Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons |
|---|---|
|
19.01
Define cybersecurity. |
|
|
19.02
Describe how information security evolved into cybersecurity and the impact of the Internet on the pace and nature of the evolution. |
|
|
19.03
Describe the individual elements that comprise the CIA triad (i.e., Confidentiality, Integrity, Availability). |
|
|
19.04
Define and explain the various types of hackers and the role each plays in cybersecurity. |
|
|
19.05
Describe various methodologies used by hackers and the basis for their employment. |
|
|
19.06
Describe the individual elements of the AAA model (Authentication, Authorization and Accounting). |
|
|
20.01
Describe the role of the National Security Agency. |
|
|
20.02
Describe current trends in cyberattacks and strategies for combating them. |
|
|
20.03
Describe the legal implications of computer hacking and other forms of cyberattacks. |
|
|
20.04
Understand the importance of the weekly bulletins distributed by the United States Computer Emergency Readiness Team (US-CERT). |
|
|
20.05
Determine if any software or hardware on a given network has vulnerabilities outlined in the most recent US-CERT bulletin. |
|
|
21.01
Differentiate between cybersecurity and information assurance. |
|
|
21.02
Define confidentiality and give examples of security breaches. |
|
|
21.03
Define integrity and give examples of security breaches. |
|
|
21.04
Define authenticity and give examples of security breaches. |
|
|
21.05
Define accountability (non-repudiation) and give examples of security breaches. |
|
|
22.01
Describe the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). |
|
|
22.02
Demonstrate and understanding of common computer and programming terminology. |
|
|
22.03
Explain the physical and logical architecture of a microcomputer system. |
|
|
22.04
Describe the file types used in the operation of a computer. |
|
|
22.05
Compare and contrast memory technologies (e.g., RAM, ROM, virtual memory, memory management). |
|
|
23.01
Compare operating system file naming conventions. |
|
|
23.02
Describe the common elements that comprise the architecture of an operating system (e.g., kernel, file manager, memory manager, device manager, network manager). |
|
|
23.03
Demonstrate proficiency with file management and structure (e.g., folder creation, file creation, backup, copy, delete, open, save). |
|
|
23.04
Demonstrate a working knowledge of standard file formats. |
|
|
23.05
Describe the purpose of various operating systems (e.g., Windows, Mac, iOS, Android and Linux). |
|
|
23.06
Describe the difference between client and network operating systems. |
|
|
23.07
Differentiate between different operating systems and applications and Macros. |
|
|
23.08
Explain the basics of boot sequences, methods and startup utilities. |
|
|
23.09
Compare and contrast open source and proprietary software. |
|
|
23.10
Describe common system utilities used in performing computer maintenance. |
|
|
24.01
Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. |
|
|
24.02
Describe the purpose of the OSI model and each of its layers. |
|
|
24.03
Explain specific functions belonging to each OSI model layer. |
|
|
24.04
Understand how two network nodes communicate through the OSI model. |
|
|
24.05
Discuss the structure and purpose of data packets and frames. |
|
|
24.06
Describe the two types of addressing covered by the OSI model. |
|
|
25.01
Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. |
|
|
25.02
Describe the purpose of the TCP/IP model and each of its layers. |
|
|
25.03
Explain specific functions belonging to each TCP/IP model layer. |
|
|
25.04
Understand how two network nodes communicate through the TCP/IP model. |
|
|
25.05
Describe the two types of addressing covered by the TCP/IP model. |
|
|
26.01
Describe the services and protocols used in the OSI Application Layer (i.e., DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP). |
|
|
26.02
Describe the services and protocols used in the OSI Transport Layer (i.e., TCP, TLS/SSL, UDP). |
|
|
26.03
Describe the services and protocols used in the OSI Network Layer (i.e., IP, ICMP, IGMP, IPsec). |
|
|
26.04
Describe the services and protocols used in the OSI Data Link Layer (i.e., ARP, OSPF, L2TP, PPP). |
|
|
27.01
Define networking and describe the purpose of a network. |
|
|
27.02
Describe the conceptual background of digital networks and cloud computing including terminology and basics. |
|
|
27.03
Describe various types of networks and the advantages and disadvantages of each (e.g., peer to peer, client/server, server/thin client, ROI). |
|
|
27.04
Describe the use, advantages, and disadvantages of various network media (e.g. coaxial, twisted pair, fiber optics). |
|
|
27.05
Describe the function of various network devices (e.g., managed switch, switched hub or switch, router, bridge, gateway, access points, modem). |
|
|
27.06
Describe how network devices are identified (i.e., IP addressing). |
|
|
27.07
Explain the protocols commonly used in a network environment. |
|
|
27.08
Differentiate between public and private IP addresses. |
|
|
27.09
Describe the common ports and corresponding protocols used in a network. |
|
|
27.10
Describe the difference between the Internet and intranet. |
|
|
27.11
Compare and contrast IPv4 and IPv6. |
|
|
27.12
Compare and contrast the different methods for network connectivity (e.g., broadband, wireless, Bluetooth, cellular). |
|
|
27.13
Discuss the differences between Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Virtual Local Area Network (VLAN), and Virtual Private Network (VPN). |
|
|
28.01
Describe the various types of cloud computing (IaaS, PaaS, SaaS) and modes of delivery (Public, Private, Community, Hybrid). |
|
|
28.02
Describe practices that aid in protecting the Hybrid cloud model. |
|
|
28.03
Describe the challenges and solutions associated with securing embedded devices. |
|
|
29.01
Distinguish between vulnerability and a threat. |
|
|
29.02
Discuss the different types of attacks (e.g., active, passive). |
|
|
29.03
Define security policy and explain its role in cybersecurity. |
|
|
29.04
Describe the basic methods of authentication (e.g., password, biometrics, smart cards. two-factor authentication, multifactor authentication). |
|
|
29.05
Describe the various forms of encryption methodologies (e.g., symmetric, asymmetric, block cipher, stream cipher). |
|
|
29.06
Describe hash functions and their role in authentication. |
|
|
29.07
Describe various method of access control used in computer security (e.g., policies, groups, Access Control List (ACL)). |
|
|
29.08
Understand the concept of malware (i.e., ransomware, worms, viruses, adware) and how attackers use it to steal sensitive or confidential information. |
|
|
30.01
Define cybercrime and discuss the challenges facing law enforcement. |
|
|
30.02
Identify the key legislative acts that impact cybersecurity. |
|
|
30.03
Describe the Federal criminal code related to computers and give examples of cybercrimes and penalties, particularly those involving inappropriate access. |
|
|
30.04
Discuss the concept of digital forensics and its place in cybercrime investigations and incident response. |
|
|
30.05
Distinguish among the Intellectual Property Rights of trademark, patent, and copyright. |
|
|
30.06
Explain digital rights management and the implications of the Digital Millennium Copyright Act (DMCA). |
|
|
30.07
Describe the implications of various social media on the safeguarding of personal or sensitive information. |
|
|
30.08
Describe various safeguards that can be employed to help ensure that sensitive or confidential information is not inadvertently divulged or obtained. |
|
|
31.01
Define virtual computing. |
|
|
31.02
Explain the benefits of virtual computing. |
|
|
31.03
Differentiate between guest and host operating systems. |
|
|
31.04
Install desktop virtualization software. |
|
|
31.05
Describe the role of the hypervisor. |
|
|
31.06
Create and upgrade a virtual machine. |
|
|
31.07
Optimize the performance of a virtual machine. |
|
|
31.08
Preserve the state of a virtual machine. |
|
|
31.09
Clone, move and share virtual machines. |
|
|
31.10
Use basic (static) and dynamic virtual disks and disk drives. |
|
|
31.11
Configure a virtual network. |
|
|
31.12
Connect devices to a virtual machine. |
|
|
31.13
Enable security settings on a virtual machine. |
|
|
32.01
Configure 802.1x authentication for a given scenario. |
|
|
32.02
Connect clients to a VPN. |
|
|
32.03
Understand Authentication, Authorization and Accounting (AAA) management. |
|
|
32.04
Differentiate between TACACS+ (Terminal Access Controller Access Control System) and RADIUS. |
|
|
32.05
Differentiate between Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) protocols as they apply to VPN options. |
|
|
32.06
Implement the use of SSH (Secure Shell). |
|
|
32.07
Implement the use of IPsec (Internet Protocol Security). |
|
|
32.08
Identify vulnerabilities associated with authentication. |
|
|
32.09
Understand ways to implement VoIP technologies. |
|
|
32.10
Demonstrate the use and purpose of Kerberos. |
|
|
33.01
Configure access controls including biometric devices, keypads and security tokens. |
|
|
33.02
Recognize social engineering attempts. |
|
|
33.03
Evaluate environmental controls (e.g., EMI shielding, temperature, humidity and fire suppression). |
|
|
33.04
Develop a method of training users to recognize, report, and avoid social engineering attempts. |
|
|
33.05
Identify components of physical security, including mantraps, motion detection, alarm systems, locks, video surveillance, and fences/barricades. |
|
|
33.06
Install a camera for a video surveillance system. |
|
|
33.07
Configure an alarm system including a keypad and motion detector. |
|
|
33.08
Recognize vulnerabilities associated with physical security. |
|
|
33.09
Explain how a mantrap is used as a counter measure against tailgating. |
|
|
34.01
Configure and maintain software and hardware firewalls. |
|
|
34.02
Configure and secure routers. |
|
|
34.03
Apply security settings to switches. |
|
|
34.04
Configure and secure wireless devices. |
|
|
34.05
Secure a LAN connected to a DSL/cable modem. |
|
|
34.06
Configure a RAS (Remote Access Server) for remote connectivity. |
|
|
34.07
Securely deploy a PBX (Private Branch Exchange). |
|
|
34.08
Explain the benefits of implementing a VPN (Virtual Private Network). |
|
|
34.09
Deploy IDS (intrusion detection system) and IPS (intrusion prevention systems). |
|
|
34.1
Analyze the performance, efficiency and security of the network based on network monitoring and diagnostic software. |
|
|
34.11
Employ techniques used to lock down workstations. |
|
|
34.12
Configure and secure servers for a given scenario. |
|
|
34.13
Understand and assess the security of mobile devices including but not limited to those using the Android, iOS and Windows platforms. |
|
|
35.01
Explain the security implications of the Internet of Things (IoT) (i.e., understand the efforts to address authentication and updates to IoT devices). |
|
|
35.02
Explain societal and security challenges associated with robotics. |
|
|
35.03
Explain security challenges associated with serverless computing. |
|
|
35.04
Explain societal and security challenges associated with the implementation of 5G. |
|
|
35.05
Describe and explain the security challenges of Autonomous vehicles (i.e., the significance of vehicular cybersecurity and its relation to: computer vision, artificial intelligence, machine learning and deep learning). |
|
|
36.01
Understand access control as it applies to MAC (Mandatory Access Control). |
|
|
36.02
Understand access control as it applies to DAC (Discretionary Access Control). |
|
|
36.03
Understand access control as it applies to RBAC (Role Based Access Control). |
|
|
37.01
Understand and identify security concerns with the use of Coaxial Cable. |
|
|
37.02
The student should be able to identify and understand security concerns for UTP/STP (Unshielded Twisted Pair / Shielded Twisted Pair). |
|
|
37.03
Identify and understand security concerns fiber optic cable. |
|
|
37.04
Identify security concerns associated with removable media. |
|
|
37.05
Address pitfalls associated with tape backups. |
|
|
37.06
Apply drive encryption to hard drives. |
|
|
37.07
Secure flash drives. |
|
|
37.08
Smartcards and secure USB memory. |
|
|
38.01
Determine Security Zones. |
|
|
38.02
Point out vulnerabilities on a DMZ (Demilitarized Zone). |
|
|
38.03
Explain the security benefits of using an intranet. |
|
|
38.04
Explain the security benefits of using an extranet. |
|
|
38.05
Secure a VLAN (Virtual Local Area Network). |
|
|
38.06
Describe the security benefits associated with NAT (Network Address Translation). |
|
|
38.07
Justify the implementation of tunneling, for security purpose. |
|
|
39.01
Select and employ appropriate communication concepts and strategies to enhance oral and written communication in the workplace. |
|
|
39.02
Locate, organize and reference written information from various sources. |
|
|
39.03
Design, develop and deliver formal and informal presentations using appropriate media to engage and inform diverse audiences. |
|
|
39.04
Interpret verbal and nonverbal cues/behaviors that enhance communication. |
|
|
39.05
Apply active listening skills to obtain and clarify information. |
|
|
39.06
Develop and interpret tables and charts to support written and oral communications. |
|
|
39.07
Exhibit public relations skills that aid in achieving customer satisfaction. |
|
|
40.01
Employ critical thinking skills independently and in teams to solve problems and make decisions. |
|
|
40.02
Employ critical thinking and interpersonal skills to resolve conflicts. |
|
|
40.03
Identify and document workplace performance goals and monitor progress toward those goals. |
|
|
40.04
Conduct technical research to gather information necessary for decision-making. |
|
|
41.01
Use personal information management (PIM) applications to increase workplace efficiency. |
|
|
41.02
Employ technological tools to expedite workflow including word processing, databases, reports, spreadsheets, multimedia presentations, electronic calendar, contacts, email, and internet applications. |
|
|
41.03
Employ computer operations applications to access, create, manage, integrate, and store information. |
|
|
41.04
Employ collaborative/groupware applications to facilitate group work. |
|
|
42.01
Describe the nature and types of business organizations. |
|
|
42.02
Explain the effect of key organizational systems on performance and quality. |
|
|
42.03
List and describe quality control systems and/or practices common to the workplace. |
|
|
42.04
Explain the impact of the global economy on business organizations. |
|
|
43.01
Evaluate and justify decisions based on ethical reasoning. |
|
|
43.02
Evaluate alternative responses to workplace situations based on personal, professional, ethical, legal responsibilities, and employer policies. |
|
|
43.03
Identify and explain personal and long-term consequences of unethical or illegal behaviors in the workplace. |
|
|
43.04
Interpret and explain written organizational policies and procedures. |
|
|
43.05
Display proficiency in using team-oriented collaboration and video teleconferencing software (e.g. Teams, Zoom). |
|