Please enable JavaScript to use CodeHS

Wyoming L2 Standards Mapping

to

Fundamentals of Cybersecurity

29 Standards in this Framework 12 Standards Mapped 41% Mapped to Course


Standard Lessons
L2.CS.HS.01 Categorize the roles of operating system software.
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.3 Compatibility
L2.CS.T.01 Identify how hardware components facilitate logic, input, output, and storage in computing systems, and their common malfunctions.
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
L2.NI.NCO.01 Describe the issues that impact network functionality (e.g., bandwidth, load, latency, topology).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
L2.NI.C.01 Compare ways software developers protect devices and information from unauthorized access.
  1. 8.9 Common Security Problems
  2. 8.10 SQL Injection Overview
  3. 8.11 Types of SQLi and Prevention
L2.DA.CVT.01 Use data analysis tools and techniques to identify patterns in data representing complex systems.
L2.DA.CVT.02 Select data collection tools and techniques, and use them to generate data sets that support a claim or communicate information.
L2.DA.IM.01 Formulate, refine, and test scientific hypotheses using models and simulations.
L2.AP.A.01 Critically examine and trace classic algorithms. Use and adapt classic algorithms to solve computational problems (e.g., selection sort, insertion sort, binary search, linear search).
L2.AP.A.02 Develop an artificial intelligence algorithm to play a game against a human opponent or solve a real-world problem.
L2.AP.A.03 Evaluate algorithms (e.g., sorting, searching) in terms of their efficiency, correctness, and clarity.
L2.AP.V.01 Compare and contrast simple data structures and their uses (e.g., lists, stacks, queues).
L2.AP.C.01 Trace the execution of recursion, illustrating output and changes in values of named variables.
L2.AP.M.01 Construct solutions to problems using student-created components, such as procedures, modules, and/or objects.
L2.AP.M.02 Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
  1. 21.1 Challenge Problems
L2.AP.M.03 Demonstrate code reuse by creating programming solutions using libraries and APIs.
L2.AP.PD.01 Plan and develop programs that will provide solutions to a variety of users using a software life cycle process.
L2.AP.PD.02 Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (e.g., code documentation) in a group software project.
L2.AP.PD.03 Develop programs for multiple computing platforms.
L2.AP.PD.04 Evaluate key qualities of a program through a process such as a code review (e.g., qualities could include correctness, usability, readability, efficiency, portability, and scalability).
L2.AP.PD.05 Develop and use a series of test cases to verify that a program performs according to its design specifications
L2.AP.PD.06 Explain security issues that might lead to compromised computer programs.
  1. 7.6 Application Security
  2. 7.7 Browser Configuration
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
  5. 8.10 SQL Injection Overview
  6. 8.11 Types of SQLi and Prevention
L2.AP.PD.07 Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
L2.AP.PD.08 Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
  1. 4.1 Programming Concepts
L2.IC.C.01 Evaluate the beneficial and harmful effects that computational artifacts and innovations have on society.
  1. 7.4 Software and Applications
  2. 10.10 Impact of the Internet
L2.IC.C.02 Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
L2.IC.C.03 Predict how computational innovations that have revolutionized aspects of our culture might evolve.
  1. 10.10 Impact of the Internet
L2.IC.SI.01 Practice grade-level appropriate behavior and responsibilities while participating in an online community. Identify and report inappropriate behavior.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
L2.IC.SLE.01 Debate laws and regulations that impact the development and use of software and technology.
  1. 2.6 Creative Credit & Copyright
L2.IC.SLE.02 Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.