Please enable JavaScript to use CodeHS

Standards Framework

for Maryland Cybersecurity II

57

Standards in this Framework

Standard Description
A.1 Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work.
A.2 Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn.
A.3 Employ effective reading, writing, and technical documentation skills.
A.4 Solve problems using critical thinking techniques and structured troubleshooting methodologies.
A.5 Demonstrate leadership skills and collaborate effectively as a team member.
A.6 Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines.
A.7 Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security.
A.8 Demonstrate time-management skills and the ability to prioritize tasks in a technical setting.
B.1 Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking.
B.2 Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations.
B.3 Demonstrate effective interview skills for roles in IT and networking.
C.1 Use technology as a tool for research, organization, communication, and problem-solving.
C.2 Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information.
C.3 Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications.
C.4 Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use.
D.1 Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards.
D.2 Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting.
D.3 Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting.
E.1 Design and implement infrastructures, including LANs, WANs, and VPNs, to support secure and efficient data communication.
E.2 Configure and troubleshoot routing and switching devices, such as routers and managed switches, according to industry standards.
E.3 Utilize subnetting, IP addressing, and network protocols (TCP/IP, DNS, DHCP) to design secure network configurations.
E.4 Apply techniques for optimizing network performance and securing network traffic.
F.1 Implement network security controls, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., HTTPS TLS).
F.2 Configure and troubleshoot virtual private networks (VPNs) and other remote access solutions to protect data transmission.
F.3 Demonstrate knowledge of wireless security settings, including encryption standards (WPA2, WPA3) and access control.
F.4 Monitor network activity and logs to detect and respond to security threats.
G.1 Identify and analyze security vulnerabilities in network systems using vulnerability scanning tools and penetration testing methods.
G.2 Conduct risk assessments and apply best practices for risk mitigation, including patch management, configuration management, and security policies.
G.3 Explain and implement access control models, such as role-based access control (RBAC), and multi-factor authentication (MFA).
G.4 Perform security audits and apply remediation strategies to strengthen the security posture of network environments.
H.1 Create and enforce security policies, procedures, and incident response plans based on organizational needs.
H.2 Explain and implement data protection strategies, including data classification, encryption, and secure disposal methods.
H.3 Apply principles of social engineering awareness and conduct training to enhance security culture within an organization.
H.4 Demonstrate an understanding of regulatory compliance and privacy laws, such as GDPR and HIPAA, and their impact on cybersecurity practices.
I.1 Demonstrate effective communication skills in documenting and reporting security incidents and resolutions.
I.2 Apply advanced mathematical concepts, including probability and statistics, for analyzing network traffic patterns and threat data.
I.3 Use scientific and forensic principles to investigate and analyze security incidents in digital systems.
J.1 Compare IT vs. OT environments (safety/availability priorities, legacy systems, real-time constraints).
J.2 Describe the Purdue Model and recommend segmentation for ICS/IIoT networks.
J.3 Identify common OT threats (e.g., ransomware in manufacturing, insecure remote access) and basic mitigations (e.g., allow-listing, change control).
J.4 Apply secure-by-design concepts (threat modeling, SBOM awareness, default-deny) to simple OT scenarios.
J.5 Explain how incident response and business continuity differ in OT contexts (safety and recovery windows).
K.1 Differentiate IaaS, PaaS, and SaaS and shared-responsibility models.
K.2 Configure identity, MFA, and baseline policies in a sandbox cloud tenant.
K.3 Interpret basic cloud service provider logs (e.g., sign-in, resource changes) to identify misconfigurations.
K.4 Describe risks of public storage, exposed keys, and over-permissive roles; propose remediations.
L.1 Map the identity lifecycle (provision, review, de-provision) and enforce least-privilege via roles.
L.2 Implement MFA choices and evaluate usability vs. security trade-offs.
L.3 Explain single sign-on (SSO) and federated identity at a conceptual level.
M.1 Explain common web/app flaws (OWASP Top 10 at a survey level) and simple input validation.
M.2 Use static/dynamic analysis tools in a safe lab to spot low-risk issues.
M.3 Propose remediation and secure coding guidelines appropriate to a high-school level.
N.1 Complete beginner-to-intermediate CTF labs (e.g., privilege escalation basics, simple web exploitation) in a safe, isolated environment.
N.2 Produce brief write-ups capturing approach, tools used, and lessons learned.
N.3 Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved.
O.1 Describe how anomaly detection and clustering can support security operations center (SOC) workflows.
O.2 Recognize adversarial uses of AI (e.g., phishing at scale, deepfakes) and propose controls (e.g., content provenance, user education).