Standards in this Framework
Standard | Description |
---|---|
1.1.1 | Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law (Level 1 (L1), Level 2 (L2), Complementary (C)) |
1.1.2 | Research nationally recognized CTSOs (L1, L2, C) |
1.1.3 | Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) (L1, L2, C) |
1.2.1 | Discuss the purpose of parliamentary procedure (L1, L2, C) |
1.2.2 | Demonstrate the proper use of parliamentary procedure (L1, L2, C) |
1.2.3 | Differentiate between an office and a committee (L1, L2, C) |
1.2.4 | Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions (L1, L2, C) |
1.2.5 | Participate in local, regional, state, or national conferences, events, or competitions (L1, L2, C) |
1.2.6 | Describe the importance of a constitution and bylaws to the operation of a CTSO chapter (L1, L2, C) |
1.3.1 | Explore opportunities in community service-related work-based learning (WBL) (L1, L2, C) |
1.3.2 | Participate in a service learning (program related) and/or community service project or activity (L1, L2, C) |
1.3.3 | Engage with business and industry partners for community service (L1, L2, C) |
1.4.1 | Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) (L1, L2, C) |
1.4.2 | Describe the appropriate professional/workplace attire and its importance (L1, L2, C) |
1.4.3 | Investigate industry-standard credentials/certifications available within this Career Cluster™ (L1, L2, C) |
1.4.4 | Participate in authentic contextualized instructional activities (L1, L2, C) |
1.4.5 | Demonstrate technical skills in various student organization activities/events (L1, L2, C) |
1.5.1 | Make a connection between program standards to career pathway(s) (L1, L2, C) |
1.5.2 | Explain the importance of participation and completion of a program of study (L1, L2, C) |
1.5.3 | Promote community awareness of local student organizations associated with CTE programs (L1, L2, C) |
5.1.1 | Use industry standard vocabulary in relation to operating systems (OS) (L1, L2) |
5.1.2 | Compare and contrast (L1, L2) |
5.1.3 | Install and secure operating systems (L1, L2) |
5.1.4 | Install and configure Windows networking (L1, L2) |
5.2.1 | Explain various features and tools of operating systems (L1, L2) |
5.2.2 | Apply appropriate command line tools (L1, L2) |
5.2.3 | Select appropriate operating system features and tools based on customer requirements (L1, L2) |
5.2.4 | Configure Windows Update settings (L1, L2) |
5.2.5 | Configure local users and groups for a Windows networking system (L1, L2) |
5.2.6 | Configure User Access Control (UAC) (L1, L2) |
5.2.7 | Use Windows Control Panel utilities (L1, L2) |
5.2.8 | Perform common preventive maintenance procedures using the appropriate Windows OS tools (L1, L2) |
5.2.9 | Troubleshoot common PC security issues using best practices (L1, L2) |
5.3.1 | Explain key terms and acronyms used in diagnostic testing and troubleshooting (L1, L2) |
5.3.2 | Identify common symptoms for a given discrepancy (L1, L2) |
5.3.3 | Develop a solution for a given discrepancy (L1, L2) |
5.3.4 | Document the solution (L1, L2) |
5.4.1 | Identify common features and functionality of Mac OS, Chrome, and other Linux operating systems (L1, L2) |
5.4.2 | Set up and use client-side virtualization and introduce server virtualization topics (L1, L2) |
5.4.3 | Identify basic features of mobile operating systems (L1, L2) |
5.4.4 | Install and configure basic mobile device network connectivity and email (L1, L2) |
5.4.5 | Summarize methods and data related to mobile device synchronization (L1, L2) |
5.4.6 | Compare and contrast methods to secure mobile devices (L1, L2) |
5.4.7 | Explain the characteristics of various types of other mobile devices (L1) |
5.4.8 | Compare and contrast accessories, features, and ports of mobile and IoT devices (L1, L2) |
5.4.9 | Troubleshoot common mobile OS and tablet software/hardware issues (L1, L2) |
5.6.2 | Summarize the properties and purpose of services provided by networked hosts (L2) |
6.1.4 | Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.) (L2) |
6.1.5 | Utilize appropriate wired connections (L2) |
6.1.6 | Utilize appropriate wireless connections (L2) |
6.3.1 | Compare main distribution frame (MDF) and intermediate distribution frame (IDF) (L1, L2) |
6.3.2 | Implement a cable management solution (L1, L2) |
6.3.3 | Analyze and create a power management plan (i.e., power converters, circuits, UPS – uninterruptible power supply [power redundancy], inverters, load capacity) (L1, L2) |
6.3.4 | Determine proper airflow for optimal performance (L1, L2) |
7.1.1 | Categorize Ethernet wired network adapter components, features, and connectors (L2) |
7.1.2 | Categorize Ethernet wireless access point components, features, connectors, and cables (L2) |
7.1.3 | Describe common network connectivity devices and their roles (L2) |
7.1.4 | Distinguish between the various network types (L2) |
7.1.5 | Apply appropriate networking utilities to view, test, and troubleshoot basic network configuration, topology, communicant, and connectivity problems (L2) |
7.2.1 | Deploy best practices to secure any device accessing a network (L2) |
7.2.2 | Compare and contrast physical security controls (L2) |
7.2.3 | Compare and contrast risk-related concepts (L2) |
7.2.4 | Implement network hardening techniques (L2) |
7.2.5 | Configure a basic firewall (L2) |
7.2.6 | Explain the purpose of various network access control models (L2) |
7.2.7 | Secure SOHO wired and wireless networks (L2) |
7.2.8 | Identify common network vulnerabilities, threats, and risks (L2) |
7.2.9 | Analyze and implement security settings on figure BIOS/UEFI security settings (L2) |
7.3.1 | Implement various networking troubleshooting methodologies (L2) |
7.3.2 | Analyze and interpret the output of troubleshooting tools (L2) |
7.3.3 | Troubleshoot and resolve common wireless issues (L2) |
7.3.4 | Troubleshoot and resolve common copper and fiber cable issues (L2) |
7.3.5 | Troubleshoot and resolve common network issues (L2) |
7.3.6 | Troubleshoot and resolve common security issues (L2) |
7.3.7 | Troubleshoot and resolve common wide area network (WAN) issues (L2) |
7.4.1 | Explain the functions and application of various network devices (L2) |
7.4.2 | Compare the use of networking services and applications (L2) |
7.4.3 | Install and configure networking services and applications (L2) |
7.4.4 | Explain the characteristics and benefits of various WAN technologies (L2) |
7.4.5 | Install and terminate various cable types and connectors using appropriate tools (L2) |
7.4.6 | Differentiate between network infrastructure implementations (L2) |
7.4.7 | Implement and configure the appropriate addressing schema (L2) |
7.4.8 | Explain the basics of routing (L2) |
7.4.9 | Describe the elements of unified communications technologies (L2) |
8.1.1 | Describe the use of packet tracing tools and network analyzing tools (L2) |
8.1.2 | Demonstrate the use of network monitoring tools (L2) |
8.1.3 | Demonstrate the use of port and vulnerability scanning tools (L2) |
8.1.4 | Describe the use of SMTP monitoring software (L2) |
8.1.5 | Demonstrate an understanding of security information and event management (SIEM) tools (L2) |
8.1.6 | Demonstrate the use of environmental monitoring tools (L2) |
8.1.7 | Operate power monitoring tools (L2) |
8.1.8 | Demonstrate the use of wireless survey tools (L2) |
8.2.1 | Analyze SYSLOG data (L2) |
8.2.2 | Demonstrate the use of log management (L2) |
8.2.3 | Apply interface monitoring tools (L2) |
8.2.4 | Evaluate system performance metrics against baseline data (L2) |
8.2.5 | Evaluate system metrics and logs for resource depletion (L2) |
8.2.6 | Evaluate system metrics and logs for network connectivity (L2) |
8.3.1 | Prepare archives/backups (L2) |
8.3.2 | Build a system baseline based on normal operations (L2) |
8.3.3 | Describe provisioning and de-provisioning of mobile devices (enterprise, BYOD – bring your own device) (L2) |
8.3.4 | Illustrate network access control (NAC) (L2) |
8.3.5 | Document a configuration management strategy (L2) |
8.4.1 | Compare and contrast protecting supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS) (L2) |
8.4.2 | Determine a plan to protect legacy systems (L2) |
8.4.3 | Explain how to separate private/public networks (L2) |
8.4.4 | Describe theft detection technologies (honeypot/honeynet) (L2) |
8.4.5 | Research the need for a testing lab (development ops/DevOps) (L2) |
8.4.6 | Determine a plan for load balancing the network (L2) |
8.4.7 | Create a plan for performance optimization (tuning) (L2) |
8.6.1 | Set up, configure, and secure a virtual local area network (VLAN), physically or virtually (L2) |
8.6.2 | Configure a Spanning Tree Protocol (STP), ensuring you do not create any loops (L2) |
8.6.3 | Set up an Ethernet Interface via the interface configuration file, including demonstrating how to give your network card an IP address (DHCP – dynamic host configuration protocol); set up routing information; configure IP masquerading; and set default routes (L2) |
8.6.4 | Set up and configure a default gateway, defining where to send packets for IP addresses for which they can determine no specific route (L2) |
8.6.5 | Describe and demonstrate several common techniques for transmitting power over Ethernet cabling (L2) |
8.6.6 | Compare and contrast managed versus unmanaged switches (L2) |
9.2.8 | Determine the correct containment steps based on the type of incident or event encountered (L2) |
9.2.9 | Implement the correct eradication response and processes (L2) |
9.2.10 | Determine the next steps post investigation (post breach) from legal, HR, news media response (L2) |
9.3.1 | Determine the appropriate security control, technique, or process based on the property, system, or data you are protecting (L2) |
9.3.2 | Explain the importance of security controls, techniques, and threat risk assessments (L2) |
9.3.3 | Select the appropriate solution to eliminate vulnerabilities and establish a security baseline (L2) |
9.3.4 | Develop plans to protect a variety of property, systems, or data (L2) |
9.3.5 | Implement the appropriate controls to ensure security of property, systems, or data (L2) |
9.3.6 | Compare and contrast alternative methods to mitigate security risks for data in transit and data at rest (L2) |
9.4.1 | Describe the digital chain of custody process for tracking data and equipment (legal evidence) (L2) |
9.4.2 | Describe all steps to capture and maintain evidence (L2) |
9.4.3 | Follow chain of custody procedures (L2) |
9.4.4 | Maintain detailed records (e.g., chain of custody forms, evidence collection forms) (L2) |
9.4.5 | Track digital evidence (e.g., how it has been gathered, tracked, and protected) (L2) |
9.4.6 | Describe a chain of custody (L2) |
9.4.7 | Develop a plan for data transport, encryption to avoid alteration of data, and legal holds (L2) |
9.4.8 | Develop a plan for recovery, disposal of evidence, and follow-up (L2) |
9.4.9 | Write a forensics summary report (L2) |
10.1.1 | Summarize basic forensic concepts and practices, including eDiscovery, documentation, chain of custody, and data transport (L2) |
10.1.2 | Determine a first responder’s logical approach during an investigation with objective, evidence-based research (L2) |
10.1.3 | Review the First Responder steps and processes for proper documentation (L2) |
10.1.4 | Explain what eDiscovery is, including the contextual process for electronic evidence collection (Electronically Stored Information [ESI]) (L2) |
10.1.5 | Observe and discuss legal restrictions, stipulations, regulatory compliance, and confidentiality when gathering evidence (L2) |
10.1.6 | Summarize chain of custody processes during investigations (L2) |
10.3.1 | Describe and demonstrate various methods and tools for threat detection and eDiscovery (L2) |
10.3.2 | Describe and demonstrate vulnerability management methods, practices, and scanning tools (L2) |
10.3.3 | Describe and demonstrate various practices, methods, and tools for penetration testing (L2) |
10.3.5 | Review basic cryptography concepts, methods, and their relationship to forensics (L2) |
10.3.8 | Identify methods or tools to eliminate cloud exploits and vulnerabilities (L2) |
10.4.1 | Explain what malware is, including its history (L2) |
10.4.2 | Review and define the most common malware terminologies (L2) |
10.4.3 | Describe the ways and methods malware is spread (L2) |
10.4.4 | Review current types of malware (e.g., viruses, worms, trojan horses, rootkits, ransomware, keyloggers, and grayware attacks) (L2) |
10.4.5 | Select the appropriate types of mitigation and deterrent techniques for malware scenarios (L2) |
10.4.6 | Use appropriate tools and techniques to eliminate malware from spreading (L2) |