Please enable JavaScript to use CodeHS

Virginia Cybersecurity Fundamentals Standards Mapping

to

Advanced Cybersecurity

109 Standards in this Framework 79 Standards Mapped 72% Mapped to Course


Standard Lessons
1 Demonstrate creativity and innovation.
  1. 2.1 Project: Steganography
2 Demonstrate critical thinking and problem solving.
  1. 1.3 Advanced Cryptography
  2. 1.5 Hash Function Development
  3. 2.1 Project: Steganography
  4. 4.2 Building a Knowledge Base
  5. 6.1 Project Security Assessment Report
3 Demonstrate initiative and self-direction.
  1. 1.5 Hash Function Development
  2. 4.1 Communication is Key!
  3. 4.2 Building a Knowledge Base
  4. 4.3 Star in a Video!
4 Demonstrate integrity.
  1. 4.1 Communication is Key!
  2. 6.1 Project Security Assessment Report
5 Demonstrate work ethic.
  1. 4.2 Building a Knowledge Base
  2. 4.3 Star in a Video!
6 Demonstrate conflict-resolution skills.
  1. 4.1 Communication is Key!
7 Demonstrate listening and speaking skills.
  1. 4.1 Communication is Key!
8 Demonstrate respect for diversity.
  1. 4.1 Communication is Key!
9 Demonstrate customer service skills.
  1. 4.1 Communication is Key!
10 Collaborate with team members.
  1. 9.1 The Game of Risk
11 Demonstrate big-picture thinking.
  1. 6.1 Project Security Assessment Report
12 Demonstrate career- and life-management skills.
  1. 4.1 Communication is Key!
13 Demonstrate continuous learning and adaptability.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
14 Manage time and resources.
  1. 4.2 Building a Knowledge Base
  2. 4.3 Star in a Video!
15 Demonstrate information-literacy skills.
  1. 4.2 Building a Knowledge Base
  2. 4.3 Star in a Video!
16 Demonstrate an understanding of information security.
  1. 7.4 Level 4: Data and Licenses
17 Maintain working knowledge of current information-technology (IT) systems.
  1. 3.3 Protocols and Standards
  2. 3.4 Private Networks
  3. 4.2 Building a Knowledge Base
  4. 5.5 Cross-site Scripting
  5. 8.2 Assessing Risks
18 Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
19 Apply mathematical skills to job-specific tasks.
  1. 1.3 Advanced Cryptography
  2. 1.4 Hash Functions
  3. 1.5 Hash Function Development
  4. 1.6 Asymmetric Encryption
  5. 8.3 Risk Response
20 Demonstrate professionalism.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
21 Demonstrate reading and writing skills.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
22 Demonstrate workplace safety.
  1. 3.2 Environmental Controls
23 Examine aspects of planning within an industry/organization.
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
24 Examine aspects of management within an industry/organization.
  1. 7.2 Level 2: User Training
  2. 7.3 Level 3: Incident Response
25 Examine aspects of financial responsibility within an industry/organization.
  1. 7.4 Level 4: Data and Licenses
  2. 8.3 Risk Response
26 Examine technical and production skills required of workers within an industry/organization.
  1. 4.2 Building a Knowledge Base
  2. 4.3 Star in a Video!
27 Examine principles of technology that underlie an industry/organization.
  1. 4.1 Communication is Key!
  2. 7.2 Level 2: User Training
28 Examine labor issues related to an industry/organization.
  1. 7.2 Level 2: User Training
29 Examine community issues related to an industry/organization.
  1. 7.4 Level 4: Data and Licenses
30 Examine health, safety, and environmental issues related to an industry/organization.
  1. 3.2 Environmental Controls
31 Identify the purposes and goals of the student organization.
32 Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
33 Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
34 Identify Internet safety issues and procedures for complying with acceptable use standards.
  1. 7.4 Level 4: Data and Licenses
35 Identify the types of work-based learning (WBL) opportunities.
36 Reflect on lessons learned during the WBL experience.
37 Explore career opportunities related to the WBL experience.
38 Participate in a WBL experience, when appropriate.
39 Describe Cybersecurity
  1. 1.1 Welcome to Advanced Cybersecurity!
40 Define information assurance
  1. 3.6 Access Control
41 Describe the critical factors of information security
  1. 5.1 Network Attacks
  2. 5.2 Malware Types and Prevention
42 Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration
  1. 3.1 Advanced Devices
43 Define risk
  1. 8.1 Identifying Risks
44 Identify the concepts of cybersecurity risk management
  1. 8.1 Identifying Risks
45 Describe cybersecurity threats to an organization
  1. 8.2 Assessing Risks
46 Explain why organizations need to manage risk
  1. 8.1 Identifying Risks
47 Discuss national or industry standards/regulations that relate to cybersecurity
  1. 8.3 Risk Response
48 Describe the cyberattack surface of various organizations
  1. 8.3 Risk Response
49 Analyze risks affecting critical infrastructure
  1. 8.2 Assessing Risks
  2. 8.3 Risk Response
50 Describe a network
  1. 3.4 Private Networks
51 Describe a wired/cabled network
  1. 3.1 Advanced Devices
52 Describe a wireless network
  1. 3.1 Advanced Devices
  2. 3.3 Protocols and Standards
  3. 3.5 Mobile Devices
53 Compare cabled/wired and wireless networks
  1. 3.1 Advanced Devices
54 Compare networking conceptual models
  1. 3.4 Private Networks
55 Discuss services, their relationship to the OSI model, and potential vulnerabilities
  1. 8.2 Assessing Risks
56 Differentiate among network types
  1. 3.4 Private Networks
57 Examine the concept of the Internet as a network of connected systems
58 Identify networking protocols
  1. 3.3 Protocols and Standards
59 Describe the difference between a cyber threat and a vulnerability
  1. 8.1 Identifying Risks
60 Describe types of cyber threats
  1. 5.1 Network Attacks
  2. 5.5 Cross-site Scripting
  3. 5.6 Internal Threats
61 Analyze types of current cyber threats
  1. 5.5 Cross-site Scripting
  2. 6.1 Project Security Assessment Report
62 Identify the perpetrators of different types of malicious hacking
  1. 3.2 Environmental Controls
  2. 5.6 Internal Threats
63 Describe the characteristics of vulnerabilities
  1. 8.1 Identifying Risks
  2. 8.2 Assessing Risks
64 Identify the prevention of and protection against cyber threats
  1. 5.5 Cross-site Scripting
  2. 8.3 Risk Response
  3. 8.4 Penetration Testing
65 Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks
  1. 3.5 Mobile Devices
66 Differentiate between ethics and laws
67 Distinguish among types of ethical concerns
68 Define cyberbullying
69 Identify actions that constitute cyberbullying
70 Identify possible warning signs of someone being cyberbullied
71 Identify laws applicable to cybersecurity
72 Explain the concept of “personally identifiable information”
  1. 7.4 Level 4: Data and Licenses
73 Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it
  1. 7.4 Level 4: Data and Licenses
74 Identify ways to control and protect personal data
  1. 7.4 Level 4: Data and Licenses
75 Demonstrate net etiquette (netiquette) as it relates to cybersecurity
  1. 4.1 Communication is Key!
  2. 4.2 Building a Knowledge Base
  3. 4.3 Star in a Video!
76 Analyze the social and legal significance of the ongoing collection of personal digital information
77 Distinguish between data, information, and knowledge
78 Identify the most common ways data is collected
79 Identify the most common ways data can be stored
80 Explain the difference between data at rest, data in transit, and data being processed
  1. 7.4 Level 4: Data and Licenses
81 Identify the most common ways data is used
82 Discuss how data can be compromised, corrupted, or lost
  1. 5.5 Cross-site Scripting
  2. 7.4 Level 4: Data and Licenses
83 Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)
  1. 5.5 Cross-site Scripting
  2. 7.4 Level 4: Data and Licenses
  3. 8.2 Assessing Risks
84 Define the function of a computer operating system
85 Identify the components of an operating system
86 List types of operating systems
87 Evaluate the potential vulnerabilities, threats, and common exploits to an operating system
  1. 8.2 Assessing Risks
88 Identify best practices for protecting operating systems
  1. 8.2 Assessing Risks
89 Describe the concept of malware and techniques to guard against it
  1. 5.2 Malware Types and Prevention
90 Evaluate critical operating system security parameters
91 Describe security and auditing logs
92 Describe the role of a system backup
  1. 7.4 Level 4: Data and Licenses
93 Define virtualization technology
94 Identify advantages and disadvantages of using virtual machines
95 Define programming in the context of cybersecurity
  1. 1.5 Hash Function Development
  2. 8.2 Assessing Risks
96 Differentiate between computer programming languages
97 Evaluate common programming flaws that lead to vulnerabilities
  1. 8.2 Assessing Risks
98 Identify best practices in secure coding and design
  1. 8.2 Assessing Risks
99 Identify ubiquitous computing
100 Discuss security and privacy implications of ubiquitous computing
101 Research career opportunities for cybersecurity professionals
  1. 4.1 Communication is Key!
102 Identify the educational pathways for emerging cybersecurity professionals
  1. 4.1 Communication is Key!
103 Identify the educational pathways for emerging cybersecurity professionals
  1. 4.1 Communication is Key!
104 Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters
  1. 4.1 Communication is Key!
105 Research the cyber threats and security measures related to career pathways
  1. 4.1 Communication is Key!
106 Identify testing skills/strategies for a certification examination
  1. 4.1 Communication is Key!
107 Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course
  1. 4.1 Communication is Key!
108 Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams)
  1. 4.1 Communication is Key!
109 Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA)