Please enable JavaScript to use CodeHS

Standards Framework

for Maryland Cybersecurity I

55

Standards in this Framework

Standard Description
A.1 Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work.
A.2 Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn.
A.3 Employ effective reading, writing, and technical documentation skills.
A.4 Solve problems using critical thinking techniques and structured troubleshooting methodologies.
A.5 Demonstrate leadership skills and collaborate effectively as a team member.
A.6 Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines.
A.7 Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security.
A.8 Demonstrate time-management skills and the ability to prioritize tasks in a technical setting.
B.1 Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking.
B.2 Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations.
B.3 Demonstrate effective interview skills for roles in IT and networking.
C.1 Use technology as a tool for research, organization, communication, and problem-solving.
C.2 Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information.
C.3 Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications.
C.4 Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use.
D.1 Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards.
D.2 Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting.
D.3 Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting.
E.1 Identify and describe the functions of different computer hardware components, including CPUs, memory, storage, and peripheral devices.
E.2 Perform basic hardware installation, configuration, and troubleshooting in line with industry standards.
E.3 Demonstrate the ability to install and configure operating systems, focusing on system updates, patches, and driver installations.
E.4 Explain the importance of and perform regular maintenance and upgrades on hardware and software systems.
F.1 Understand basic networking concepts, including IP addressing and network protocols, to prepare for configuration and troubleshooting.
F.2 Configure and troubleshoot wired and wireless network connections, adhering to industry protocols and standards.
F.3 Apply fundamental concepts of network security, including firewalls, antivirus software, and network access controls.
F.4 Demonstrate the ability to set up and secure both home and small business networks, emphasizing cybersecurity best practices.
G.1 Describe common security threats, vulnerabilities, and attacks, including phishing, malware, and social engineering.
G.2 Identify basic data security measures, such as data encryption, secure passwords, and data backup strategies.
G.3 Demonstrate knowledge of access controls, user permissions, and authentication methods for protecting information systems.
G.4 Describe the core cybersecurity frameworks including the CIA Triad, Defense in Depth, and Authentication, Authorization, and Accounting (AAA) and how they influence cybersecurity policies and practices.
G.5 Conduct basic risk assessments and apply strategies to mitigate potential cybersecurity threats.
H.1 Identify and troubleshoot common hardware, software, and network issues using systematic diagnostic methods.
H.2 Document technical issues, troubleshooting steps, and solutions in line with industry documentation practices.
H.3 Demonstrate the use of technical support tools, such as remote assistance, for resolving user issues.
H.4 Apply customer service skills in technical support scenarios, practicing professional communication and problem-solving techniques.
I.1 Harden operating systems (local policies, secure services, update/patch cadence) and configure endpoint protection (AV/EDR).
I.2 Apply least-privilege and standard user policies; manage local groups and permissions.
I.3 Configure basic logging and review event logs to identify suspicious activity.
I.4 Create and test a simple data backup/restore plan for endpoints.
J.1 Use decomposition, pattern recognition, abstraction, and algorithms to plan solutions.
J.2 Write and run simple scripts (e.g., Python, Bash, or PowerShell) to parse logs, hash files, or query system info.
J.3 Use regular expressions and command-line tools to filter and transform data.
J.4 Document scripts with comments and basic error handling.
K.1 Explain what modern AI/ML systems do (at a high level) and their limitations (e.g., hallucinations, bias, data leakage).
K.2 Use AI tools responsibly for research and drafting (prompt hygiene, citation, privacy-safe inputs).
K.3 Identify security risks of AI systems (e.g., prompt injection, model poisoning, data exfiltration) in age-appropriate scenarios.
L.1 Track current industry news and summarize quarterly trends (e.g., AI, cloud, OT).
L.2 Map evolving roles to skills/credentials (e.g., Security Operations, GRC, Cloud Security, OT Security) and update an individual learning plan.
M.1 Complete beginner capture-the-flag (CTF) labs (e.g., password cracking basics, log triage, web challenges) in a safe, isolated environment.
M.2 Reflect on problem-solving approaches and document write-ups in a portfolio.
M.3 Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved.
N.1 Perform basic OS installation or imaging and initial configuration (accounts, updates, drivers).
N.2 Configure user profiles and local authentication settings on Windows, Linux, or macOS.
N.3 Connect and troubleshoot common peripherals and printers at a basic level.
N.4 Describe safe tool use and ESD precautions during basic hardware service.