Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia Cybersecurity Software Operations

Clear selection Print / Download

87

Standards in this Framework

54

Standards Mapped

62%

Mapped to Course

Standard Lessons
6304.39
Navigate an end user’s digital operating system network/environment.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.2 Lab: Configuring a Computer
  4. 4.8 Application Security
  5. 4.10 System Administration
  6. 4.11 Command Line Interface
  7. 6.11 Network Management
6304.40
Compare current digital operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
6304.41
Navigate the digital operating system environment.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.2 Lab: Configuring a Computer
  4. 4.3 Comparing Operating Systems
  5. 4.8 Application Security
  6. 4.10 System Administration
  7. 4.11 Command Line Interface
  8. 6.11 Network Management
6304.42
Demonstrate the procedures followed when installing digital operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.2 Lab: Configuring a Computer
6304.43
Manage a file system structure.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
6304.44
Compare server operating systems.
6304.45
Explain different types of drive partitions and file system formats.
6304.46
Explain file system formats.
6304.47
Analyze current and emerging specialized server hardware.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
6304.48
Manage partitions and volumes.
6304.49
Explain the authentication of users in a network environment.
  1. Advanced Cybersecurity
  2. 6.5 Access Control
  3. Fundamentals of Cybersecurity
  4. 4.10 System Administration
6304.50
Install applications.
  1. Fundamentals of Cybersecurity
  2. 4.6 Software and Applications
6304.51
Define aspects of networks.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
  3. 6.2 Protocols and Standards
  4. 6.3 Private Networks
  5. 7.3 Network Design
  6. 7.5 Build and Secure a Network
  7. Fundamentals of Cybersecurity
  8. 4.7 Software Licenses
  9. 5.4 What is the Internet?
  10. 5.5 IP Addresses
  11. 5.6 Routing and Packets
  12. 5.7 How Do Websites Work?
  13. 5.8 OSI Model
  14. 6.5 Network Devices
  15. 6.7 Network Options
6304.52
(Optional) Define types of network architecture.
  1. Advanced Cybersecurity
  2. 7.3 Network Design
  3. 7.4 Networking Services
  4. Fundamentals of Cybersecurity
  5. 4.7 Software Licenses
6304.53
(Optional) Differentiate between distributed and centralized computing.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
6304.54
(Optional) Identify services delivered by a server.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
  3. 6.2 Protocols and Standards
6304.55
(Optional) Describe standard network LAN topologies.
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. 8.1 Project: The Inside Scoop on LANs
6304.56
Describe variations of standard topologies.
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. 7.3 Network Design
6304.57
Describe the role of the network adapter.
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. Fundamentals of Cybersecurity
  4. 6.11 Network Management
6304.58
(Optional) Describe the functions of networking infrastructure (e.g., adapter, router, switch, bridge, wireless access point).
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
  3. 6.3 Private Networks
  4. Fundamentals of Cybersecurity
  5. 6.5 Network Devices
6304.59
(Optional) Describe the primary features of each major access method.
6304.60
Define terms related to wired and wireless network media.
  1. Advanced Cybersecurity
  2. 6.2 Protocols and Standards
6304.61
Identify the types and uses of wired network media.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
6304.62
Identify the types and uses of wireless network media.
  1. Advanced Cybersecurity
  2. 6.2 Protocols and Standards
  3. 6.3 Private Networks
6304.63
(Optional) Describe the concept of broadband.
6304.64
(Optional) Describe the types of modems.
6304.65
Describe each layer of the Open Systems Interconnection (OSI) model.
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
6304.66
Describe devices in a network environment and their place in the OSI model.
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
6304.67
Define the basic components of a network packet.
  1. Advanced Cybersecurity
  2. 6.2 Protocols and Standards
  3. Fundamentals of Cybersecurity
  4. 5.6 Routing and Packets
6304.68
Describe networking protocols.
  1. Advanced Cybersecurity
  2. 6.2 Protocols and Standards
  3. Fundamentals of Cybersecurity
  4. 5.5 IP Addresses
  5. 5.6 Routing and Packets
  6. 5.7 How Do Websites Work?
6304.69
(Optional) Map network processes.
6304.70
Identify the workings of a WAN.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
  3. 6.2 Protocols and Standards
6304.71
Describe TCP/IP.
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. Fundamentals of Cybersecurity
  4. 5.6 Routing and Packets
6304.72
(Optional) Compare static and dynamic IP routing.
  1. Advanced Cybersecurity
  2. 7.3 Network Design
6304.73
Configure TCP/IP.
6304.74
Test a TCP/IP configuration, using operating-system-specific commands.
6304.75
Identify the network and host identifications' TCP/IP addresses.
6304.76
(Optional) Compare IPv4 and IPv6.
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
6304.77
Explain the function of a subnet mask and classless inter-domain routing (CIDR) format.
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. 7.3 Network Design
6304.78
Describe a loopback address.
6304.79
Describe the services provided by Network Basic Input/Output System (NetBIOS) over TCP/IP.
6304.80
(Optional) Explain the process of host name resolution.
6304.81
(Optional) Modify the host’s file to resolve host names.
6304.82
(Optional) Configure File Transfer Protocol (FTP).
6304.83
(Optional) Explain the purpose of the Simple Network Management Protocol (SNMP).
  1. Advanced Cybersecurity
  2. 6.2 Protocols and Standards
6304.84
(Optional) Describe the implementation of a virtual LAN (VLAN).
  1. Advanced Cybersecurity
  2. 6.3 Private Networks
  3. Fundamentals of Cybersecurity
  4. 6.7 Network Options
6304.85
(Optional) Monitor network traffic.
  1. Advanced Cybersecurity
  2. 3.5 Cross-site Scripting
  3. Fundamentals of Cybersecurity
  4. 6.10 Network Communication
6304.86
(Optional) Analyze network systems for security vulnerabilities.
  1. Advanced Cybersecurity
  2. 3.5 Cross-site Scripting
  3. 9.1 Identifying Risks
6304.87
Explain the core security principles used in network management.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
6304.88
Analyze threats and risks to networks and local account policies.
  1. Advanced Cybersecurity
  2. 4.4 Network Protocol Defense
  3. 9.2 Assessing Risks
6304.89
Analyze internal and external threats to computer networks.
  1. Advanced Cybersecurity
  2. 3.6 Internal Threats
  3. 4.3 Security Breaches
  4. 4.4 Network Protocol Defense
  5. 9.2 Assessing Risks
  6. Fundamentals of Cybersecurity
  7. 8.5 Environmental Controls
6304.90
Identify strategies to mitigate risk.
  1. Advanced Cybersecurity
  2. 9.1 Identifying Risks
  3. 9.2 Assessing Risks
  4. 9.3 Risk Response
  5. Fundamentals of Cybersecurity
  6. 8.6 Checking for Vulnerabilities
  7. 8.7 Risky Business
6304.91
Identify sustainable computer networking practices.
6304.92
Install a virtualized operating system.
6304.93
Describe the different types of network adapter modes for virtual operating systems.
6304.94
Incorporate security scanning tools such as Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) and/or security appliances.
  1. Advanced Cybersecurity
  2. 6.1 Network Administrator
6304.95
Identify threats and vulnerabilities from users.
  1. Advanced Cybersecurity
  2. 3.6 Internal Threats
  3. 9.1 Identifying Risks
6304.96
Identify security measures to physical threats to network systems.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
6304.97
Identifying other risks and threats to systems.
  1. Advanced Cybersecurity
  2. 6.4 Mobile Devices
  3. Fundamentals of Cybersecurity
  4. 8.6 Checking for Vulnerabilities
6304.98
(Optional) Identify training needs.
  1. Advanced Cybersecurity
  2. 10.2 Level 2: User Training
6304.99
(Optional) Provide an orientation to a network system (system onboarding).
  1. Advanced Cybersecurity
  2. 10.2 Level 2: User Training
6304.10
(Optional) Develop a training plan.
  1. Advanced Cybersecurity
  2. 10.2 Level 2: User Training
6305.101
(Optional) Provide training to users.
6305.102
(Optional) Create a user manual.
6305.103
(Optional) Provide ongoing basic user support.
6305.104
(Optional) Identify copyright and licensing laws that apply to computer use and network administration.
  1. Advanced Cybersecurity
  2. 10.4 Level 4: Data and Licenses
  3. Fundamentals of Cybersecurity
  4. 4.7 Software Licenses
6305.105
(Optional) Describe procedures to ensure the proper licensing of a client-server operating system and applications.
6305.106
(Optional) Identify ethical behavior that is expected of users and administrators.
  1. Advanced Cybersecurity
  2. 10.3 Level 3: Incident Response
  3. 10.4 Level 4: Data and Licenses
  4. Fundamentals of Cybersecurity
  5. 1.4 Cyber Ethics and Laws
6305.107
(Optional) Describe procedures for documentation found in network policies.
  1. Advanced Cybersecurity
  2. 10.5 Level 5: Change Management
6305.108
(Optional) Explain network hardening.
  1. Advanced Cybersecurity
  2. 9.4 Penetration Testing
6305.109
(Optional) Manage a network.
6305.110
Optimize a network.
  1. Advanced Cybersecurity
  2. 7.3 Network Design
  3. 7.4 Networking Services
  4. 7.5 Build and Secure a Network
6305.111
Describe the process and requirements for obtaining industry certifications.
  1. Advanced Cybersecurity
  2. 16.1 After Advanced Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 10.1 After Fundamentals of Cybersecurity
6305.112
Identify testing skills/strategies for a certification examination.
  1. Advanced Cybersecurity
  2. 16.1 After Advanced Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 10.1 After Fundamentals of Cybersecurity
6305.113
Demonstrate ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams).
  1. Advanced Cybersecurity
  2. 16.1 After Advanced Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 10.1 After Fundamentals of Cybersecurity
6305.114
Complete an industry certification examination representative of skills learned in this course.
  1. Advanced Cybersecurity
  2. 16.1 After Advanced Cybersecurity
6305.115
Research careers in networking and systems security.
  1. Advanced Cybersecurity
  2. 16.1 After Advanced Cybersecurity
  3. 20.2 Alternative Learning Opportunities
  4. Fundamentals of Cybersecurity
  5. 10.1 After Fundamentals of Cybersecurity
  6. 18.2 Alternative Learning Opportunities
6305.116
Compose a résumé for electronic processing.
  1. Advanced Cybersecurity
  2. 20.3 Resume and Interview Prep
  3. Fundamentals of Cybersecurity
  4. 18.3 Resume and Interview Prep
6305.117
Assemble a professional portfolio that contains representative samples of student work.
6305.118
(Optional) Create a cover letter to accompany a résumé.
6305.119
(Optional) Complete manual and electronic application forms.
6305.120
(Optional) Participate in an internship program.
6305.121
Research a company in preparation for a job interview.
6305.122
(Optional) Participate in a mock interview.
6305.123
(Optional) Compose an interview follow-up letter.
6305.124
(Optional) Identify the steps to follow when resigning from a position.
6305.125
Identify potential employment barriers for nontraditional groups and ways to overcome these barriers.