Please enable JavaScript to use CodeHS

Utah 11-12 Standards Mapping


Fundamentals of Cybersecurity

10 Standards in this Framework 5 Standards Mapped 50% Mapped to Course

Standard Lessons
11/12.NI.1 Identify types of security threats, and then compare and contrast measures that can be used to address, resolve, and/or prevent identified threats.
  1. 7.6 Application Security
  2. 7.8 System Administration
11/12.NI.2 Compare and contrast cryptographic techniques to model the secure transmission of information (data).
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
11/12.DA.1 Refine or create computational artifacts to better represent the relationships among different elements of data collected from factual sources or other processes.
11/12.AP.1 Iteratively design and develop computational artifacts for practical, personal, or societal expression that implements an algorithm based on the result of an evaluation or user input.
11/12.AP.2 Systematically design and create programs for broad audiences by incorporating feedback from users.
11/12.AP.3 Design and develop computational artifacts working in team roles using collaborative tools.
  1. 3.1 Project: Public Service Announcement
11/12.AP.4 Produce documentation to support the decisions made during the design and creation process using text, graphics, presentations, and/or demonstrations in the development of complex programs.
11/12.IC.1 Evaluate and discuss the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 10.10 Impact of the Internet
11/12.IC.2 Identify impacts of bias and equity deficits on design and implementation of computational artifacts, while evaluating appropriate processes for identifying issues of bias.
11/12.IC.3 Demonstrate computational thinking using algorithms to problem solving across multiple disciplines.
  1. 21.1 Challenge Problems