Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
A1.1
Describe how technology is integrated into business processes. |
|
A1.2
Identify common organizational, technical, and financial risks associated with the implementation and use of information and communication systems. |
|
A1.3
Model business processes using tools such as organization charts, flowcharts, and timelines. |
|
A1.4
Analyze and design business processes in a cycle of continual improvement. |
|
A2.1
Identify and list the criteria and processes for evaluating the functions of information systems. |
|
A2.2
Investigate, evaluate, select, and use major types of software, services, and vendors. |
|
A2.3
Install software and setup hardware. |
|
A2.4
Define and use appropriate naming conventions and file management strategies. |
|
A3.1
Identify and apply multiple ways to transfer information and resources (e.g., text, data, audio, video, still images) between software programs and systems. |
|
A3.2
Validate and cite Internet resources. |
|
A3.3
Recognize where processes are running in a networked environment (e.g., client access, remote access). |
|
A3.4
Identify and describe the layered nature of computing and networking such as the Open Systems Interconnect (OSI) model. |
|
A3.5
Use multiple online search techniques and resources to acquire information. |
|
A3.6
Describe and contrast the differences between various Internet protocols: hypertext transfer protocol (http), hypertext transfer protocol secure (https), file transfer protocol (ftp), simple mail transfer protocol (smtp). |
|
A4.1
Use different systems and associated utilities to perform such functions as file management, backup and recovery, and execution of programs. |
|
A4.2
Use a command line interface. |
|
A4.3
Automate common tasks using macros or scripting. |
|
A4.4
Evaluate the systems-development life cycle and develop appropriate plans to maintain a given system after assessing its impact on resources and total cost of ownership (TCO). |
|
A5.1
Follow laws, regulatory guidelines, policies, and procedures to ensure the security and integrity of information systems. |
|
A5.2
Identify potential attack vectors and security threats. |
|
A5.3
Take preventative measures to reduce security risks (e.g., strong passwords, avoid social engineering ploys, limit account permissions). |
|
A5.4
Use security software and hardware to protect systems from attack and alert of potential threats, anti-malware software, and firewalls. |
|
A6.1
Use available resources to identify and resolve problems using knowledge bases, forums, and manuals. |
|
A6.2
Use a logical and structured approach to isolate and identify the source of problems and to resolve problems. |
|
A6.3
Use specific problem solving strategies appropriate to troubleshooting, eliminating possibilities, or guess and check. |
|
A6.4
Evaluate support needs for different data and systems configurations. |
|
A6.5
Evaluate solution methods recognizing the trade-offs of troubleshooting vs. reloading, reimaging, or restoring to factory defaults using a sandbox environment. |
|
A6.6
Distinguish types of symptoms and which component’s issue could exhibit those symptoms: the user, hardware, network, or software. |
|
A6.7
Diagram the underlying processes of a system that are likely involved in a problem. |
|
A7.1
Recognize the scope of duties ICT support staff have and tiered levels of support. |
|
A7.2
Describe and apply the principles of a customer-oriented service approach to supporting users. |
|
A7.3
Use technical writing and communication skills to work effectively with diverse groups of people, including users with less technical abilities. |
|
A7.4
Document technical support provided such as using a ticketing system. |
|
A7.5
Train users to assist them in being self-supporting: formal classes, one-on-one interactions, and process and how-to guides. |
|
A8.1
Develop the purpose and scope of a project. |
|
A8.2
Acquire, use, and manage necessary internal and external resources when supporting various organizational systems. |
|
A8.3
Use various tools to manage projects involving the development of information and communication systems. |
|
A8.4
Analyze business problems by using functional and cost-benefit perspectives. |
|
A8.5
Design, develop, implement, and monitor a project by creating and integrating technologies. |
|
A8.6
Use a systematic method of continual improvement; plan, do, check, act (PDCA), total quality (TQ), or Six Sigma. |
|