1.1 |
Compare and contrast notational systems. |
Lessons
|
1.2 |
Compare and contrast fundamental data types and their characteristics. |
Lessons
|
1.3 |
Illustrate the basics of computing and processing. |
Lessons
|
1.4 |
Explain the value of data and information. |
Lessons
|
1.5 |
Compare and contrast common units of measure. |
Lessons
|
1.6 |
Explain the troubleshooting methodology. |
Lessons
|
2.1 |
Classify common types of input/output device interfaces. |
Lessons
|
2.2 |
Given a scenario, set up and install common peripheral devices to a laptop/PC. |
Lessons
|
2.3 |
Explain the purpose of common internal computing components. |
Lessons
|
2.4 |
Compare and contrast common Internet service types. |
Lessons
|
2.5 |
Compare and contrast storage types. |
Lessons
|
2.6 |
Compare and contrast common computing devices and their purposes. |
Lessons
|
2.7 |
Explain basic networking concepts. |
Lessons
|
2.8 |
Given a scenario, install, configure and secure a basic wireless network. |
Lessons
|
3.1 |
Explain the purpose of operating systems. |
Lessons
|
3.2 |
Compare and contrast components of an operating system. |
Lessons
|
3.3 |
Explain the purpose and proper use of software. |
Lessons
|
3.4 |
Explain methods of application architecture and delivery models. |
Lessons
|
3.5 |
Given a scenario, configure and use web browsers. |
Lessons
|
3.6 |
Compare and contrast general application concepts and uses. |
Lessons
|
4.1 |
Compare and contrast programming language categories. |
Lessons
|
4.2 |
Given a scenario, use programming organizational techniques and interpret logic. |
Lessons
|
4.3 |
Explain the purpose and use of programming concepts. |
Lessons
|
5.1 |
Explain database concepts and the purpose of a database. |
Lessons
|
5.2 |
Compare and contrast various database structures. |
Lessons
|
5.3 |
Summarize methods used to interface with databases. |
Lessons
|
6.1 |
Summarize confidentiality, integrity and availability concerns. |
Lessons
|
6.2 |
Explain methods to secure devices and best practices. |
Lessons
|
6.3 |
Summarize behavioral security concepts. |
Lessons
|
6.4 |
Compare and contrast authentication, authorization, accounting and non-repudiation concepts. |
Lessons
|
6.5 |
Explain password best practices. |
Lessons
|
6.6 |
Explain common uses of encryption. |
Lessons
|
6.7 |
Explain business continuity concepts. |
Lessons
|