Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1.1
Explain network security (e.g., the protection of data that is stored on the network or which is in transit across, into, and out of the network) |
|
1.2
Describe the responsibilities of a network security technician (i.e., ensure the network works securely, test and configure software, provide IT support, troubleshoot the network or server, resolve infrastructure issues, etc.) |
|
1.3
Identify skills and ethical characteristics needed to be a successful network security technician (i.e., critical thinking, problem solving, prioritizing, reading, and interpreting network diagrams and technical schematics, preparing and presenting technical information verbally and in writing to different audiences, keeping up to date on network security, etc.) |
|
1.4
Describe education and training opportunities including industry certifications and licensures (i.e., CompTIA, CISCO, CISSP, CEH, etc.) |
|
1.5
Identify career opportunities in network security |
|
2.1
Identify hazards and unsafe practices that can lead to serious accidents or injuries (i.e., electrostatic discharge hazards, poor ergonomic practices, etc.) |
|
2.2
Describe OSHA and other state and national regulations designed to reduce safety risks and workplace injuries |
|
2.3
Explain environmental considerations when disposing of computer/network components (i.e., disposing of batteries, devices with lithium batteries, etc.) |
|
2.4
Use techniques to manage power consumption in the networked environment (i.e., test wattage usage, power control, explore green methods such as climate batteries and energy efficiency methods, cloud-based software, etc.) |
|
2.5
Identify energy efficiencies and suggest ways to improve consumption (i.e., office environment AC units, thermostats, computer power settings, etc.) |
|
2.6
Use, maintain, and store tools and equipment according to manufacturer’s standards |
|
3.1
Define the number base systems in mathematics related to network technology |
|
3.2
Perform decimal to binary and binary to decimal conversions (e.g., dotted decimal IPv4) |
|
3.3
Perform decimal to hexadecimal and hexadecimal to decimal conversions |
|
3.4
Perform hexadecimal to binary and binary to hexadecimal conversions |
|
3.5
Determine the appropriate method to perform conversions (e.g., paper-pencil and electronic resources) |
|
3.6
Use basic Boolean logic for actions such as Google searches and scripting (e.g., and, not, and or) |
|
4.1
Define a computer and describe its components and their basic functions (i.e., OSI Model and TCP/IP Model; Input Unit, Output Unit, and Central Processing Unit; displaying data, coding, transferring and processing data; programming programs; etc.) |
|
4.2
Discuss the evolution of computers and future trends in computer networking (i.e., ARPANET, Internet of Things (IoT), privacy, etc.) and societal impacts |
|
4.3
Discuss issues and controversies pertaining to the evolution of mobile computing and the dissemination and centralization of data and its societal impacts (i.e., IoT, Microsoft, Google, anticompetitive practices, privacy, etc.) |
|
4.4
Explain an information system’s structure and components (e.g., applications, media, network devices, operating systems, and servers) |
|
4.5
Discuss recent advancements in cybersecurity technologies, threats, and the basics of artificial intelligence (AI) concerning network security |
|
4.6
Discuss emerging problem-solving methodologies such as Zero Trust principles and AI-driven threat detection |
|
5.1
Explain the risk management process (i.e., define risk, determine risk level, identify methods to address risk, identify inventory assets that may be compromised, identify functionalities, etc.) |
|
5.2
Define network threats to data availability, confidentiality, and integrity |
|
5.3
Discuss and give examples of the severity of data loss to an individual and to an organization |
|
5.4
Identify security threats related to computer data, hardware, and software (e.g., denial of service, eavesdropping, intrusion, unauthorized access, spoofing, tampering, etc.) |
|
5.5
Explain the importance of physical security of computer and network hardware following best practices (e.g., cameras, locks, USB port blocking, encryption, bit-locker for Windows, and LBM for Linux) |
|
5.6
Describe network threats (e.g., denial of service, email spoofing, hacking/cracking, intrusion, malware, phishing, social engineering, spamming, etc.) |
|
5.7
Describe best practices to protect against network threats of data at rest, data in transit, and data during processing (e.g., access control, antivirus software, awareness and training, encryption, firewalls, intrusion detection/prevention, network segmentation, port/service blocking, software updates, etc.) |
|
5.8
Describe password best practices (e.g., authentication, authorization, accountability, passphrases, physical keys, password managers, complexity, etc.) |
|
5.9
Analyze authentication methods used to secure access to the network (e.g., biometrics, key cards, multi-factor authentication (MFA), single sign-on (SSO), two-factor authentication (2FA), etc.) |
|
5.10
Identify best practices for access control (e.g., changing default passwords, disabling unused accounts, least privileges, role-based access control, etc.) |
|
6.1
Explain the purpose of and types of network media (e.g., fiber optic cable, coaxial cable, ethernet, etc.) |
|
6.2
Explain the purpose and types of topologies (e.g., bus, ring, tree, star, mesh, etc.) |
|
6.3
Compare proper physical network topology |
|
6.4
Identify appropriate connectors, media types, and uses for various networks |
|
6.5
Compare physical and virtual networks (e.g., SD-WAN, VLAN, etc.) |
|
6.6
Specify the characteristics of physical network technologies including cable types, length, speed, and topology |
|
6.7
Specify the characteristics of wireless network technologies including frequency, speed, topology, and transmission (e.g., 5G, Bluetooth, IoT, etc.) |
|
6.8
Describe the structure of the internet (network of networks) |
|
6.9
Identify the features, functions, and purpose of commonly used network components (e.g., routers, modems, switches, NIC, etc.) |
|
7.1
Define a network protocol and explain how it works (e.g., routing protocols) |
|
7.2
Describe the characteristics and use of the four-layer TCP/IP model (e.g., Media Access Control (MAC)) |
|
7.3
Describe the characteristics and use of the seven layers of the OSI model |
|
7.4
Explain the concept of ports and identify the port ranges used in networking services and protocols (e.g., dynamic/private, system, user) |
|
7.5
Explain the purpose of dynamic and static routing protocols |
|
7.6
Describe standard network ports and protocols (e.g., DNS, DHCP, FTP, HTTP, POP, SMTP, HTTPS, SFTP, VPN, SSH, ICMP/ARP, etc.) |
|
7.7
Describe the applications and characteristics of TCP and UDP |
|
7.8
Differentiate IPv4/IPv6 addresses and their corresponding subnet masks (e.g., classful networks, CIDR, private vs. public IP) |
|
7.9
Summarize the basic characteristics and protocols of MAN, SD-WAN, and WAN technologies (e.g., frame relay, etc.) |
|
7.10
Describe remote access protocols and services (e.g., RDP, terminal emulator, etc.) |
|
7.11
Describe the function and purpose of security protocols (e.g., HTTPS, SFTP, VPN, PPTP, etc.) |
|
7.12
Explain the importance of proper documentation according to industry standards |
|
7.13
Discuss where RFCs (standards) are developed (e.g., IETF, IEEE, 3GPP, etc.) |
|
7.14
Describe methods to determine priorities in establishing and maintaining a computer network |
|
8.1
Design a network map with virtual and physical segments (e.g., logical network map) |
|
8.2
Construct dynamic and static routes |
|
8.3
Explain labeling according to industry standards (e.g., cable, device, rack, wall plates, etc.) |
|
8.4
Describe the components needed and purpose to build fault tolerance into a network |
|
8.5
Describe the purpose of a disaster recovery plan for a network |
|
8.6
Install and configure a physical and/or virtual networking system (e.g., Linux/UNIX, Windows) |
|
8.7
Configure network cards, network settings, and an operating system that provides common services for computer programs |
|
8.8
Configure and connect devices to the network (e.g., computers, printers, routers, switches, etc.) |
|
8.9
Identify and use tools for diagnostic tasks or network repair (e.g., Traceroute, ipconfig, Ping, etc.) |
|
9.1
Explain how to harden the network against unauthorized access and abuse |
|
9.2
Explain the difference among hardening, patching, and types of vulnerabilities (e.g., social, cognitive, environmental, etc.) |
|
9.3
Identify common network threats (e.g., denial of service, eavesdropping, intrusion, etc.) |
|
9.4
Identify physical network threats (e.g., disrupting media, environmental/power disruption, etc.) |
|
9.5
Describe the benefits and purpose of segmenting networks (e.g., VLAN, DMZ, etc.) |
|
9.6
Describe the benefits of enabling and disabling ports and network services |
|
9.7
Describe techniques to secure a Wi-Fi network (e.g., WPA, WPA3, etc.) |
|
9.8
Explain the principles of firewall rules and their importance in network hardening |
|
9.9
Describe the benefits, disadvantages, and purposes of using a proxy service |
|
9.10
Describe the benefits, disadvantages, and purposes of using network intrusion detection/prevention systems (e.g., IDS/IPS, SIEM, etc.) |
|
10.1
Explain the troubleshooting process (e.g., define problem, identify probable cause, test hypothesis, create action, implement action plan, verify solution, and document) |
|
10.2
Prepare a work/maintenance plan and prioritize and schedule network security tasks (e.g., Cron Jobs) |
|
10.3
Describe the purpose and benefits of network utilities (e.g., netstat, nslookup, Ping, Traceroute, etc.) |
|
10.4
Demonstrate the use of visual indicators and diagnostic utilities (e.g., Wireshark) to interpret problems |
|
10.5
Identify connectivity issues in various node environments (e.g., smartphones, switches, tablets, Linux/UNIX, Windows, etc.) |
|
10.6
Identify and resolve network issues (e.g., cable failure, connection failure, environmental, misconfigurations, power failure, user error, etc.) |
|
10.7
Identify common tools and methods for monitoring a network (e.g., automation, scripting, AI tools, etc.) |
|
10.8
Describe AI and Machine Learning-based tools for network maintenance and issue resolution |
|
11.1
Research issues regarding intellectual property rights including software licensing and software duplication (e.g., Business Software Alliance, Creative Commons, Digital Right Management, EFF, and Intellectual Property Watch) |
|
11.2
Differentiate among freeware, open source, proprietary, and shareware software relative to legal and ethical issues |
|
11.3
Identify issues, laws, and trends affecting data and privacy (e.g., CNP, GDPR, HIPAA, PCI-DSS, SOX, FCC, FERPA) |
|
11.4
Describe acceptable use of industry-related data, private and public networks, and social networking |
|
11.5
Research how data privacy laws and regulations influence network security business practices |
|
11.6
Discuss the responsibilities of network security professionals (e.g., protecting organizational assets, and maintaining consistent and equitable cyber practices) and explore consequences of unethical behavior to include personal legal liability |
|