1 |
Demonstrate creativity and innovation. |
Lessons
|
2 |
Demonstrate critical thinking and problem solving. |
Lessons
|
3 |
Demonstrate initiative and self-direction. |
Lessons
|
4 |
Demonstrate integrity. |
Lessons
|
5 |
Demonstrate work ethic. |
Lessons
|
6 |
Demonstrate conflict-resolution skills. |
Lessons
|
7 |
Demonstrate listening and speaking skills. |
Lessons
|
8 |
Demonstrate respect for diversity. |
Lessons
|
9 |
Demonstrate customer service skills. |
Lessons
|
10 |
Collaborate with team members. |
Lessons
|
11 |
Demonstrate big-picture thinking. |
Lessons
|
12 |
Demonstrate career- and life-management skills. |
Lessons
|
13 |
Demonstrate continuous learning and adaptability. |
Lessons
|
14 |
Manage time and resources. |
Lessons
|
15 |
Demonstrate information-literacy skills. |
Lessons
|
16 |
Demonstrate an understanding of information security. |
Lessons
|
17 |
Maintain working knowledge of current information-technology (IT) systems. |
Lessons
|
18 |
Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. |
Lessons
|
19 |
Apply mathematical skills to job-specific tasks. |
Lessons
|
20 |
Demonstrate professionalism. |
Lessons
|
21 |
Demonstrate reading and writing skills. |
Lessons
|
22 |
Demonstrate workplace safety. |
Lessons
|
23 |
Examine aspects of planning within an industry/organization. |
Lessons
|
24 |
Examine aspects of management within an industry/organization. |
Lessons
|
25 |
Examine aspects of financial responsibility within an industry/organization. |
Lessons
|
26 |
Examine technical and production skills required of workers within an industry/organization. |
Lessons
|
27 |
Examine principles of technology that underlie an industry/organization. |
Lessons
|
28 |
Examine labor issues related to an industry/organization. |
Lessons
|
29 |
Examine community issues related to an industry/organization. |
Lessons
|
30 |
Examine health, safety, and environmental issues related to an industry/organization. |
Lessons
|
31 |
Identify the purposes and goals of the student organization. |
Lessons
|
32 |
Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. |
Lessons
|
33 |
Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. |
Lessons
|
34 |
Identify Internet safety issues and procedures for complying with acceptable use standards. |
Lessons
|
35 |
Identify the types of work-based learning (WBL) opportunities. |
Lessons
|
36 |
Reflect on lessons learned during the WBL experience. |
Lessons
|
37 |
Explore career opportunities related to the WBL experience. |
Lessons
|
38 |
Participate in a WBL experience, when appropriate. |
Lessons
|
39 |
Describe Cybersecurity |
Lessons
|
40 |
Define information assurance |
Lessons
|
41 |
Describe the critical factors of information security |
Lessons
|
42 |
Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration |
Lessons
|
43 |
Define risk |
Lessons
|
44 |
Identify the concepts of cybersecurity risk management |
Lessons
|
45 |
Describe cybersecurity threats to an organization |
Lessons
|
46 |
Explain why organizations need to manage risk |
Lessons
|
47 |
Discuss national or industry standards/regulations that relate to cybersecurity |
Lessons
|
48 |
Describe the cyberattack surface of various organizations |
Lessons
|
49 |
Analyze risks affecting critical infrastructure |
Lessons
|
50 |
Describe a network |
Lessons
|
51 |
Describe a wired/cabled network |
Lessons
|
52 |
Describe a wireless network |
Lessons
|
53 |
Compare cabled/wired and wireless networks |
Lessons
|
54 |
Compare networking conceptual models |
Lessons
|
55 |
Discuss services, their relationship to the OSI model, and potential vulnerabilities |
Lessons
|
56 |
Differentiate among network types |
Lessons
|
57 |
Examine the concept of the Internet as a network of connected systems |
Lessons
|
58 |
Identify networking protocols |
Lessons
|
59 |
Describe the difference between a cyber threat and a vulnerability |
Lessons
|
60 |
Describe types of cyber threats |
Lessons
|
61 |
Analyze types of current cyber threats |
Lessons
|
62 |
Identify the perpetrators of different types of malicious hacking |
Lessons
|
63 |
Describe the characteristics of vulnerabilities |
Lessons
|
64 |
Identify the prevention of and protection against cyber threats |
Lessons
|
65 |
Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks |
Lessons
|
66 |
Differentiate between ethics and laws |
Lessons
|
67 |
Distinguish among types of ethical concerns |
Lessons
|
68 |
Define cyberbullying |
Lessons
|
69 |
Identify actions that constitute cyberbullying |
Lessons
|
70 |
Identify possible warning signs of someone being cyberbullied |
Lessons
|
71 |
Identify laws applicable to cybersecurity |
Lessons
|
72 |
Explain the concept of “personally identifiable information” |
Lessons
|
73 |
Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it |
Lessons
|
74 |
Identify ways to control and protect personal data |
Lessons
|
75 |
Demonstrate net etiquette (netiquette) as it relates to cybersecurity |
Lessons
|
76 |
Analyze the social and legal significance of the ongoing collection of personal digital information |
Lessons
|
77 |
Distinguish between data, information, and knowledge |
Lessons
|
78 |
Identify the most common ways data is collected |
Lessons
|
79 |
Identify the most common ways data can be stored |
Lessons
|
80 |
Explain the difference between data at rest, data in transit, and data being processed |
Lessons
|
81 |
Identify the most common ways data is used |
Lessons
|
82 |
Discuss how data can be compromised, corrupted, or lost |
Lessons
|
83 |
Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) |
Lessons
|
84 |
Define the function of a computer operating system |
Lessons
|
85 |
Identify the components of an operating system |
Lessons
|
86 |
List types of operating systems |
Lessons
|
87 |
Evaluate the potential vulnerabilities, threats, and common exploits to an operating system |
Lessons
|
88 |
Identify best practices for protecting operating systems |
Lessons
|
89 |
Describe the concept of malware and techniques to guard against it |
Lessons
|
90 |
Evaluate critical operating system security parameters |
Lessons
|
91 |
Describe security and auditing logs |
Lessons
|
92 |
Describe the role of a system backup |
Lessons
|
93 |
Define virtualization technology |
Lessons
|
94 |
Identify advantages and disadvantages of using virtual machines |
Lessons
|
95 |
Define programming in the context of cybersecurity |
Lessons
|
96 |
Differentiate between computer programming languages |
Lessons
|
97 |
Evaluate common programming flaws that lead to vulnerabilities |
Lessons
|
98 |
Identify best practices in secure coding and design |
Lessons
|
99 |
Identify ubiquitous computing |
Lessons
|
100 |
Discuss security and privacy implications of ubiquitous computing |
Lessons
|
101 |
Research career opportunities for cybersecurity professionals |
Lessons
|
102 |
Identify the educational pathways for emerging cybersecurity professionals |
Lessons
|
103 |
Identify the educational pathways for emerging cybersecurity professionals |
Lessons
|
104 |
Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters |
Lessons
|
105 |
Research the cyber threats and security measures related to career pathways |
Lessons
|
106 |
Identify testing skills/strategies for a certification examination |
Lessons
|
107 |
Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course |
Lessons
|
108 |
Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) |
Lessons
|
109 |
Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) |
Lessons
|