Standards in this Framework
Standard | Description |
---|---|
1.1 | Identify basic features of Microsoft Windows editions. |
1.2 | Given a scenario, use the appropriate Microsoft command-line tool. |
1.3 | Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). |
1.4 | Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility. |
1.5 | Given a scenario, use the appropriate Windows settings. |
1.6 | Given a scenario, configure Microsoft Windows networking features on a client/desktop. |
1.7 | Given a scenario, apply application installation and configuration concepts. |
1.8 | Explain common OS types and their purposes. |
1.9 | Given a scenario, perform OS installations and upgrades in a diverse OS environment. |
1.10 | Identify common features and tools of the macOS/desktop OS. |
1.11 | Identify common features and tools of the Linux client/desktop OS. |
2.1 | Summarize various security measures and their purposes. |
2.2 | Compare and contrast wireless security protocols and authentication methods. |
2.3 | Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods. |
2.4 | Explain common social-engineering attacks, threats, and vulnerabilities. |
2.5 | Given a scenario, manage and configure basic security settings in the Microsoft Windows OS. |
2.6 | Given a scenario, configure a workstation to meet best practices for security. |
2.7 | Explain common methods for securing mobile and embedded devices. |
2.8 | Given a scenario, use common data destruction and disposal methods. |
2.9 | Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks. |
2.10 | Given a scenario, install and configure browsers and relevant security settings. |
3.1 | Given a scenario, troubleshoot common Windows OS problems. |
3.2 | Given a scenario, troubleshoot common personal computer (PC) security issues. |
3.3 | Given a scenario, use best practice procedures for malware removal. |
3.4 | Given a scenario, troubleshoot common mobile OS and application issues. |
3.5 | Given a scenario, troubleshoot common mobile OS and application security issues. |
4.1 | Given a scenario, implement best practices associated with documentation and support systems information management. |
4.2 | Explain basic change-management best practices. |
4.3 | Given a scenario, implement workstation backup and recovery methods |
4.4 | Given a scenario, use common safety procedures. |
4.5 | Summarize environmental impacts and local environmental controls. |
4.6 | Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. |
4.7 | Given a scenario, use proper communication techniques and professionalism. |
4.8 | Identify the basics of scripting. |
4.9 | Given a scenario, use remote access technologies. |