Standards in this Framework
| Standard | Description | 
|---|---|
| 1.1 | Identify basic features of Microsoft Windows editions. | 
| 1.2 | Given a scenario, use the appropriate Microsoft command-line tool. | 
| 1.3 | Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). | 
| 1.4 | Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility. | 
| 1.5 | Given a scenario, use the appropriate Windows settings. | 
| 1.6 | Given a scenario, configure Microsoft Windows networking features on a client/desktop. | 
| 1.7 | Given a scenario, apply application installation and configuration concepts. | 
| 1.8 | Explain common OS types and their purposes. | 
| 1.9 | Given a scenario, perform OS installations and upgrades in a diverse OS environment. | 
| 1.10 | Identify common features and tools of the macOS/desktop OS. | 
| 1.11 | Identify common features and tools of the Linux client/desktop OS. | 
| 2.1 | Summarize various security measures and their purposes. | 
| 2.2 | Compare and contrast wireless security protocols and authentication methods. | 
| 2.3 | Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods. | 
| 2.4 | Explain common social-engineering attacks, threats, and vulnerabilities. | 
| 2.5 | Given a scenario, manage and configure basic security settings in the Microsoft Windows OS. | 
| 2.6 | Given a scenario, configure a workstation to meet best practices for security. | 
| 2.7 | Explain common methods for securing mobile and embedded devices. | 
| 2.8 | Given a scenario, use common data destruction and disposal methods. | 
| 2.9 | Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks. | 
| 2.10 | Given a scenario, install and configure browsers and relevant security settings. | 
| 3.1 | Given a scenario, troubleshoot common Windows OS problems. | 
| 3.2 | Given a scenario, troubleshoot common personal computer (PC) security issues. | 
| 3.3 | Given a scenario, use best practice procedures for malware removal. | 
| 3.4 | Given a scenario, troubleshoot common mobile OS and application issues. | 
| 3.5 | Given a scenario, troubleshoot common mobile OS and application security issues. | 
| 4.1 | Given a scenario, implement best practices associated with documentation and support systems information management. | 
| 4.2 | Explain basic change-management best practices. | 
| 4.3 | Given a scenario, implement workstation backup and recovery methods | 
| 4.4 | Given a scenario, use common safety procedures. | 
| 4.5 | Summarize environmental impacts and local environmental controls. | 
| 4.6 | Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. | 
| 4.7 | Given a scenario, use proper communication techniques and professionalism. | 
| 4.8 | Identify the basics of scripting. | 
| 4.9 | Given a scenario, use remote access technologies. |