Please enable JavaScript to use CodeHS

Standards Framework

for Nevada Cybersecurity 3

66

Standards in this Framework

Standard Description
6.1.1 Categorize Ethernet wired network adapter components, features, and connectors
6.1.2 Categorize Ethernet wireless access point components, features, connectors, and cables
6.1.3 Describe common network connectivity devices and their roles
6.1.4 Analyze properties of basic network protocols
6.1.5 Apply appropriate networking utilities to view, test, and troubleshoot basic network configuration, topology, communicant, and connectivity problems
6.2.1 Deploy best practices to secure any device accessing a network
6.2.2 Compare and contrast physical security controls
6.2.3 Compare and contrast risk related concepts
6.2.4 Implement network hardening techniques
6.2.5 Configure a basic firewall
6.2.6 Explain the purpose of various network access control models
6.2.7 Secure SOHO wired and wireless networks
6.2.8 Identify common network vulnerabilities, threats, and risks
6.2.9 Analyze and implement security settings on figure BIOS/UEFI security settings
6.3.1 Implement various networking troubleshooting methodology
6.3.2 Analyze and interpret the output of troubleshooting tools
6.3.3 Troubleshoot and resolve common wireless issues
6.3.4 Troubleshoot and resolve common copper and fiber cable issues
6.3.5 Troubleshoot and resolve common network issues
6.3.6 Troubleshoot and resolve common security issues
6.3.7 Troubleshoot and resolve common WAN issues
6.4.1 Explain the functions and application of various network devices
6.4.2 Compare the use of networking services and applications
6.4.3 Install and configure networking services and applications
6.4.4 Explain the characteristics and benefits of various WAN technologies
6.4.5 Install and terminate various cable types and connectors using appropriate tools
6.4.6 Differentiate between network infrastructure implementations
6.4.7 Implement and configure the appropriate addressing schema
6.4.8 Explain the basics of routing
6.4.9 Describe the elements of unified communications technologies
7.1.1 Describe use of packet tracing tools and network analyzing tools
7.1.2 Demonstrate use of network monitoring tools
7.1.3 Demonstrate use of port and vulnerability scanning tools
7.1.4 Describe the use of SMTP monitoring software
7.1.5 Demonstrate understanding of security information and event management (SIEM) tools
7.1.6 Demonstrate use of environmental monitoring tools
7.1.7 Operate power monitoring tools
7.1.8 Demonstrate use of wireless survey tools
7.2.1 Analyze SYSLOG data
7.2.2 Demonstrate use of log management
7.2.3 Apply interface monitoring tools
7.2.4 Evaluate system performance metrics against baseline data
7.2.5 Evaluate system metrics and logs for resource depletion
7.2.6 Evaluate system metrics and logs for network connectivity
7.3.1 Prepare archives/backups
7.3.2 Build system baseline based on normal operations
7.3.3 Describe provisioning and de-provisioning of mobile devices (enterprise, BYOD)
7.3.4 Illustrate network access control (NAC)
7.3.5 Document a configuration management strategy
7.4.1 Compare and contrast protecting SCADA systems and industrial control systems (ICS)
7.4.2 Determine a plan to protect legacy systems
7.4.3 Explain how to separate private/public networks
7.4.4 Describe theft detection technologies (honeypot/honeynet)
7.4.5 Research the need for a testing lab (development ops/DevOps)
7.4.6 Determine a plan for load balancing the network
7.4.7 Creating a plan for performance optimization (tuning)
7.5.1 Install software and hardware patches and updates (OS, critical, non-critical, etc.)
7.5.2 Compare and contrast firmware and driver updates
7.5.3 Recognize the difference between feature releases/security updates
7.5.4 Develop rollout/rollback procedures
7.6.1 Setup, configure, and secure a VLAN
7.6.2 Configure a Spanning Tree Protocol (STP) (IEEE 802.1D) ensuring you do not create any loops
7.6.3 Setup an Ethernet Interface via the interface configuration file including demonstrating how to give your network card an IP address (DHCP), set up routing information, configure IP masquerading, and set default routes
7.6.4 Setup and configure a default gateway defining where to send packets for IP addresses for which they can determine no specific route
7.6.5 Describe and demonstrate several common techniques for transmitting power over Ethernet cabling (PoE and PoE+ 802.3af, 802.3at)
7.6.6 Compare and contrast managed vs. unmanaged switches