Standards of Learning: Applied Computer Science

Policy Number:  
SOL-ACS-001
Version:  
1.0
Effective Date:  
October 1, 2025
Review Date:  
October 1, 2026
Last Updated:  
October 8, 2025
Functional Area Manager:  
Director of Academic Operations

Consolidated Standards of Learning

Grades 5 - 8

  • LHA.ACS.B.001: Students will describe computer science as the study of computers and computational systems, identifying real-world examples of its impact on daily life and problem-solving.
  • LHA.ACS.B.002: Students will assemble a diagram or model of a computer's basic hardware components (e.g., CPU, memory, input/output devices) and explain how they work together to process information.
  • LHA.ACS.B.003: Students will experiment with input methods (e.g., keyboard, mouse, touchscreens, voice commands) and output devices (e.g., screens, speakers) to create a simple interactive task, such as drawing or navigating a menu.
  • LHA.ACS.B.004: Students will represent simple data (e.g., numbers or images) using binary code and simulate how computers use bits and bytes to store and retrieve it.
  • LHA.ACS.B.005: Students will gather data from a survey or sensor, organize it in a digital tool, and use it to draw conclusions, such as predicting trends in a class activity.
  • LHA.ACS.B.006: Students will sketch and prototype a simple system (e.g., a smart home device) by specifying inputs, processes, and outputs to solve a real-world problem like automating a morning routine.
  • LHA.ACS.B.007: Students will run a simple program, identify bugs through trial and error, and apply debugging steps to ensure it produces the expected results.
  • LHA.ACS.B.008: Students will add comments and descriptions to a short program, then explain its purpose and steps to a peer as if teaching them how to use it.
  • LHA.ACS.B.009: Students will share a computational artifact (e.g., a game or app idea), collect peer suggestions, and revise it to improve functionality or user experience.
  • LHA.ACS.B.010: Students will work in teams to divide tasks, build a shared program or simulation, and present how their collaboration led to a successful outcome.
  • LHA.ACS.B.011: Students will break down a routine activity (e.g., sorting recyclables) into step-by-step instructions and test the algorithm by following it with a partner.
  • LHA.ACS.B.012: Students will try simple commands in two languages (e.g., block-based vs. text-based), then discuss their strengths for different types of projects like games or data analysis.
  • LHA.ACS.B.013: Students will decompose a complex problem (e.g., planning a school event), recognize patterns, abstract key elements, and create an algorithm to solve it.
  • LHA.ACS.B.014: Students will create a program where variables store changing values (e.g., scores in a game) and modify them to see how outputs update dynamically.
  • LHA.ACS.B.015: Students will code a decision-based scenario (e.g., a choose-your-own-adventure story) using if-else logic to branch outcomes based on user choices.
  • LHA.ACS.B.016: Students will write code that repeats actions (e.g., drawing a pattern or counting down) using loops, adjusting iterations to create variations like spirals or animations.
  • LHA.ACS.B.017: Students will design an app or game that reacts to events (e.g., clicks or key presses), such as a character jumping when a spacebar is pressed.
  • LHA.ACS.B.018: Students will define a procedure (e.g., a dance move in an animation) and call it multiple times in a program to build efficiency and modularity.
  • LHA.ACS.B.019: Students will launch Scratch, create a basic interactive story or game using sprites and backdrops, and share it online for feedback.
  • LHA.ACS.B.020: Students will sequence blocks to solve puzzles (e.g., maze navigation) and refine the algorithm for speed or fewer steps.
  • LHA.ACS.B.021: Students will use operators (e.g., addition, comparison) on data variables to perform calculations, like scoring a quiz or comparing temperatures.
  • LHA.ACS.B.022: Students will construct an interactive project (e.g., a music player) using loops, conditionals, and events to respond to user inputs in real time.
  • LHA.ACS.B.023: Students will copy and customize scripts across scenes or characters in a program, demonstrating how modularity simplifies larger creations like multi-level games.
  • LHA.ACS.B.024: Students will set up a Python environment, code and run a "Hello, World!" script, then extend it with user input for personalization.
  • LHA.ACS.B.025: Students will assign values to variables in Python (e.g., name = "Alex"), print them, and experiment with reassignment to track changes.
  • LHA.ACS.B.026: Students will manipulate strings (e.g., concatenate names or format messages) to generate personalized outputs, like greeting cards.
  • LHA.ACS.B.027: Students will use arithmetic operators on numbers stored in variables (e.g., calculating totals or averages) to simulate real tasks like budgeting.
  • LHA.ACS.B.028: Students will create lists to store items (e.g., shopping lists), use boolean expressions to check conditions (e.g., "is item in list?"), and filter results.
  • LHA.ACS.B.029: Students will iterate over a range or list with a for loop (e.g., printing multiples) to automate repetitive tasks like generating a multiplication table.
  • LHA.ACS.B.030: Students will implement a while loop in Python (e.g., guessing game that continues until correct) to repeat until a condition is met.
  • LHA.ACS.B.031: Students will write if-elif-else statements to handle multiple scenarios, such as grading a quiz based on scores.
  • LHA.ACS.B.032: Students will create a function (e.g., def greet(name):) with parameters, call it from main code, and use it to reuse logic in a larger script.
  • LHA.ACS.B.033: Students will map out internet components (e.g., devices, servers, protocols) and simulate data travel between them using a role-play activity.
  • LHA.ACS.B.034: Students will identify common threats (e.g., phishing) and demonstrate safe practices, like creating strong passwords or verifying sources, in a mock online scenario.
  • LHA.ACS.B.035: Students will use a code editor to build and preview a basic HTML page with text and images, then host it locally to view in a browser.
  • LHA.ACS.B.036: Students will add headings, paragraphs, and lists to an HTML file, organizing content logically for a personal bio page.
  • LHA.ACS.B.037: Students will insert hyperlinks (e.g., to external sites or pages) using anchor tags, testing navigation in a multi-page site mockup.
  • LHA.ACS.B.038: Students will link a CSS file to HTML and use properties (e.g., colors, fonts) to style an entire page, creating a themed layout like a blog.
  • LHA.ACS.B.039: Students will use selectors (e.g., classes, IDs) to style individual parts (e.g., buttons or images) differently, customizing a page for visual appeal.

CompTIA IT Fundamentals (FC0-U61)

  • LHA.ACS.FC0-U61.001: Students will compare and contrast notational systems.
  • LHA.ACS.FC0-U61.002: Students will compare and contrast fundamental data types and their characteristics.
  • LHA.ACS.FC0-U61.003: Students will illustrate the basics of computing and processing.
  • LHA.ACS.FC0-U61.004: Students will explain the value of data and information.
  • LHA.ACS.FC0-U61.005: Students will compare and contrast common units of measure.
  • LHA.ACS.FC0-U61.006: Students will explain the troubleshooting methodology.
  • LHA.ACS.FC0-U61.007: Students will classify common types of input/output device interfaces.
  • LHA.ACS.FC0-U61.008: Students will set up and install common peripheral devices to a laptop/PC given a scenario.
  • LHA.ACS.FC0-U61.009: Students will explain the purpose of common internal computing components.
  • LHA.ACS.FC0-U61.010: Students will compare and contrast common Internet service types.
  • LHA.ACS.FC0-U61.011: Students will compare and contrast storage types.
  • LHA.ACS.FC0-U61.012: Students will compare and contrast common computing devices and their purposes.
  • LHA.ACS.FC0-U61.013: Students will explain basic networking concepts.
  • LHA.ACS.FC0-U61.014: Students will install, configure, and secure a basic wireless network given a scenario.
  • LHA.ACS.FC0-U61.015: Students will explain the purpose of operating systems.
  • LHA.ACS.FC0-U61.016: Students will compare and contrast components of an operating system.
  • LHA.ACS.FC0-U61.017: Students will explain the purpose and proper use of software.
  • LHA.ACS.FC0-U61.018: Students will explain methods of application architecture and delivery models.
  • LHA.ACS.FC0-U61.019: Students will configure and use web browsers given a scenario.
  • LHA.ACS.FC0-U61.020: Students will compare and contrast general application concepts and uses.
  • LHA.ACS.FC0-U61.021: Students will compare and contrast programming language categories.
  • LHA.ACS.FC0-U61.022: Students will use programming organizational techniques and interpret logic given a scenario.
  • LHA.ACS.FC0-U61.023: Students will explain the purpose and use of programming concepts.
  • LHA.ACS.FC0-U61.024: Students will explain database concepts and the purpose of a database.
  • LHA.ACS.FC0-U61.025: Students will compare and contrast various database structures.
  • LHA.ACS.FC0-U61.026: Students will summarize methods used to interface with databases.
  • LHA.ACS.FC0-U61.027: Students will summarize confidentiality, integrity, and availability concerns.
  • LHA.ACS.FC0-U61.028: Students will explain methods to secure devices and best practices.
  • LHA.ACS.FC0-U61.029: Students will summarize behavioral security concepts.
  • LHA.ACS.FC0-U61.030: Students will compare and contrast authentication, authorization, accounting, and non-repudiation concepts.
  • LHA.ACS.FC0-U61.031: Students will explain password best practices.
  • LHA.ACS.FC0-U61.032: Students will explain common uses of encryption.
  • LHA.ACS.FC0-U61.033: Students will explain business continuity concepts.

CompTIA A+ Core 1 (220-1201)

  • LHA.ACS.220-1201.001: Students will apply the best practice methodology to resolve problems given a scenario.
  • LHA.ACS.220-1201.002: Students will install and configure common devices given a scenario.
  • LHA.ACS.220-1201.003: Students will configure appropriate security settings on small office/home office (SOHO) wireless and wired networks given a scenario.
  • LHA.ACS.220-1201.004: Students will compare and contrast common network configuration concepts.
  • LHA.ACS.220-1201.005: Students will compare and contrast Internet connection types, network types, and their features.
  • LHA.ACS.220-1201.006: Students will use networking tools given a scenario.
  • LHA.ACS.220-1201.007: Students will explain basic cable types and their connectors, features, and purposes.
  • LHA.ACS.220-1201.008: Students will install the appropriate RAM given a scenario.
  • LHA.ACS.220-1201.009: Students will select and install storage devices given a scenario.
  • LHA.ACS.220-1201.010: Students will install and configure motherboards given a scenario.
  • LHA.ACS.220-1201.011: Students will install or replace the appropriate power supply given a scenario.
  • LHA.ACS.220-1201.012: Students will deploy and appropriately size network devices given a scenario.
  • LHA.ACS.220-1201.013: Students will apply network security techniques given a scenario.
  • LHA.ACS.220-1201.014: Students will troubleshoot common hardware problems given a scenario.
  • LHA.ACS.220-1201.015: Students will explain common TCP and UDP ports, protocols, and their purposes.
  • LHA.ACS.220-1201.016: Students will compare and contrast WiFi networking and security protocols.
  • LHA.ACS.220-1201.017: Students will compare and contrast hardware differences in regard to tablets and laptops.
  • LHA.ACS.220-1201.018: Students will install and configure laptop hardware components given a scenario.
  • LHA.ACS.220-1201.019: Students will summarize cloud concepts and connectivity options.
  • LHA.ACS.220-1201.020: Students will summarize services provided by networked hosts.
  • LHA.ACS.220-1201.021: Students will install and configure printers and multifunction devices given a scenario.
  • LHA.ACS.220-1201.022: Students will install and replace printer consumables given a scenario.
  • LHA.ACS.220-1201.023: Students will summarize basic features of various print technologies.
  • LHA.ACS.220-1201.024: Students will troubleshoot common issues with mobile devices given a scenario.
  • LHA.ACS.220-1201.025: Students will select and configure basic wireless devices to connect to a network given a scenario.
  • LHA.ACS.220-1201.026: Students will troubleshoot common problems with networked devices given a scenario.

Grades 9 - 12

CompTIA A+ Core 2 (220-1102)

  • LHA.ACS.220-1102.001: Students will identify basic features of Microsoft Windows editions.
  • LHA.ACS.220-1102.002: Students will use the appropriate Microsoft command-line tool given a scenario.
  • LHA.ACS.220-1102.003: Students will use features and tools of the Microsoft Windows 10 operating system (OS) given a scenario.
  • LHA.ACS.220-1102.004: Students will use the appropriate Microsoft Windows 10 Control Panel utility given a scenario.
  • LHA.ACS.220-1102.005: Students will use the appropriate Windows settings given a scenario.
  • LHA.ACS.220-1102.006: Students will configure Microsoft Windows networking features on a client/desktop given a scenario.
  • LHA.ACS.220-1102.007: Students will apply application installation and configuration concepts given a scenario.
  • LHA.ACS.220-1102.008: Students will explain common OS types and their purposes.
  • LHA.ACS.220-1102.009: Students will perform OS installations and upgrades in a diverse OS environment given a scenario.
  • LHA.ACS.220-1102.010: Students will identify common features and tools of the macOS/desktop OS.
  • LHA.ACS.220-1102.011: Students will identify common features and tools of the Linux client/desktop OS.
  • LHA.ACS.220-1102.012: Students will summarize various security measures and their purposes.
  • LHA.ACS.220-1102.013: Students will compare and contrast wireless security protocols and authentication methods.
  • LHA.ACS.220-1102.014: Students will detect, remove, and prevent malware using the appropriate tools and methods given a scenario.
  • LHA.ACS.220-1102.015: Students will explain common social-engineering attacks, threats, and vulnerabilities.
  • LHA.ACS.220-1102.016: Students will manage and configure basic security settings in the Microsoft Windows OS given a scenario.
  • LHA.ACS.220-1102.017: Students will configure a workstation to meet best practices for security given a scenario.
  • LHA.ACS.220-1102.018: Students will explain common methods for securing mobile and embedded devices.
  • LHA.ACS.220-1102.019: Students will use common data destruction and disposal methods given a scenario.
  • LHA.ACS.220-1102.020: Students will configure appropriate security settings on small office/home office (SOHO) wireless and wired networks given a scenario.
  • LHA.ACS.220-1102.021: Students will install and configure browsers and relevant security settings given a scenario.
  • LHA.ACS.220-1102.022: Students will troubleshoot common Windows OS problems given a scenario.
  • LHA.ACS.220-1102.023: Students will troubleshoot common personal computer (PC) security issues given a scenario.
  • LHA.ACS.220-1102.024: Students will use best practice procedures for malware removal given a scenario.
  • LHA.ACS.220-1102.025: Students will troubleshoot common mobile OS and application issues given a scenario.
  • LHA.ACS.220-1102.026: Students will troubleshoot common mobile OS and application security issues given a scenario.
  • LHA.ACS.220-1102.027: Students will implement best practices associated with documentation and support systems information management given a scenario.
  • LHA.ACS.220-1102.028: Students will explain basic change-management best practices.
  • LHA.ACS.220-1102.029: Students will implement workstation backup and recovery methods given a scenario.
  • LHA.ACS.220-1102.030: Students will use common safety procedures given a scenario.
  • LHA.ACS.220-1102.031: Students will summarize environmental impacts and local environmental controls.
  • LHA.ACS.220-1102.032: Students will explain the importance of prohibited content/activity and privacy, licensing, and policy concepts.
  • LHA.ACS.220-1102.033: Students will use proper communication techniques and professionalism given a scenario.
  • LHA.ACS.220-1102.034: Students will identify the basics of scripting.
  • LHA.ACS.220-1102.035: Students will use remote access technologies given a scenario.

CompTIA A+ Core 2 (220-1202)

  • LHA.ACS.220-1202.001: Students will explain common operating system (OS) types and their purposes.
  • LHA.ACS.220-1202.002: Students will perform OS installations and upgrades in a diverse environment given a scenario.
  • LHA.ACS.220-1202.003: Students will compare and contrast basic features of Microsoft Windows editions.
  • LHA.ACS.220-1202.004: Students will use Microsoft Windows operating system features and tools given a scenario.
  • LHA.ACS.220-1202.005: Students will use the appropriate Microsoft command-line tools given a scenario.
  • LHA.ACS.220-1202.006: Students will configure Microsoft Windows settings given a scenario.
  • LHA.ACS.220-1202.007: Students will explain common features and tools of the macOS/desktop operating system.
  • LHA.ACS.220-1202.008: Students will identify common features and tools of the Linux client/desktop operating system.
  • LHA.ACS.220-1202.009: Students will install applications according to requirements given a scenario.
  • LHA.ACS.220-1202.010: Students will install and configure cloud-based productivity tools given a scenario.
  • LHA.ACS.220-1202.011: Students will summarize various security measures and their purposes.
  • LHA.ACS.220-1202.012: Students will compare and contrast wireless security protocols and authentication methods.
  • LHA.ACS.220-1202.013: Students will summarize types of malware and tools/methods for detection, removal, and prevention.
  • LHA.ACS.220-1202.014: Students will compare and contrast common social engineering attacks, threats, and vulnerabilities.
  • LHA.ACS.220-1202.015: Students will apply change procedures to apply change management given a scenario.
  • LHA.ACS.220-1202.016: Students will implement procedures for basic small office/home office (SOHO) malware removal given a scenario.
  • LHA.ACS.220-1202.017: Students will apply workstation security options and hardening techniques given a scenario.
  • LHA.ACS.220-1202.018: Students will apply common methods for securing mobile devices given a scenario.
  • LHA.ACS.220-1202.019: Students will compare and contrast common data destruction and disposal methods.
  • LHA.ACS.220-1202.020: Students will use proper communication techniques and professionalism given a scenario.
  • LHA.ACS.220-1202.021: Students will configure appropriate security settings on small office/home office (SOHO) wireless and wired networks given a scenario.
  • LHA.ACS.220-1202.022: Students will troubleshoot common Windows OS issues given a scenario.
  • LHA.ACS.220-1202.023: Students will troubleshoot common personal computer (PC) security issues given a scenario.
  • LHA.ACS.220-1202.024: Students will use best practice procedures for malware removal given a scenario.
  • LHA.ACS.220-1202.025: Students will troubleshoot common mobile OS and application issues given a scenario.
  • LHA.ACS.220-1202.026: Students will troubleshoot common mobile OS and application security issues given a scenario.
  • LHA.ACS.220-1202.027: Students will use common safety procedures given a scenario.
  • LHA.ACS.220-1202.028: Students will summarize environmental impacts and local environment controls.
  • LHA.ACS.220-1202.029: Students will implement workstation backup and recovery methods given a scenario.
  • LHA.ACS.220-1202.030: Students will use common safety procedures given a scenario.
  • LHA.ACS.220-1202.031: Students will implement best practices associated with documentation and support systems information management given a scenario.
  • LHA.ACS.220-1202.032: Students will apply change management procedures given a scenario.
  • LHA.ACS.220-1202.033: Students will explain the basics of scripting.
  • LHA.ACS.220-1202.034: Students will use remote access technologies given a scenario.
  • LHA.ACS.220-1202.035: Students will explain basic concepts related to artificial intelligence (AI).

CompTIA Network+ (N10-009)

  • LHA.ACS.N10-009.001: Students will explain the purpose of organizational documents and policies.
  • LHA.ACS.N10-009.002: Students will explain high availability and disaster recovery concepts.
  • LHA.ACS.N10-009.003: Students will compare and contrast various devices, their features, and their appropriate placement on the network.
  • LHA.ACS.N10-009.004: Students will compare and contrast routing technologies and bandwidth management concepts.
  • LHA.ACS.N10-009.005: Students will configure and deploy common Ethernet switching features given a scenario.
  • LHA.ACS.N10-009.006: Students will select and configure wireless standards and technologies given a scenario.
  • LHA.ACS.N10-009.007: Students will use the appropriate statistics and sensors to ensure network availability given a scenario.
  • LHA.ACS.N10-009.008: Students will explain the purpose of organizational processes and procedures.
  • LHA.ACS.N10-009.009: Students will explain common data center management processes.
  • LHA.ACS.N10-009.010: Students will troubleshoot common cable connectivity issues and select the appropriate tools given a scenario.
  • LHA.ACS.N10-009.011: Students will use the appropriate network software tools and commands given a scenario.
  • LHA.ACS.N10-009.012: Students will troubleshoot common wireless connectivity issues given a scenario.
  • LHA.ACS.N10-009.013: Students will troubleshoot general networking issues given a scenario.
  • LHA.ACS.N10-009.014: Students will implement network hardening techniques given a scenario.
  • LHA.ACS.N10-009.015: Students will compare and contrast types of attacks and vulnerabilities.
  • LHA.ACS.N10-009.016: Students will apply network security features given a scenario.
  • LHA.ACS.N10-009.017: Students will explain the importance of basic network security concepts.
  • LHA.ACS.N10-009.018: Students will implement appropriate wireless security measures given a scenario.
  • LHA.ACS.N10-009.019: Students will explain the purpose of remote access technologies.
  • LHA.ACS.N10-009.020: Students will implement policies, processes, and procedures for remote access given a scenario.

CompTIA Security+ (SY0-701)

  • LHA.ACS.SY0-701.001: Students will compare and contrast various types of security controls.
  • LHA.ACS.SY0-701.002: Students will summarize fundamental security concepts.
  • LHA.ACS.SY0-701.003: Students will explain the importance of change management processes and the impact to security.
  • LHA.ACS.SY0-701.004: Students will explain the importance of using appropriate cryptographic solutions.
  • LHA.ACS.SY0-701.005: Students will compare and contrast common threat actors and motivations.
  • LHA.ACS.SY0-701.006: Students will explain common threat vectors and attack surfaces.
  • LHA.ACS.SY0-701.007: Students will explain various types of vulnerabilities.
  • LHA.ACS.SY0-701.008: Students will analyze indicators of malicious activity given a scenario.
  • LHA.ACS.SY0-701.009: Students will explain the purpose of mitigation techniques used to secure the enterprise.
  • LHA.ACS.SY0-701.010: Students will compare and contrast security implications of different architecture models.
  • LHA.ACS.SY0-701.011: Students will apply security principles to secure enterprise infrastructure given a scenario.
  • LHA.ACS.SY0-701.012: Students will compare and contrast concepts and strategies to protect data.
  • LHA.ACS.SY0-701.013: Students will explain the importance of resilience and recovery in security architecture.
  • LHA.ACS.SY0-701.014: Students will apply common security techniques to computing resources given a scenario.
  • LHA.ACS.SY0-701.015: Students will explain the security implications of proper hardware, software, and data asset management.
  • LHA.ACS.SY0-701.016: Students will explain various activities associated with vulnerability management.
  • LHA.ACS.SY0-701.017: Students will explain security alerting and monitoring concepts and tools.
  • LHA.ACS.SY0-701.018: Students will modify enterprise capabilities to enhance security given a scenario.
  • LHA.ACS.SY0-701.019: Students will implement and maintain identity and access management given a scenario.
  • LHA.ACS.SY0-701.020: Students will explain the importance of automation and orchestration related to secure operations.
  • LHA.ACS.SY0-701.021: Students will explain appropriate incident response activities.
  • LHA.ACS.SY0-701.022: Students will use data sources to support an investigation given a scenario.
  • LHA.ACS.SY0-701.023: Students will summarize elements of effective security governance.
  • LHA.ACS.SY0-701.024: Students will explain elements of the risk management process.
  • LHA.ACS.SY0-701.025: Students will explain the processes associated with third-party risk assessment and management.
  • LHA.ACS.SY0-701.026: Students will summarize elements of effective security compliance.
  • LHA.ACS.SY0-701.027: Students will explain types and purposes of audits and assessments.
  • LHA.ACS.SY0-701.028: Students will implement security awareness practices given a scenario.

CompTIA CySA+ (CS0-003)

  • LHA.ACS.CS0-003.001: Students will explain the importance of system and network architecture concepts in security operations.
  • LHA.ACS.CS0-003.002: Students will analyze indicators of potentially malicious activity given a scenario.
  • LHA.ACS.CS0-003.003: Students will use appropriate tools or techniques to determine malicious activity given a scenario.
  • LHA.ACS.CS0-003.004: Students will compare and contrast threat-intelligence and threat-hunting concepts.
  • LHA.ACS.CS0-003.005: Students will explain the importance of efficiency and process improvement in security operations.
  • LHA.ACS.CS0-003.006: Students will implement vulnerability scanning methods and concepts given a scenario.
  • LHA.ACS.CS0-003.007: Students will analyze output from vulnerability assessment tools given a scenario.
  • LHA.ACS.CS0-003.008: Students will analyze data to prioritize vulnerabilities given a scenario.
  • LHA.ACS.CS0-003.009: Students will recommend controls to mitigate attacks and software vulnerabilities given a scenario.
  • LHA.ACS.CS0-003.010: Students will explain concepts related to vulnerability response, handling, and management.
  • LHA.ACS.CS0-003.011: Students will explain concepts related to attack methodology frameworks.
  • LHA.ACS.CS0-003.012: Students will perform incident response activities given a scenario.
  • LHA.ACS.CS0-003.013: Students will explain the preparation and post-incident activity phases of the incident management life cycle.
  • LHA.ACS.CS0-003.014: Students will explain the importance of vulnerability management reporting and communication.
  • LHA.ACS.CS0-003.015: Students will explain the importance of incident response reporting and communication.

CompTIA PenTest+ (PT0-003)

  • LHA.ACS.PT0-003.001: Students will summarize pre-engagement activities.
  • LHA.ACS.PT0-003.002: Students will explain collaboration and communication activities.
  • LHA.ACS.PT0-003.003: Students will compare and contrast testing frameworks and methodologies.
  • LHA.ACS.PT0-003.004: Students will explain the components of a penetration test report.
  • LHA.ACS.PT0-003.005: Students will analyze the findings and recommend the appropriate remediation within a report given a scenario.
  • LHA.ACS.PT0-003.006: Students will apply information gathering techniques given a scenario.
  • LHA.ACS.PT0-003.007: Students will apply enumeration techniques given a scenario.
  • LHA.ACS.PT0-003.008: Students will modify scripts for reconnaissance and enumeration given a scenario.
  • LHA.ACS.PT0-003.009: Students will use the appropriate tools for reconnaissance and enumeration given a scenario.
  • LHA.ACS.PT0-003.010: Students will conduct vulnerability discovery using various techniques given a scenario.
  • LHA.ACS.PT0-003.011: Students will analyze output from reconnaissance, scanning, and enumeration phases given a scenario.
  • LHA.ACS.PT0-003.012: Students will explain physical security concepts.
  • LHA.ACS.PT0-003.013: Students will analyze output to prioritize and prepare attacks given a scenario.
  • LHA.ACS.PT0-003.014: Students will perform network attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.015: Students will perform authentication attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.016: Students will perform host-based attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.017: Students will perform web application attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.018: Students will perform cloud-based attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.019: Students will perform wireless attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.020: Students will perform social engineering attacks using the appropriate tools given a scenario.
  • LHA.ACS.PT0-003.021: Students will explain common attacks against specialized systems.
  • LHA.ACS.PT0-003.022: Students will use scripting to automate attacks given a scenario.
  • LHA.ACS.PT0-003.023: Students will perform tasks to establish and maintain persistence given a scenario.
  • LHA.ACS.PT0-003.024: Students will perform tasks to move laterally throughout the environment given a scenario.
  • LHA.ACS.PT0-003.025: Students will summarize concepts related to staging and exfiltration.
  • LHA.ACS.PT0-003.026: Students will explain cleanup and restoration activities.

CompTIA SecurityX (CAS-005)

  • LHA.ACS.CAS-005.001: Students will implement the appropriate governance components given a set of organizational security requirements.
  • LHA.ACS.CAS-005.002: Students will perform risk management activities given a set of organizational security requirements.
  • LHA.ACS.CAS-005.003: Students will explain how compliance affects information security strategies.
  • LHA.ACS.CAS-005.004: Students will perform threat-modeling activities given a scenario.
  • LHA.ACS.CAS-005.005: Students will summarize the information security challenges associated with artificial intelligence (AI) adoption.
  • LHA.ACS.CAS-005.006: Students will analyze requirements to design resilient systems given a scenario.
  • LHA.ACS.CAS-005.007: Students will implement security in the early stages of the systems life cycle and throughout subsequent stages given a scenario.
  • LHA.ACS.CAS-005.008: Students will integrate appropriate controls in the design of a secure architecture given a scenario.
  • LHA.ACS.CAS-005.009: Students will apply security concepts to the design of access, authentication, and authorization systems given a scenario.
  • LHA.ACS.CAS-005.010: Students will securely implement cloud capabilities in an enterprise environment given a scenario.
  • LHA.ACS.CAS-005.011: Students will integrate Zero Trust concepts into system architecture design given a scenario.
  • LHA.ACS.CAS-005.012: Students will troubleshoot common issues with identity and access management (IAM) components in an enterprise environment given a scenario.
  • LHA.ACS.CAS-005.013: Students will analyze requirements to enhance the security of endpoints and servers given a scenario.
  • LHA.ACS.CAS-005.014: Students will troubleshoot complex network infrastructure security issues given a scenario.
  • LHA.ACS.CAS-005.015: Students will implement hardware security technologies and techniques given a scenario.
  • LHA.ACS.CAS-005.016: Students will secure specialized and legacy systems against threats given a set of requirements.
  • LHA.ACS.CAS-005.017: Students will use automation to secure the enterprise given a scenario.
  • LHA.ACS.CAS-005.018: Students will explain the importance of advanced cryptographic concepts.
  • LHA.ACS.CAS-005.019: Students will apply the appropriate cryptographic use case and/or technique given a scenario.
  • LHA.ACS.CAS-005.020: Students will analyze data to enable monitoring and response activities given a scenario.
  • LHA.ACS.CAS-005.021: Students will analyze vulnerabilities and attacks, and recommend solutions to reduce the attack surface given a scenario.
  • LHA.ACS.CAS-005.022: Students will apply threat-hunting and threat intelligence concepts given a scenario.
  • LHA.ACS.CAS-005.023: Students will analyze data and artifacts in support of incident response activities given a scenario.
  • LHA.ACS.CAS-005.024: Students will summarize elements of effective security governance.
  • LHA.ACS.CAS-005.025: Students will explain elements of the risk management process.
  • LHA.ACS.CAS-005.026: Students will explain the processes associated with third-party risk assessment and management.
  • LHA.ACS.CAS-005.027: Students will summarize elements of effective security compliance.
  • LHA.ACS.CAS-005.028: Students will explain types and purposes of audits and assessments.
  • LHA.ACS.CAS-005.029: Students will implement security awareness practices given a scenario.

Appendix A: References

CompTIA. (2021). CompTIA A+ Core 2 220-1102 certification exam: Exam objectives (Version 1.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-a-plus-220-1102-exam-objectives-(1-0).pdf

CompTIA. (2024). CompTIA A+ 220-1201 V15 certification exam: Exam objectives (Version 3.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-a-plus-220-1201-exam-objectives-(3-0).pdf

CompTIA. (2024). CompTIA A+ Core 2 (220-1202) V15 certification exam: Exam objectives (Version 3.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-a-plus-220-1202-exam-objectives-(3-0).pdf

CompTIA. (2023). CompTIA SecurityX CAS-005 certification exam: Exam objectives (Version 3.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-securityx-cas-005-exam-objectives-(3-0).pdf

CompTIA. (2022). CompTIA Cybersecurity Analyst (CySA+) CS0-003 certification exam: Exam objectives (Version 4.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-cysa-cs0-003-exam-objectives-(4-0).pdf

CompTIA. (2018). CompTIA IT Fundamentals (ITF+) FC0-U61 certification exam objectives (Version 3.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-it-fundamentals-fc0-u61-exam-objectives-(3-0).pdf

CompTIA. (2023). CompTIA Network+ N10-009 certification exam: Exam objectives (Version 4.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-network-n10-009-exam-objectives-(4-0).pdf

CompTIA. (2023). CompTIA PenTest+ PT0-003 certification exam: Exam objectives (Version 3.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-pentest-pt0-003-exam-objectives-(3-0).pdf

CompTIA. (2023). CompTIA Security+ SY0-701 certification exam: Exam objectives (Version 5.0) [PDF]. https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-security-sy0-701-exam-objectives-(5-0).pdf

Smith, G., & Pearce, C. (2020). Everything you need to ace computer science and coding in one big fat notebook: The complete middle school study guide. Workman Publishing.