Standards in this Framework
Standard | Description |
---|---|
1.1.1 | Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law (Level 1 (L1), Level 2 (L2), Complementary (C)) |
1.1.2 | Research nationally recognized CTSOs (L1, L2, C) |
1.1.3 | Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) (L1, L2, C) |
1.2.1 | Discuss the purpose of parliamentary procedure (L1, L2, C) |
1.2.2 | Demonstrate the proper use of parliamentary procedure (L1, L2, C) |
1.2.3 | Differentiate between an office and a committee (L1, L2, C) |
1.2.4 | Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions (L1, L2, C) |
1.2.5 | Participate in local, regional, state, or national conferences, events, or competitions (L1, L2, C) |
1.2.6 | Describe the importance of a constitution and bylaws to the operation of a CTSO chapter (L1, L2, C) |
1.3.1 | Explore opportunities in community service-related work-based learning (WBL) (L1, L2, C) |
1.3.2 | Participate in a service learning (program related) and/or community service project or activity (L1, L2, C) |
1.3.3 | Engage with business and industry partners for community service (L1, L2, C) |
1.4.1 | Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) (L1, L2, C) |
1.4.2 | Describe the appropriate professional/workplace attire and its importance (L1, L2, C) |
1.4.3 | Investigate industry-standard credentials/certifications available within this Career Cluster™ (L1, L2, C) |
1.4.4 | Participate in authentic contextualized instructional activities (L1, L2, C) |
1.4.5 | Demonstrate technical skills in various student organization activities/events (L1, L2, C) |
1.5.1 | Make a connection between program standards to career pathway(s) (L1, L2, C) |
1.5.2 | Explain the importance of participation and completion of a program of study (L1, L2, C) |
1.5.3 | Promote community awareness of local student organizations associated with CTE programs (L1, L2, C) |
2.1.1 | Demonstrate the proper use of safety devices based on industry regulations (L1) |
2.1.2 | Research the environmental impact of production based on industry standards (L1) |
2.1.3 | Research local, state, federal, and international regulations related to material handling (L1) |
2.1.4 | Demonstrate secure disposal of technology materials and data (L1) |
2.1.5 | Introduce Material Safety Data Sheets (MSDS) (L1) |
2.1.6 | Explain the relationship between organization and safety (L1) |
2.1.7 | Demonstrate an organized work environment (L1) |
2.1.8 | Demonstrate electrical safety (e.g., grounding, ESD [static]) (L1) |
2.1.9 | Apply installation safety (e.g., lifting, overhead movements) (L1) |
2.1.10 | Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems, natural disasters) (L1) |
2.2.1 | Explain common tools used in computer repair (L1) |
2.2.2 | Demonstrate the use of common networking and repair tools (L1) |
2.2.3 | Select the proper tool for diagnostic and troubleshooting procedures (L1) |
2.2.4 | Discuss fire suppression systems, the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems, and industry standards when dealing with the loss of power (L1) |
3.1.1 | Analyze legal issues in technology (L1) |
3.1.2 | Evaluate intellectual property laws (L1) |
3.1.3 | Explain differences between licensing, copyright, and infringement (L1) |
3.1.4 | Explain the differences between restricted content, prohibited or illegal content (L1) |
3.1.5 | Examine state, federal, and international regulations related to technology (e.g., legal holds, disposal methods, data retention, discoverability, data protection) (L1) |
3.2.1 | Analyze acceptable use policies (L1) |
3.2.2 | Explain the difference between technology policies, privacy standards, and best practices (L1) |
3.2.3 | Explain data and privacy encryption issues related to using technology (L1) |
3.2.4 | Evaluate appropriate consent policies to monitoring various stakeholders (L1) |
3.2.5 | Explain appropriate data classification (L1) |
3.3.1 | Communicate with customers to ensure understanding of customer requirements, scope, and concerns (L1) |
3.3.2 | Utilize appropriate documentation systems (L1) |
3.3.3 | Explain the purpose of business agreements (e.g., memos of understanding, service level agreement, statement of work, master services agreement) (L1) |
4.1.1 | Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, Central Processing Unit (CPU) features, memory module attributes, and expansion business types) (L1) |
4.1.2 | Use industry standard vocabulary to identify components (L1) |
4.2.1 | Select and install appropriate system unit components to meet customer specifications (L1) |
4.2.2 | Interpret BIOS/UEFI settings for basic hardware components (L1) |
4.2.3 | Configure the settings of basic hardware components (L1) |
4.2.4 | Troubleshoot basic hardware components and resolve issues (L1) |
4.3.1 | Categorize audio and video device components, connectors, and cables (L1) |
4.3.2 | Install appropriate sound and video cards to match specifications and end-user requirements (L1) |
4.3.3 | Configure display and video settings (L1) |
4.3.4 | Manage sound card and audio device settings (L1) |
4.4.1 | Identify external device components, connectors, and cables (L1) |
4.4.2 | Connect external devices using the appropriate connectors and cables (L1) |
4.4.3 | Manage device driver updates and roll back drivers (L1) |
4.4.4 | Enable or disable devices (L1) |
4.4.5 | Install drivers for external devices (L1) |
4.4.6 | Prepare devices for safe removal (L1) |
4.4.7 | Manipulate system utilities to configure storage and external devices (L1) |
4.5.1 | Install small office/home office network (SOHO) multifunction device/printers and configure appropriate settings (L1) |
4.5.2 | Compare and contrast differences between the various print technologies and the associated imaging process (L1) |
4.5.3 | Perform appropriate printer maintenance (L1) |
5.1.1 | Use industry standard vocabulary in relation to operating systems (OS) (L1, L2) |
5.1.2 | Compare and contrast (L1, L2) |
5.1.3 | Install and secure operating systems (L1, L2) |
5.1.4 | Install and configure Windows networking (L1, L2) |
5.2.1 | Explain various features and tools of operating systems (L1, L2) |
5.2.2 | Apply appropriate command line tools (L1, L2) |
5.2.3 | Select appropriate operating system features and tools based on customer requirements (L1, L2) |
5.2.4 | Configure Windows Update settings (L1, L2) |
5.2.5 | Configure local users and groups for a Windows networking system (L1, L2) |
5.2.6 | Configure User Access Control (UAC) (L1, L2) |
5.2.7 | Use Windows Control Panel utilities (L1, L2) |
5.2.8 | Perform common preventive maintenance procedures using the appropriate Windows OS tools (L1, L2) |
5.2.9 | Troubleshoot common PC security issues using best practices (L1, L2) |
5.3.1 | Explain key terms and acronyms used in diagnostic testing and troubleshooting (L1, L2) |
5.3.2 | Identify common symptoms for a given discrepancy (L1, L2) |
5.3.3 | Develop a solution for a given discrepancy (L1, L2) |
5.3.4 | Document the solution (L1, L2) |
5.4.1 | Identify common features and functionality of Mac OS, Chrome, and other Linux operating systems (L1, L2) |
5.4.2 | Set up and use client-side virtualization and introduce server virtualization topics (L1, L2) |
5.4.3 | Identify basic features of mobile operating systems (L1, L2) |
5.4.4 | Install and configure basic mobile device network connectivity and email (L1, L2) |
5.4.5 | Summarize methods and data related to mobile device synchronization (L1, L2) |
5.4.6 | Compare and contrast methods to secure mobile devices (L1, L2) |
5.4.7 | Explain the characteristics of various types of other mobile devices (L1) |
5.4.8 | Compare and contrast accessories, features, and ports of mobile and IoT devices (L1, L2) |
5.4.9 | Troubleshoot common mobile OS and tablet software/hardware issues (L1, L2) |
5.5.1 | Compare and contrast laptops, tablets, and computer form factors (L1) |
5.5.2 | Explain current trends in laptops and tablet applications (L1) |
5.5.3 | Compare laptop and tablet operating systems (L1) |
5.5.4 | Explain the function of components within the display of a laptop and tablet (L1) |
5.5.5 | Compare and contrast accessories, features, and ports of laptops and tablets (L1) |
5.6.1 | Identify basic cloud concepts (L1) |
6.1.1 | Describe the OSI model and relate to hardware in a network (L1, L2) |
6.1.2 | Implement the appropriate industry policy and procedures (L1, L2) |
6.1.3 | Compare and contrast the ports and protocols (HTTP – Hypertext Transfer Protocol, NetBIOS – Network Basic Input/Output System, SMTP – Simple Mail Transfer Protocol, TCP – Transmission Control Protocol, UDP – User Datagram Protocol, etc.) (L1, L2) |
6.2.1 | Describe encapsulation/de-encapsulation (L1) |
6.2.2 | Explain modulation techniques (L1) |
6.2.3 | Apply numbering systems (e.g., binary, octal, hexadecimal) (L1) |
6.2.4 | Demonstrate addressing and subnetting techniques (L1) |
6.2.5 | Compare broadband/baseband (L1) |
6.2.6 | Compare and contrast bit rates versus baud rates (L1) |
6.2.7 | Describe code-division multiple access (CDMA) (L1) |
6.2.8 | Explain the difference between carrier sense multiple access with collision detection (CSMA/CD) and collision avoidance (CSMA/CA) (L1) |
6.2.9 | Describe wavelength (L1) |
6.2.10 | Apply transmission control protocol/internet protocol (TCP/IP) suite (TCP, UDP, ICMP – internet control message protocol) (L1) |
6.3.1 | Compare main distribution frame (MDF) and intermediate distribution frame (IDF) (L1, L2) |
6.3.2 | Implement a cable management solution (L1, L2) |
6.3.3 | Analyze and create a power management plan (i.e., power converters, circuits, UPS – uninterruptible power supply [power redundancy], inverters, load capacity) (L1, L2) |
6.3.4 | Determine proper airflow for optimal performance (L1, L2) |
6.3.5 | Utilize correct rack systems for location and operation (L1) |
6.3.6 | Employ consistent labeling methodologies (port, system, circuit, patch panel) (L1) |
6.3.7 | Develop a plan to monitor rack security and environmental conditions (L1) |
8.5.1 | Install software and hardware patches and updates (OS, critical, non-critical, etc.) (L1) |
8.5.2 | Compare and contrast firmware and driver updates (L1) |
8.5.3 | Recognize the difference between feature releases/security updates (L1) |
8.5.4 | Develop rollout/rollback procedures (L1) |
9.1.1 | Describe the steps of the cybersecurity lifecycle (e.g., people, process, and tools) (L1) |
9.1.2 | Write a set of principles, rules, and practices to provide guidance and direction (L1) |
9.1.3 | Follow appropriate decision-making models to determine correct response procedures (L1) |
9.2.1 | Plan, prepare, and develop scope for a Cyber Incident Response Plan (L1) |
9.2.2 | Determine correct detection, mitigation, and reporting processes (L1) |
9.2.3 | Evaluate assessment and decision-making steps when handling an incident or event (L1) |
9.2.4 | Determine correct investigative procedures (L1) |
9.2.5 | Gather intelligence from a variety of sources, including open source and others (L1) |
9.2.6 | Document intelligence-gathering efforts, including who, what, when, where, why, and how (L1) |
9.2.7 | Determine the extent of event or incident scope, including severity (L1) |
10.2.1 | Explain the proper use of penetration testing versus vulnerability scanning (L1) |
10.2.2 | Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters (L1) |
10.2.3 | Discover the common types of cyber threat actors, including Cybercriminals, AttentionSeekers, Script Kiddies, Hacktivists, and Nation States (L1) |
10.2.4 | Explain and summarize the common cybersecurity attacks, including the preferred tactics, techniques, and procedures (TTPS) of threat actors (L1) |
10.2.5 | Examine and summarize the targets of cyber threat actors, including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications (L1) |
10.2.6 | Review and examine geopolitical flashpoints (L1) |
10.3.4 | Identify encryption methods and demonstrate tools to decipher encrypted data (L1) |
10.3.6 | Identify Web application exploits and vulnerabilities (L1) |
10.3.7 | Describe and demonstrate Web Application Security and Scanning methods and tools (L1) |
10.3.9 | Describe and demonstrate a working knowledge of phishing attacks and mitigation steps (L1) |
11.1.1 | Describe job skills needed for potential careers in new and emerging technologies (L1) |
11.1.2 | Explore potential uses for and industries that may use emerging technologies (L1) |
11.1.3 | Explain the role of ethics as it relates to security and emerging technologies (L1) |