Please enable JavaScript to use CodeHS

Wyoming 6-8 Standards Mapping

to

Fundamentals of Cybersecurity

25 Standards in this Framework 14 Standards Mapped 56% Mapped to Course


Standard Lessons
8.CS.D.01 Recommend improvements to the design of computing devices based on an analysis of how a variety of users interact with the device.
8.CS.HS.01 Design and refine a project that combines hardware and software components to collect and exchange data.
8.CS.T.01 Systematically identify, resolve, and document increasingly complex software and hardware problems with computing devices and their components.
  1. 12.1 Methodology
  2. 12.2 Support Practice
8.NI.NCO.01 Model the role of protocols in transmitting data across networks and the internet (e.g., explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered).
  1. 10.8 Packets & Protocols
  2. 11.6 Network Communication
8.NI.C.01 Critique physical and digital procedures that could be implemented to protect electronic data/information.
  1. 2.4 Privacy & Security
8.NI.C.02 Apply multiple methods of encryption to model the secure transmission of data.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
8.DA.S.01 Represent data using multiple encoding schemes (e.g., ASCII, binary).
8.DA.CVT.01 Using computational tools, transform collected data to make it more useful and reliable.
  1. 4.5 Arrays and Objects
  2. 8.3 The Value of Data
8.DA.IM.01 Refine computational models based on generated data.
8.AP.A.01 Create flowcharts and pseudocode to design algorithms to solve complex problems
  1. 4.6 Organizational Techniques
8.AP.V.01 Using grade appropriate content and complexity, create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
8.AP.C.01 Using grade appropriate content and complexity, design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.1 Booleans
  4. 22.3 Comparison Operators
  5. 22.5 For Loops in JavaScript
  6. 22.6 General For Loops
  7. 22.7 For Loop Practice
  8. 22.9 While Loops
8.AP.M.01 Using grade appropriate content and complexity, decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs.
  1. 4.6 Organizational Techniques
8.AP.M.02 Using grade appropriate content and complexity, create procedures with parameters to organize code and make it easier to reuse.
8.AP.PD.01 Using grade appropriate content and complexity, seek and incorporate feedback from team members and users to refine a solution to a problem.
8.AP.PD.02 Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution.
8.AP.PD.03 Systematically test and refine programs using a range of test cases.
8.AP.PD.04 Using grade appropriate content and complexity, document programs in order to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
8.AP.PD.05 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
8.IC.C.01 Describe impacts associated with computing technologies that affect people's everyday activities and career options.
8.IC.C.02 Describe issues of bias and accessibility in the design of technologies.
  1. 2.2 Cyberbullying
  2. 3.1 Project: Public Service Announcement
  3. 10.10 Impact of the Internet
8.IC.SI.01 Using grade appropriate content and complexity, collaborate using tools to connect with peers when creating a computational artifact.
8.IC.SI.02 Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.8 Digital Citizenship and Cyber Hygiene Quiz
8.IC.SLE.01 Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 1.3 Impact of Cybersecurity
  2. 2.1 Digital Footprint and Reputation
  3. 2.4 Privacy & Security
  4. 2.8 Digital Citizenship and Cyber Hygiene Quiz
8.IC.SLE.02 Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  1. 2.4 Privacy & Security
  2. 2.6 Creative Credit & Copyright
  3. 2.8 Digital Citizenship and Cyber Hygiene Quiz