| 1.1 |
Compare and contrast notational systems. |
Lessons
|
| 1.2 |
Compare and contrast fundamental data types and their characteristics. |
Lessons
|
| 1.3 |
Illustrate the basics of computing and processing. |
Lessons
|
| 1.4 |
Explain the value of data and information. |
Lessons
|
| 1.5 |
Compare and contrast common units of measure. |
Lessons
|
| 1.6 |
Explain the troubleshooting methodology. |
Lessons
|
| 2.1 |
Classify common types of input/output device interfaces. |
Lessons
|
| 2.2 |
Given a scenario, set up and install common peripheral devices to a laptop/PC. |
Lessons
|
| 2.3 |
Explain the purpose of common internal computing components. |
Lessons
|
| 2.4 |
Compare and contrast common Internet service types. |
Lessons
|
| 2.5 |
Compare and contrast storage types. |
Lessons
|
| 2.6 |
Compare and contrast common computing devices and their purposes. |
Lessons
|
| 2.7 |
Explain basic networking concepts. |
Lessons
|
| 2.8 |
Given a scenario, install, configure and secure a basic wireless network. |
Lessons
|
| 3.1 |
Explain the purpose of operating systems. |
Lessons
|
| 3.2 |
Compare and contrast components of an operating system. |
Lessons
|
| 3.3 |
Explain the purpose and proper use of software. |
Lessons
|
| 3.4 |
Explain methods of application architecture and delivery models. |
Lessons
|
| 3.5 |
Given a scenario, configure and use web browsers. |
Lessons
|
| 3.6 |
Compare and contrast general application concepts and uses. |
Lessons
|
| 4.1 |
Compare and contrast programming language categories. |
Lessons
|
| 4.2 |
Given a scenario, use programming organizational techniques and interpret logic. |
Lessons
|
| 4.3 |
Explain the purpose and use of programming concepts. |
Lessons
|
| 5.1 |
Explain database concepts and the purpose of a database. |
Lessons
|
| 5.2 |
Compare and contrast various database structures. |
Lessons
|
| 5.3 |
Summarize methods used to interface with databases. |
Lessons
|
| 6.1 |
Summarize confidentiality, integrity and availability concerns. |
Lessons
|
| 6.2 |
Explain methods to secure devices and best practices. |
Lessons
|
| 6.3 |
Summarize behavioral security concepts. |
Lessons
|
| 6.4 |
Compare and contrast authentication, authorization, accounting and non-repudiation concepts. |
Lessons
|
| 6.5 |
Explain password best practices. |
Lessons
|
| 6.6 |
Explain common uses of encryption. |
Lessons
|
| 6.7 |
Explain business continuity concepts. |
Lessons
|