools and techniques
  1. 15.4 Penetration Testing
127.792.d.8.l
explore and identify common industry frameworks such as MITRE ATT&CK, MITRE Engage , and Cyber Kill Chain, and the Diamond Model
  1. 15.1 Identifying Risks
127.792.d.9.a
define malware, including spyware, ransomware, viruses, and rootkits
  1. 6.6 Application Security
  2. 13.2 Malware Types and Prevention
  3. 13.3 Common Network Attacks
127.792.d.9.b
identify the transmission and function of malware such as trojan horses, worms, and viruses
  1. 6.6 Application Security
  2. 13.2 Malware Types and Prevention
127.792.d.9.c
discuss the impact of malware and the model of "as a service"
  1. 13.1 Network Attacks
127.792.d.9.d
explain the role of reverse engineering for the detection of malware and viruses
  1. 13.2 Malware Types and Prevention
127.792.d.9.e
describe free and commercial antivirus and anti-malware software also known as Endpoint Detection and Response software
  1. 6.6 Application Security
  2. 13.2 Malware Types and Prevention
127.792.d.10.a
define system hardening
  1. 6.6 Application Security
  2. 6.8 System Administration
127.792.d.10.b
use basic system administration privileges
  1. 6.8 System Administration
127.792.d.10.c
explain the importance of patching operating systems
  1. 6.6 Application Security
  2. 6.8 System Administration
127.792.d.10.d
explain the importance of software updates
  1. 6.6 Application Security
  2. 6.8 System Administration
127.792.d.10.e
describe standard practices to configure system services
  1. 6.8 System Administration
127.792.d.10.f
explain the importance of backup files
  1. 6.6 Application Security
127.792.d.10.g
research and explain standard practices for securing computers, networks, and operating systems, including the concept of least privilege
  1. 6.6 Application Security
  2. 6.7 Browser Configuration
  3. 6.8 System Administration
  4. 8.11 Access Control
127.792.d.10.h
identify vulnerabilities caused by a lack of cybersecurity awareness and training such as weaknesses posed by individuals within an organization
  1. 13.3 Common Network Attacks
  2. 13.6 Internal Threats
  3. 14.2 Level 2: User Training
  4. 15.2 Assessing Risks
127.792.d.11.a
identify basic network devices, including routers and switches
  1. 9.3 Network Devices
127.792.d.11.b
define network addressing
  1. 8.5 Internet Addresses
127.792.d.11.c
analyze incoming and outgoing rules for traffic passing through a firewall
  1. 9.6 Network Communication
127.792.d.11.d
identify well known ports by number and service provided, including port 22 (Secure Shell Protocol/ssh), port 80 (Hypertext Transfer Protocol/http), and port 443 (Hypertext Transfer Protocol Secure/https)
  1. 8.8 Packets & Protocols
  2. 8.9 Protocols and Standards
127.792.d.11.e
identify commonly exploited ports and services, including ports 20 and 21 (File Transfer Protocol/ftp), port 23 (telnet protocol), and port 3389 (Remote Desktop Protocol/rdp)
  1. 8.9 Protocols and Standards
  2. 9.6 Network Communication
  3. 13.1 Network Attacks
127.792.d.11.f
identify common tools for monitoring ports and network traffic
  1. 9.6 Network Communication
  2. 13.1 Network Attacks
127.792.d.12.a
define what constitutes a secure password
  1. 2.4 Privacy & Security
127.792.d.12.b
create a secure password policy, including length, complexity, account lockout, and rotation
  1. 2.4 Privacy & Security
  2. 13.6 Internal Threats
  3. 14.2 Level 2: User Training
127.792.d.12.c
identify methods of password cracking such as brute force and dictionary attacks
  1. 2.4 Privacy & Security
127.792.d.12.d
examine and configure security options to allow and restrict access based on user roles
  1. 6.8 System Administration
127.792.d.13.a
identify different types of user accounts and groups on an operating system
  1. 6.8 System Administration
127.792.d.13.b
explain the fundamental concepts and standard practices related to access control, including authentication, authorization, and auditing
  1. 8.11 Access Control
127.792.d.13.c
compare methods for single- and multi-factor authentication such as passwords, biometrics, personal identification numbers (PINs), secure tokens, and other passwordless authentication methods
  1. 8.11 Access Control
127.792.d.13.d
define and explain the purpose and benefits of an air-gapped computer
  1. 13.6 Internal Threats
127.792.d.13.e
explain how hashes and checksums may be used to validate the integrity of transferred data
  1. 4.6 Hash Functions
127.792.d.14.a
explain the importance of digital forensics to organizations, private citizens, and the public sector
  1. 12.1 Digital Forensics
  2. 12.2 Forensic Case 1: Logs
  3. 12.3 Forensic Case 2: File Metadata
  4. 12.4 Forensic Case 3: Exif Data
127.792.d.14.b
identify the role of chain of custody in digital forensics;
  1. 12.1 Digital Forensics
  2. 12.4 Forensic Case 3: Exif Data
127.792.d.14.c
explain the four steps of the forensics process, including collection, examination, analysis, and reporting
  1. 12.1 Digital Forensics
  2. 12.2 Forensic Case 1: Logs
  3. 12.3 Forensic Case 2: File Metadata
  4. 12.4 Forensic Case 3: Exif Data
127.792.d.14.d
identify when a digital forensics investigation is necessary
  1. 12.1 Digital Forensics
127.792.d.14.e
identify information that can be recovered from digital forensics investigations such as metadata and event logs
  1. 12.1 Digital Forensics
  2. 12.2 Forensic Case 1: Logs
  3. 12.3 Forensic Case 2: File Metadata
  4. 12.4 Forensic Case 3: Exif Data
127.792.d.14.f
analyze the purpose of event logs and identify suspicious activity
  1. 12.1 Digital Forensics
  2. 12.2 Forensic Case 1: Logs
127.792.d.15.a
explain the purpose of cryptography and encrypting data;
  1. 4.1 Cryptography, Cryptology, Cryptanalysis
  2. 4.2 History of Cryptography
127.792.d.15.b
research historical uses of cryptography
  1. 4.2 History of Cryptography
127.792.d.15.c
review and explain simple cryptography methods such as shift cipher and substitution cipher
  1. 4.3 Basic Crypto Systems: Caesar Cipher
  2. 4.5 Basic Crypto Systems: Vigenere Cipher
127.792.d.15.d
define and explain public key encryption
  1. 4.8 Digital Certificates
127.792.d.15.e
compare and contrast symmetric and asymmetric encryption
  1. 4.8 Digital Certificates
127.792.d.16.a
explain how computer vulnerabilities leave systems open to cyberattacks
  1. 13.1 Network Attacks
  2. 15.2 Assessing Risks
127.792.d.16.b
explain how users are the most common vehicle for compromising a system at the application level
  1. 13.6 Internal Threats
  2. 14.2 Level 2: User Training
127.792.d.16.c
define and describe vulnerability, payload, exploit, port scanning, and packet sniffing
  1. 13.1 Network Attacks
  2. 15.1 Identifying Risks
  3. 15.2 Assessing Risks
  4. 15.3 Risk Response
127.792.d.16.d
identify internal threats to systems such as logic bombs and insider threats
  1. 13.6 Internal Threats
127.792.d.16.e
define and describe cyberattacks, including man-in-the-middle, distributed denial of service, spoofing, and back-door attacks
  1. 4.8 Digital Certificates
  2. 13.2 Malware Types and Prevention
  3. 13.3 Common Network Attacks
  4. 13.4 Additional Attacks
127.792.d.16.f
differentiate types of social engineering techniques such as phishing; web links in email, instant messaging, social media, and other online communication with malicious links; shoulder surfing; and dumpster diving
  1. 1.3 Impact of Cybersecurity
  2. 13.3 Common Network Attacks
  3. 14.2 Level 2: User Training
127.792.d.16.g
identify various types of application-specific attacks such as cross-site scripting and injection attacks
  1. 7.5 SQL Injection Overview
  2. 13.5 Cross-site Scripting
127.792.d.17.a
compare vulnerabilities associated with connecting devices to public and private networks
  1. 9.8 Private Networks
127.792.d.17.b
explain device vulnerabilities and security solutions on networks such as supply chain security and counterfeit products
  1. 13.1 Network Attacks
  2. 13.2 Malware Types and Prevention
127.792.d.17.c
compare and contrast protocols such as HTTP versus HTTPS
  1. 8.8 Packets & Protocols
  2. 8.9 Protocols and Standards
127.792.d.17.d
debate the broadcasting or hiding of a wireless service set identifier (SSID)
  1. 9.5 Network Options
127.792.d.17.e
research and discuss threats such as mandatory access control (MAC) spoofing and packet sniffing
  1. 13.1 Network Attacks
  2. 15.1 Identifying Risks
127.792.d.18.a
define application security
  1. 6.6 Application Security
127.792.d.18.b
identify methods of application security such as secure development policies and practices
  1. 6.6 Application Security
127.792.d.18.c
explain the purpose and function of vulnerability scanners
  1. 15.1 Identifying Risks
  2. 15.4 Penetration Testing
127.792.d.18.d
explain how coding errors may create system vulnerabilities such as buffer overflows and lack of input validation
  1. 7.5 SQL Injection Overview
  2. 15.2 Assessing Risks
127.792.d.18.e
analyze the risks of distributing insecure programs
  1. 15.2 Assessing Risks
127.792.d.19.a
define commonly used risk assessment terms, including risk, asset, and inventory
  1. 15.3 Risk Response
127.792.d.19.b
identify risk management strategies, including acceptance, avoidance, transference, and mitigation
  1. 15.3 Risk Response
127.792.d.19.c
compare and contrast risks based on an industry accepted rubric or metric such as Risk Assessment Matrix
  1. 15.3 Risk Response