127.769.1A |
(A) identify and demonstrate employable work behaviors such as regular attendance, punctuality, maintenance of a professional work environment, and effective written and verbal communication; |
Lessons
|
127.769.1B |
(B) identify and demonstrate positive personal qualities such as authenticity, resilience, initiative, and a willingness to learn new knowledge and skills; |
Lessons
|
127.769.1C |
(C) solve problems and think critically; |
Lessons
|
127.769.1D |
(D) demonstrate leadership skills and function effectively as a team member; and |
Lessons
|
127.769.1E |
(E) demonstrate an understanding of ethical and legal responsibilities in relation to the field of cybersecurity. |
Lessons
|
127.769.2A |
(A) identify job and internship opportunities as well as accompanying duties and tasks; |
Lessons
|
127.769.2B |
(B) research careers in cybersecurity and information assurance along with the education and job skills required for obtaining a job in both the public and private sectors; |
Lessons
|
127.769.2C |
(C) identify and discuss certifications for cybersecurity-related careers; and |
Lessons
|
127.769.2D |
(D) research and develop resumes, digital portfolios, or professional profiles in the cybersecurity field. |
Lessons
|
127.769.3A |
(A) demonstrate and advocate for ethical and legal behaviors both online and offline among peers, family, community, and employers; |
Lessons
|
127.769.3B |
(B) research local, state, national, and international cyber law such as the PATRIOT Act of 2001, General Data Protection Regulation, and Digital Millennium Copyright Act; |
Lessons
|
127.769.3C |
(C) research historic cases or events regarding cyber; |
Lessons
|
127.769.3D |
(D) demonstrate an understanding of ethical and legal behavior when presented with various scenarios related to cyber activities; |
Lessons
|
127.769.3E |
(E) define and identify techniques such as hacking, phishing, social engineering, online piracy, spoofing, and data vandalism; and |
Lessons
|
127.769.3F |
(F) identify and use appropriate methods for citing sources. |
Lessons
|
127.769.4A |
(A) identify motivations for hacking; |
Lessons
|
127.769.4B |
(B) identify and describe the impact of cyberattacks on the global community, society, and individuals; |
Lessons
|
127.769.4C |
(C) distinguish between a cyber attacker and a cyber defender; |
Lessons
|
127.769.4D |
(D) differentiate types of hackers such as black hats, white hats, and gray hats; |
Lessons
|
127.769.4E |
(E) determine possible outcomes and legal ramifications of ethical versus malicious hacking practices; and |
Lessons
|
127.769.4F |
(F) debate the varying perspectives of ethical versus malicious hacking. |
Lessons
|
127.769.5A |
(A) define cyberterrorism, state-sponsored cyberterrorism, and hacktivism; |
Lessons
|
127.769.5B |
(B) compare and contrast physical terrorism and cyberterrorism, including domestic and foreign actors; |
Lessons
|
127.769.5C |
(C) define and explain intelligence gathering and counterterrorism; |
Lessons
|
127.769.5D |
(D) identify the role of cyber defenders in protecting national interests and corporations; |
Lessons
|
127.769.5E |
(E) identify the role of cyber defense in society and the global economy; and |
Lessons
|
127.769.5F |
(F) explain the importance of protecting public infrastructures such as electrical power grids, water systems, pipelines, transportation, and nuclear plants. |
Lessons
|
127.769.6A |
(A) identify and understand the nature and value of privacy; |
Lessons
|
127.769.6B |
(B) analyze the positive and negative implications of a digital footprint and the maintenance and monitoring of an online presence; |
Lessons
|
127.769.6C |
(C) discuss the role and impact of technology on privacy; |
Lessons
|
127.769.6D |
(D) identify the signs, emotional effects, and legal consequences of cyberbullying and cyberstalking; and |
Lessons
|
127.769.6E |
(E) identify and discuss effective ways to prevent, deter, and report cyberbullying. |
Lessons
|
127.769.7A |
(A) define information security and cyber defense; |
Lessons
|
127.769.7B |
(B) identify basic risk management and risk assessment principles related to cybersecurity threats and vulnerabilities; |
Lessons
|
127.769.7C |
(C) explain the fundamental concepts of confidentiality, integrity, availability, authentication, and authorization; |
Lessons
|
127.769.7D |
(D) describe the inverse relationship between privacy and security; |
Lessons
|
127.769.7E |
(E) identify and analyze cybersecurity breaches and incident responses; |
Lessons
|
127.769.7F |
(F) identify and analyze security concerns in areas such as physical, network, cloud, and web; |
Lessons
|
127.769.7G |
(G) define and discuss challenges faced by cybersecurity professionals; |
Lessons
|
127.769.7H |
(H) identify common risks, alerts, and warning signs of compromised computer and network systems; |
Lessons
|
127.769.7I |
(I) understand and explore the vulnerability of network-connected devices; and |
Lessons
|
127.769.7J |
(J) use appropriate cybersecurity terminology. |
Lessons
|
127.769.8A |
(A) define malware, including spyware, ransomware, viruses, and rootkits; |
Lessons
|
127.769.8B |
(B) identify the transmission and function of malware such as Trojans, worms, and viruses; |
Lessons
|
127.769.8C |
(C) discuss the impact malware has had on the cybersecurity landscape; |
Lessons
|
127.769.8D |
(D) explain the role of reverse engineering for detecting malware and viruses; |
Lessons
|
127.769.8E |
(E) compare free and commercial antivirus software alternatives; and |
Lessons
|
127.769.8F |
(F) compare free and commercial anti-malware software alternatives. |
Lessons
|
127.769.9A |
(A) define system hardening; |
Lessons
|
127.769.9B |
(B) demonstrate basic use of system administration privileges; |
Lessons
|
127.769.9C |
(C) explain the importance of patching operating systems; |
Lessons
|
127.769.9D |
(D) explain the importance of software updates; |
Lessons
|
127.769.9E |
(E) describe standard practices to configure system services; |
Lessons
|
127.769.9F |
(F) explain the importance of backup files; and |
Lessons
|
127.769.9G |
(G) research and understand standard practices for securing computers, networks, and operating systems. |
Lessons
|
127.769.10A |
(A) identify basic network addressing and devices, including switches and routers; |
Lessons
|
127.769.10B |
(B) analyze incoming and outgoing rules for traffic passing through a firewall; |
Lessons
|
127.769.10C |
(C) identify well known ports by number and service provided, including port 22 (ssh), port 80 (http), and port 443 (https); |
Lessons
|
127.769.10D |
(D) identify commonly exploited ports and services, including ports 20 and 21 (ftp) and port 23 (telnet); and |
Lessons
|
127.769.10E |
(E) identify common tools for monitoring ports and network traffic. |
Lessons
|
127.769.11A |
(A) define what constitutes a secure password; |
Lessons
|
127.769.11B |
(B) create a secure password policy, including length, complexity, account lockout, and rotation; |
Lessons
|
127.769.11C |
(C) identify methods of password cracking such as brute force and dictionary attacks; and |
Lessons
|
127.769.11D |
(D) examine and configure security options to allow and restrict access based on user roles. |
Lessons
|
127.769.12A |
(A) identify the different types of user accounts and groups on an operating system; |
Lessons
|
127.769.12B |
(B) explain the fundamental concepts and standard practices related to access control, including authentication, authorization, and accounting; |
Lessons
|
127.769.12C |
(C) compare methods for single- and dual-factor authentication such as passwords, biometrics, personal identification numbers (PINs), and security tokens; |
Lessons
|
127.769.12D |
(D) define and explain the purpose of an air-gapped computer; and |
Lessons
|
127.769.12E |
(E) explain how hashes and checksums may be used to validate the integrity of transferred data. |
Lessons
|
127.769.13A |
(A) explain the importance of digital forensics to law enforcement, government agencies, and corporations; |
Lessons
|
127.769.13B |
(B) identify the role of chain of custody in digital forensics; |
Lessons
|
127.769.13C |
(C) explain the four steps of the forensics process, including collection, examination, analysis, and reporting; |
Lessons
|
127.769.13D |
(D) identify when a digital forensics investigation is necessary; |
Lessons
|
127.769.13E |
(E) identify information that can be recovered from digital forensics investigations such as metadata and event logs; and |
Lessons
|
127.769.13F |
(F) analyze the purpose of event logs and identify suspicious activity. |
Lessons
|
127.769.14A |
(A) explain the purpose of cryptography and encrypting data; |
Lessons
|
127.769.14B |
(B) research historical uses of cryptography; and |
Lessons
|
127.769.14C |
(C) review simple cryptography methods such as shift cipher and substitution cipher. |
Lessons
|
127.769.15A |
(A) define and describe vulnerability, payload, exploit, port scanning, and packet sniffing as they relate to hacking; |
Lessons
|
127.769.15B |
(B) define and describe cyberattacks, including man-in-the-middle, distributed denial of service, and spoofing; |
Lessons
|
127.769.15C |
(C) explain how computer vulnerabilities leave systems open to cyberattacks; |
Lessons
|
127.769.15D |
(D) identify threats to systems such as back-door attacks and insider threats; |
Lessons
|
127.769.15E |
(E) differentiate types of social engineering attacks such as phishing, shoulder surfing, hoaxes, and dumpster diving; |
Lessons
|
127.769.15F |
(F) explain how users are the most common vehicle for compromising a system at the application level; and |
Lessons
|
127.769.15G |
(G) identify various types of application-specific attacks. |
Lessons
|
127.769.16A |
(A) identify internal and external threats to computer systems; |
Lessons
|
127.769.16B |
(B) identify the capabilities of vulnerability assessment tools, including open source tools; and |
Lessons
|
127.769.16C |
(C) explain the concept of penetration testing, tools, and techniques. |
Lessons
|
127.769.17A |
(A) compare risks associated with connecting devices to public and private wireless networks; |
Lessons
|
127.769.17B |
(B) explain device vulnerabilities and security solutions on a wireless network; |
Lessons
|
127.769.17C |
(C) compare wireless encryption protocols; |
Lessons
|
127.769.17D |
(D) debate the broadcasting or hiding of a wireless service set identifier (SSID); and |
Lessons
|
127.769.17E |
(E) research and discuss wireless threats such as MAC spoofing and war driving. |
Lessons
|
127.769.18A |
(A) define application security; |
Lessons
|
127.769.18B |
(B) identify methods of application security such as secure development practices; |
Lessons
|
127.769.18C |
(C) discuss methods of online spoofing such as web links in email, instant messaging, social media, and other online communication with malicious links; |
Lessons
|
127.769.18D |
(D) explain the purpose and function of vulnerability scanners; |
Lessons
|
127.769.18E |
(E) explain how coding errors may create system vulnerabilities; and |
Lessons
|
127.769.18F |
(F) analyze the risks of distributing insecure programs. |
Lessons
|
127.769.19A |
(A) describe the impact of granting applications unnecessary permissions; |
Lessons
|
127.769.19B |
(B) describe the risks of granting third parties access to personal and proprietary data on social media and systems; and |
Lessons
|
127.769.19C |
(C) describe the risks involved with accepting Terms of Service (ToS) or End User License Agreements (EULA) without a basic understanding of the terms or agreements. |
Lessons
|