for Arizona Network Security — Fundamentals of Cybersecurity
Total Standards: 89Mapped: 66Completion: 74%
1.1
Explain network security (e.g., the protection of data that is stored on the network or which is in transit across, into, and out of the network)
Fundamentals of Cybersecurity
1.5 Personal Data Security
2.3 Asymmetric Encryption
2.4 Authentication Methods
8.1 Data as a Resource
Advanced Cybersecurity
3.2 Malware Types and Prevention
3.3 Common Network Attacks
3.4 Additional Attacks
4.2 Cyber Case Investigation
4.4 Network Protocol Defense
1.2
Describe the responsibilities of a network security technician (i.e., ensure the network works securely, test and configure software, provide IT support, troubleshoot the network or server, resolve infrastructure issues, etc.)
Fundamentals of Cybersecurity
7.1 Communication is Key!
10.1 After Fundamentals of Cybersecurity
Advanced Cybersecurity
4.4 Network Protocol Defense
4.5 Security Baseline
1.3
Identify skills and ethical characteristics needed to be a successful network security technician (i.e., critical thinking, problem solving, prioritizing, reading, and interpreting network diagrams and technical schematics, preparing and presenting technical information verbally and in writing to different audiences, keeping up to date on network security, etc.)
Fundamentals of Cybersecurity
7.1 Communication is Key!
10.1 After Fundamentals of Cybersecurity
Advanced Cybersecurity
4.4 Network Protocol Defense
4.5 Security Baseline
1.4
Describe education and training opportunities including industry certifications and licensures (i.e., CompTIA, CISCO, CISSP, CEH, etc.)
Fundamentals of Cybersecurity
10.1 After Fundamentals of Cybersecurity
1.5
Identify career opportunities in network security
Fundamentals of Cybersecurity
7.1 Communication is Key!
10.1 After Fundamentals of Cybersecurity
Advanced Cybersecurity
4.5 Security Baseline
6.1 Network Administrator
2.1
Identify hazards and unsafe practices that can lead to serious accidents or injuries (i.e., electrostatic discharge hazards, poor ergonomic practices, etc.)
Fundamentals of Cybersecurity
8.5 Environmental Controls
2.2
Describe OSHA and other state and national regulations designed to reduce safety risks and workplace injuries
2.3
Explain environmental considerations when disposing of computer/network components (i.e., disposing of batteries, devices with lithium batteries, etc.)
Fundamentals of Cybersecurity
8.5 Environmental Controls
2.4
Use techniques to manage power consumption in the networked environment (i.e., test wattage usage, power control, explore green methods such as climate batteries and energy efficiency methods, cloud-based software, etc.)
2.5
Identify energy efficiencies and suggest ways to improve consumption (i.e., office environment AC units, thermostats, computer power settings, etc.)
2.6
Use, maintain, and store tools and equipment according to manufacturer’s standards
3.1
Define the number base systems in mathematics related to network technology
Fundamentals of Cybersecurity
5.1 Computers Speak Binary
3.2
Perform decimal to binary and binary to decimal conversions (e.g., dotted decimal IPv4)
Fundamentals of Cybersecurity
5.1 Computers Speak Binary
5.2 Bits, Text, and Numbers
3.3
Perform decimal to hexadecimal and hexadecimal to decimal conversions
3.4
Perform hexadecimal to binary and binary to hexadecimal conversions
3.5
Determine the appropriate method to perform conversions (e.g., paper-pencil and electronic resources)
3.6
Use basic Boolean logic for actions such as Google searches and scripting (e.g., and, not, and or)
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
4.1
Define a computer and describe its components and their basic functions (i.e., OSI Model and TCP/IP Model; Input Unit, Output Unit, and Central Processing Unit; displaying data, coding, transferring and processing data; programming programs; etc.)
Fundamentals of Cybersecurity
5.6 Routing and Packets
5.8 OSI Model
6.1 Internal Components
6.3 Peripheral Devices
4.2
Discuss the evolution of computers and future trends in computer networking (i.e., ARPANET, Internet of Things (IoT), privacy, etc.) and societal impacts
Fundamentals of Cybersecurity
1.5 Personal Data Security
1.6 Cybersecurity Essentials
5.6 Routing and Packets
4.3
Discuss issues and controversies pertaining to the evolution of mobile computing and the dissemination and centralization of data and its societal impacts (i.e., IoT, Microsoft, Google, anticompetitive practices, privacy, etc.)
4.4
Explain an information system’s structure and components (e.g., applications, media, network devices, operating systems, and servers)
Fundamentals of Cybersecurity
4.1 Operating Systems
4.6 Software and Applications
6.4 Storage Options
6.5 Network Devices
4.5
Discuss recent advancements in cybersecurity technologies, threats, and the basics of artificial intelligence (AI) concerning network security
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
2.1 Cryptography: Then, Now, and Future
4.6
Discuss emerging problem-solving methodologies such as Zero Trust principles and AI-driven threat detection
Advanced Cybersecurity
3.4 Additional Attacks
9.4 Penetration Testing
5.1
Explain the risk management process (i.e., define risk, determine risk level, identify methods to address risk, identify inventory assets that may be compromised, identify functionalities, etc.)
Fundamentals of Cybersecurity
8.6 Checking for Vulnerabilities
8.7 Risky Business
Advanced Cybersecurity
9.1 Identifying Risks
9.2 Assessing Risks
9.3 Risk Response
5.2
Define network threats to data availability, confidentiality, and integrity
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
5.3
Discuss and give examples of the severity of data loss to an individual and to an organization
Fundamentals of Cybersecurity
4.8 Application Security
5.4
Identify security threats related to computer data, hardware, and software (e.g., denial of service, eavesdropping, intrusion, unauthorized access, spoofing, tampering, etc.)
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
2.4 Authentication Methods
Advanced Cybersecurity
3.1 Network Attacks
3.2 Malware Types and Prevention
3.4 Additional Attacks
4.2 Cyber Case Investigation
4.3 Security Breaches
5.5
Explain the importance of physical security of computer and network hardware following best practices (e.g., cameras, locks, USB port blocking, encryption, bit-locker for Windows, and LBM for Linux)
Fundamentals of Cybersecurity
8.5 Environmental Controls
5.6
Describe network threats (e.g., denial of service, email spoofing, hacking/cracking, intrusion, malware, phishing, social engineering, spamming, etc.)
Fundamentals of Cybersecurity
1.7 Common Cyber Attacks and Prevention
Advanced Cybersecurity
3.1 Network Attacks
3.2 Malware Types and Prevention
3.4 Additional Attacks
4.2 Cyber Case Investigation
4.3 Security Breaches
5.7
Describe best practices to protect against network threats of data at rest, data in transit, and data during processing (e.g., access control, antivirus software, awareness and training, encryption, firewalls, intrusion detection/prevention, network segmentation, port/service blocking, software updates, etc.)
Analyze authentication methods used to secure access to the network (e.g., biometrics, key cards, multi-factor authentication (MFA), single sign-on (SSO), two-factor authentication (2FA), etc.)
Fundamentals of Cybersecurity
1.5 Personal Data Security
5.10
Identify best practices for access control (e.g., changing default passwords, disabling unused accounts, least privileges, role-based access control, etc.)
Fundamentals of Cybersecurity
4.10 System Administration
Advanced Cybersecurity
6.5 Access Control
6.1
Explain the purpose of and types of network media (e.g., fiber optic cable, coaxial cable, ethernet, etc.)
Fundamentals of Cybersecurity
6.5 Network Devices
6.2
Explain the purpose and types of topologies (e.g., bus, ring, tree, star, mesh, etc.)
Advanced Cybersecurity
7.3 Network Design
6.3
Compare proper physical network topology
Advanced Cybersecurity
7.3 Network Design
6.4
Identify appropriate connectors, media types, and uses for various networks
Fundamentals of Cybersecurity
6.5 Network Devices
6.5
Compare physical and virtual networks (e.g., SD-WAN, VLAN, etc.)
Fundamentals of Cybersecurity
5.4 What is the Internet?
6.6
Specify the characteristics of physical network technologies including cable types, length, speed, and topology
Advanced Cybersecurity
6.1 Network Administrator
6.2 Protocols and Standards
7.3 Network Design
7.5 Build and Secure a Network
6.7
Specify the characteristics of wireless network technologies including frequency, speed, topology, and transmission (e.g., 5G, Bluetooth, IoT, etc.)
Fundamentals of Cybersecurity
6.7 Network Options
Advanced Cybersecurity
7.3 Network Design
6.8
Describe the structure of the internet (network of networks)
Fundamentals of Cybersecurity
5.4 What is the Internet?
Advanced Cybersecurity
7.3 Network Design
6.9
Identify the features, functions, and purpose of commonly used network components (e.g., routers, modems, switches, NIC, etc.)
Fundamentals of Cybersecurity
6.5 Network Devices
7.1
Define a network protocol and explain how it works (e.g., routing protocols)
Fundamentals of Cybersecurity
5.6 Routing and Packets
5.7 How Do Websites Work?
5.8 OSI Model
7.2
Describe the characteristics and use of the four-layer TCP/IP model (e.g., Media Access Control (MAC))
Fundamentals of Cybersecurity
5.6 Routing and Packets
5.8 OSI Model
7.3
Describe the characteristics and use of the seven layers of the OSI model
Fundamentals of Cybersecurity
5.8 OSI Model
7.4
Explain the concept of ports and identify the port ranges used in networking services and protocols (e.g., dynamic/private, system, user)
Fundamentals of Cybersecurity
6.5 Network Devices
Advanced Cybersecurity
6.2 Protocols and Standards
7.5
Explain the purpose of dynamic and static routing protocols
Advanced Cybersecurity
7.3 Network Design
7.6
Describe standard network ports and protocols (e.g., DNS, DHCP, FTP, HTTP, POP, SMTP, HTTPS, SFTP, VPN, SSH, ICMP/ARP, etc.)
Fundamentals of Cybersecurity
6.5 Network Devices
Advanced Cybersecurity
6.2 Protocols and Standards
7.7
Describe the applications and characteristics of TCP and UDP
Fundamentals of Cybersecurity
5.6 Routing and Packets
7.8
Differentiate IPv4/IPv6 addresses and their corresponding subnet masks (e.g., classful networks, CIDR, private vs. public IP)
Fundamentals of Cybersecurity
5.5 IP Addresses
Advanced Cybersecurity
7.3 Network Design
7.9
Summarize the basic characteristics and protocols of MAN, SD-WAN, and WAN technologies (e.g., frame relay, etc.)
Describe the benefits and purpose of segmenting networks (e.g., VLAN, DMZ, etc.)
Advanced Cybersecurity
6.3 Private Networks
7.3 Network Design
9.6
Describe the benefits of enabling and disabling ports and network services
Fundamentals of Cybersecurity
8.7 Risky Business
9.7
Describe techniques to secure a Wi-Fi network (e.g., WPA, WPA3, etc.)
9.8
Explain the principles of firewall rules and their importance in network hardening
Fundamentals of Cybersecurity
6.10 Network Communication
9.9
Describe the benefits, disadvantages, and purposes of using a proxy service
Fundamentals of Cybersecurity
4.9 Browser Configuration
9.10
Describe the benefits, disadvantages, and purposes of using network intrusion detection/prevention systems (e.g., IDS/IPS, SIEM, etc.)
Advanced Cybersecurity
6.1 Network Administrator
10.1
Explain the troubleshooting process (e.g., define problem, identify probable cause, test hypothesis, create action, implement action plan, verify solution, and document)
Fundamentals of Cybersecurity
7.2 Troubleshooting Methodology
10.2
Prepare a work/maintenance plan and prioritize and schedule network security tasks (e.g., Cron Jobs)
10.3
Describe the purpose and benefits of network utilities (e.g., netstat, nslookup, Ping, Traceroute, etc.)
Fundamentals of Cybersecurity
6.11 Network Management
10.4
Demonstrate the use of visual indicators and diagnostic utilities (e.g., Wireshark) to interpret problems
Advanced Cybersecurity
7.4 Networking Services
10.5
Identify connectivity issues in various node environments (e.g., smartphones, switches, tablets, Linux/UNIX, Windows, etc.)
10.6
Identify and resolve network issues (e.g., cable failure, connection failure, environmental, misconfigurations, power failure, user error, etc.)
10.7
Identify common tools and methods for monitoring a network (e.g., automation, scripting, AI tools, etc.)
10.8
Describe AI and Machine Learning-based tools for network maintenance and issue resolution
11.1
Research issues regarding intellectual property rights including software licensing and software duplication (e.g., Business Software Alliance, Creative Commons, Digital Right Management, EFF, and Intellectual Property Watch)
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
11.2
Differentiate among freeware, open source, proprietary, and shareware software relative to legal and ethical issues
Fundamentals of Cybersecurity
4.7 Software Licenses
11.3
Identify issues, laws, and trends affecting data and privacy (e.g., CNP, GDPR, HIPAA, PCI-DSS, SOX, FCC, FERPA)
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
11.4
Describe acceptable use of industry-related data, private and public networks, and social networking
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
11.5
Research how data privacy laws and regulations influence network security business practices
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
11.6
Discuss the responsibilities of network security professionals (e.g., protecting organizational assets, and maintaining consistent and equitable cyber practices) and explore consequences of unethical behavior to include personal legal liability