K-12 Computer Science Standards

Virginia Cybersecurity Fundamentals

109 Standards

1

1

Demonstrate creativity and innovation.

2

2

Demonstrate critical thinking and problem solving.

3

3

Demonstrate initiative and self-direction.

4

4

Demonstrate integrity.

5

5

Demonstrate work ethic.

6

6

Demonstrate conflict-resolution skills.

7

7

Demonstrate listening and speaking skills.

8

8

Demonstrate respect for diversity.

9

9

Demonstrate customer service skills.

10

10

Collaborate with team members.

11

11

Demonstrate big-picture thinking.

12

12

Demonstrate career- and life-management skills.

13

13

Demonstrate continuous learning and adaptability.

14

14

Manage time and resources.

15

15

Demonstrate information-literacy skills.

16

16

Demonstrate an understanding of information security.

17

17

Maintain working knowledge of current information-technology (IT) systems.

18

18

Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.

19

19

Apply mathematical skills to job-specific tasks.

20

20

Demonstrate professionalism.

21

21

Demonstrate reading and writing skills.

22

22

Demonstrate workplace safety.

23

23

Examine aspects of planning within an industry/organization.

24

24

Examine aspects of management within an industry/organization.

25

25

Examine aspects of financial responsibility within an industry/organization.

26

26

Examine technical and production skills required of workers within an industry/organization.

27

27

Examine principles of technology that underlie an industry/organization.

28

28

Examine labor issues related to an industry/organization.

29

29

Examine community issues related to an industry/organization.

30

30

Examine health, safety, and environmental issues related to an industry/organization.

31

31

Identify the purposes and goals of the student organization.

32

32

Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.

33

33

Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.

34

34

Identify Internet safety issues and procedures for complying with acceptable use standards.

35

35

Identify the types of work-based learning (WBL) opportunities.

36

36

Reflect on lessons learned during the WBL experience.

37

37

Explore career opportunities related to the WBL experience.

38

38

Participate in a WBL experience, when appropriate.

39

39

Describe Cybersecurity

40

40

Define information assurance

41

41

Describe the critical factors of information security

42

42

Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration

43

43

Define risk

44

44

Identify the concepts of cybersecurity risk management

45

45

Describe cybersecurity threats to an organization

46

46

Explain why organizations need to manage risk

47

47

Discuss national or industry standards/regulations that relate to cybersecurity

48

48

Describe the cyberattack surface of various organizations

49

49

Analyze risks affecting critical infrastructure

50

50

Describe a network

51

51

Describe a wired/cabled network

52

52

Describe a wireless network

53

53

Compare cabled/wired and wireless networks

54

54

Compare networking conceptual models

55

55

Discuss services, their relationship to the OSI model, and potential vulnerabilities

56

56

Differentiate among network types

57

57

Examine the concept of the Internet as a network of connected systems

58

58

Identify networking protocols

59

59

Describe the difference between a cyber threat and a vulnerability

60

60

Describe types of cyber threats

61

61

Analyze types of current cyber threats

62

62

Identify the perpetrators of different types of malicious hacking

63

63

Describe the characteristics of vulnerabilities

64

64

Identify the prevention of and protection against cyber threats

65

65

Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks

66

66

Differentiate between ethics and laws

67

67

Distinguish among types of ethical concerns

68

68

Define cyberbullying

69

69

Identify actions that constitute cyberbullying

70

70

Identify possible warning signs of someone being cyberbullied

71

71

Identify laws applicable to cybersecurity

72

72

Explain the concept of “personally identifiable information”

73

73

Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it

74

74

Identify ways to control and protect personal data

75

75

Demonstrate net etiquette (netiquette) as it relates to cybersecurity

76

76

Analyze the social and legal significance of the ongoing collection of personal digital information

77

77

Distinguish between data, information, and knowledge

78

78

Identify the most common ways data is collected

79

79

Identify the most common ways data can be stored

80

80

Explain the difference between data at rest, data in transit, and data being processed

81

81

Identify the most common ways data is used

82

82

Discuss how data can be compromised, corrupted, or lost

83

83

Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions)

84

84

Define the function of a computer operating system

85

85

Identify the components of an operating system

86

86

List types of operating systems

87

87

Evaluate the potential vulnerabilities, threats, and common exploits to an operating system

88

88

Identify best practices for protecting operating systems

89

89

Describe the concept of malware and techniques to guard against it

90

90

Evaluate critical operating system security parameters

91

91

Describe security and auditing logs

92

92

Describe the role of a system backup

93

93

Define virtualization technology

94

94

Identify advantages and disadvantages of using virtual machines

95

95

Define programming in the context of cybersecurity

96

96

Differentiate between computer programming languages

97

97

Evaluate common programming flaws that lead to vulnerabilities

98

98

Identify best practices in secure coding and design

99

99

Identify ubiquitous computing

100

100

Discuss security and privacy implications of ubiquitous computing

101

101

Research career opportunities for cybersecurity professionals

102

102

Identify the educational pathways for emerging cybersecurity professionals

103

103

Identify the educational pathways for emerging cybersecurity professionals

104

104

Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters

105

105

Research the cyber threats and security measures related to career pathways

106

106

Identify testing skills/strategies for a certification examination

107

107

Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course

108

108

Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams)

109

109

Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA)

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program