Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
B1.1
Define the terminology used in the design, assembly, configuration, and implementation of networks. |
|
B1.2
List the fundamental elements of the major networking models established by the industry standards of recognized organizations: the Open System Interconnect (OSI) or transmission-control/Internet protocol (TCP/IP) models. |
|
B1.3
Identify and explain how data, voice, and video/communications are carried through the most common network media. |
|
B1.4
List the characteristics, advantages, and disadvantages of the various networking presentation functions, data formatting, data encryption, and data compression. |
|
B1.5
Explain the characteristics of networking hardware and applications and the methods to deploy them. |
|
B1.6
Design and document data/communication systems networks. |
|
B2.1
Use appropriate wiring and wireless standards and plan, install, and maintain media (copper, fiber, and wireless) for a variety of network systems. |
|
B2.2
Demonstrate standard procedures and practices for safely using tools and working safely around the electrical environment in various networking systems. |
|
B2.3
Test and maintain wired and wireless network communications components and systems. |
|
B3.1
Identify and describe the functions of various network devices, including network connectivity hardware. |
|
B3.2
Describe the differences between various network environments: peer-to-peer, client-server, thin client, virtualized, internetworks, intranets, and extranets. |
|
B3.3
Distinguish between the topologies and protocols of local area networks and those of wide area networks. |
|
B3.4
Confirm operating parameters, apply test procedures, make necessary adjustments, and assemble the components of a network system or subsystem. |
|
B3.5
Configure the major addressing and routing protocols used in networking. |
|
B3.6
Implement a functional wired and wireless network, including the installation and configuration of components, software, and plug-ins. |
|
B3.7
Evaluate, select, and deploy a variety of network architectures, information and communication technologies, and protocols. |
|
B4.1
Identify and use network tools to troubleshoot and verify network availability and performance. |
|
B4.2
Identify common customer policies and procedures, including those for management of incidents. |
|
B4.3
Identify the implications of major protocols and international standards and their impact on network management. |
|
B4.4
Apply appropriate technologies to improve network performance for data, voice, and video transmission. |
|
B4.5
Apply the proper security patches, updates, and procedures necessary to maintain and support a network. |
|
B4.6
Use common help-desk tools and resources, such as incident tracking, knowledge database, and staffing to administer and manage a network. |
|
B4.7
Apply known effective methods of disseminating information and instruction to users. |
|
B4.8
Use project management skills and tools for managing and maintaining various types of networks. |
|
B4.9
Analyze network system interdependencies and constraints. |
|
B5.1
Classify and use various electronic components, symbols, abbreviations, and media common to network topology diagrams. |
|
B5.2
Interpret, organize, and communicate complex network diagrams by using information collected from detailed drawings. |
|
B6.1
Identify and document the appropriate uses of networking services, products, and applications. |
|
B6.2
Evaluate the features of communications software products in terms of their appropriateness to organizational tasks. |
|
B6.3
Configure compatible systems across various platforms and types of media. |
|
B7.1
Describe the effective management of human, financial, and communications resources from the standpoints of the user and the provider. |
|
B7.2
Diagram physical and logical layouts of networks that support information and communication technologies. |
|
B7.3
Evaluate emerging products, services, and business models in relation to the creation, setup, and management of networks that support information and communication technologies. |
|
B7.4
Evaluate, create, and process voice, video, and data transmissions. |
|
B8.1
Identify and define command network security threats: hackers, crackers, viruses, worms, and Trojan horses. |
|
B8.2
Describe the importance of classifying appropriate monitoring devices and procedures for quick identification and prevention of security violations. |
|
B8.3
List the policies and procedures for routine administration, such as user agreement, incident reporting, and recovery for users. |
|
B8.4
Identify common potential risks and entrance points, including internal and external risks, and the tools used to neutralize them: firewalls; monitoring; and antivirus, spyware, and spam protection. |
|
B8.5
Identify and apply common techniques for disaster prevention and recovery. |
|