Please enable JavaScript to use CodeHS

Standards Framework

for Nevada Cybersecurity I Effective 2023


Standards in this Framework

Standard Description
1.1.1 Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law (Level 1 (L1), Level 2 (L2), Complementary (C))
1.1.2 Research nationally recognized CTSOs (L1, L2, C)
1.1.3 Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) (L1, L2, C)
1.2.1 Discuss the purpose of parliamentary procedure (L1, L2, C)
1.2.2 Demonstrate the proper use of parliamentary procedure (L1, L2, C)
1.2.3 Differentiate between an office and a committee (L1, L2, C)
1.2.4 Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions (L1, L2, C)
1.2.5 Participate in local, regional, state, or national conferences, events, or competitions (L1, L2, C)
1.2.6 Describe the importance of a constitution and bylaws to the operation of a CTSO chapter (L1, L2, C)
1.3.1 Explore opportunities in community service-related work-based learning (WBL) (L1, L2, C)
1.3.2 Participate in a service learning (program related) and/or community service project or activity (L1, L2, C)
1.3.3 Engage with business and industry partners for community service (L1, L2, C)
1.4.1 Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) (L1, L2, C)
1.4.2 Describe the appropriate professional/workplace attire and its importance (L1, L2, C)
1.4.3 Investigate industry-standard credentials/certifications available within this Career Cluster™ (L1, L2, C)
1.4.4 Participate in authentic contextualized instructional activities (L1, L2, C)
1.4.5 Demonstrate technical skills in various student organization activities/events (L1, L2, C)
1.5.1 Make a connection between program standards to career pathway(s) (L1, L2, C)
1.5.2 Explain the importance of participation and completion of a program of study (L1, L2, C)
1.5.3 Promote community awareness of local student organizations associated with CTE programs (L1, L2, C)
2.1.1 Demonstrate the proper use of safety devices based on industry regulations (L1)
2.1.2 Research the environmental impact of production based on industry standards (L1)
2.1.3 Research local, state, federal, and international regulations related to material handling (L1)
2.1.4 Demonstrate secure disposal of technology materials and data (L1)
2.1.5 Introduce Material Safety Data Sheets (MSDS) (L1)
2.1.6 Explain the relationship between organization and safety (L1)
2.1.7 Demonstrate an organized work environment (L1)
2.1.8 Demonstrate electrical safety (e.g., grounding, ESD [static]) (L1)
2.1.9 Apply installation safety (e.g., lifting, overhead movements) (L1)
2.1.10 Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems, natural disasters) (L1)
2.2.1 Explain common tools used in computer repair (L1)
2.2.2 Demonstrate the use of common networking and repair tools (L1)
2.2.3 Select the proper tool for diagnostic and troubleshooting procedures (L1)
2.2.4 Discuss fire suppression systems, the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems, and industry standards when dealing with the loss of power (L1)
3.1.1 Analyze legal issues in technology (L1)
3.1.2 Evaluate intellectual property laws (L1)
3.1.3 Explain differences between licensing, copyright, and infringement (L1)
3.1.4 Explain the differences between restricted content, prohibited or illegal content (L1)
3.1.5 Examine state, federal, and international regulations related to technology (e.g., legal holds, disposal methods, data retention, discoverability, data protection) (L1)
3.2.1 Analyze acceptable use policies (L1)
3.2.2 Explain the difference between technology policies, privacy standards, and best practices (L1)
3.2.3 Explain data and privacy encryption issues related to using technology (L1)
3.2.4 Evaluate appropriate consent policies to monitoring various stakeholders (L1)
3.2.5 Explain appropriate data classification (L1)
3.3.1 Communicate with customers to ensure understanding of customer requirements, scope, and concerns (L1)
3.3.2 Utilize appropriate documentation systems (L1)
3.3.3 Explain the purpose of business agreements (e.g., memos of understanding, service level agreement, statement of work, master services agreement) (L1)
4.1.1 Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, Central Processing Unit (CPU) features, memory module attributes, and expansion business types) (L1)
4.1.2 Use industry standard vocabulary to identify components (L1)
4.2.1 Select and install appropriate system unit components to meet customer specifications (L1)
4.2.2 Interpret BIOS/UEFI settings for basic hardware components (L1)
4.2.3 Configure the settings of basic hardware components (L1)
4.2.4 Troubleshoot basic hardware components and resolve issues (L1)
4.3.1 Categorize audio and video device components, connectors, and cables (L1)
4.3.2 Install appropriate sound and video cards to match specifications and end-user requirements (L1)
4.3.3 Configure display and video settings (L1)
4.3.4 Manage sound card and audio device settings (L1)
4.4.1 Identify external device components, connectors, and cables (L1)
4.4.2 Connect external devices using the appropriate connectors and cables (L1)
4.4.3 Manage device driver updates and roll back drivers (L1)
4.4.4 Enable or disable devices (L1)
4.4.5 Install drivers for external devices (L1)
4.4.6 Prepare devices for safe removal (L1)
4.4.7 Manipulate system utilities to configure storage and external devices (L1)
4.5.1 Install small office/home office network (SOHO) multifunction device/printers and configure appropriate settings (L1)
4.5.2 Compare and contrast differences between the various print technologies and the associated imaging process (L1)
4.5.3 Perform appropriate printer maintenance (L1)
5.1.1 Use industry standard vocabulary in relation to operating systems (OS) (L1, L2)
5.1.2 Compare and contrast (L1, L2)
5.1.3 Install and secure operating systems (L1, L2)
5.1.4 Install and configure Windows networking (L1, L2)
5.2.1 Explain various features and tools of operating systems (L1, L2)
5.2.2 Apply appropriate command line tools (L1, L2)
5.2.3 Select appropriate operating system features and tools based on customer requirements (L1, L2)
5.2.4 Configure Windows Update settings (L1, L2)
5.2.5 Configure local users and groups for a Windows networking system (L1, L2)
5.2.6 Configure User Access Control (UAC) (L1, L2)
5.2.7 Use Windows Control Panel utilities (L1, L2)
5.2.8 Perform common preventive maintenance procedures using the appropriate Windows OS tools (L1, L2)
5.2.9 Troubleshoot common PC security issues using best practices (L1, L2)
5.3.1 Explain key terms and acronyms used in diagnostic testing and troubleshooting (L1, L2)
5.3.2 Identify common symptoms for a given discrepancy (L1, L2)
5.3.3 Develop a solution for a given discrepancy (L1, L2)
5.3.4 Document the solution (L1, L2)
5.4.1 Identify common features and functionality of Mac OS, Chrome, and other Linux operating systems (L1, L2)
5.4.2 Set up and use client-side virtualization and introduce server virtualization topics (L1, L2)
5.4.3 Identify basic features of mobile operating systems (L1, L2)
5.4.4 Install and configure basic mobile device network connectivity and email (L1, L2)
5.4.5 Summarize methods and data related to mobile device synchronization (L1, L2)
5.4.6 Compare and contrast methods to secure mobile devices (L1, L2)
5.4.7 Explain the characteristics of various types of other mobile devices (L1)
5.4.8 Compare and contrast accessories, features, and ports of mobile and IoT devices (L1, L2)
5.4.9 Troubleshoot common mobile OS and tablet software/hardware issues (L1, L2)
5.5.1 Compare and contrast laptops, tablets, and computer form factors (L1)
5.5.2 Explain current trends in laptops and tablet applications (L1)
5.5.3 Compare laptop and tablet operating systems (L1)
5.5.4 Explain the function of components within the display of a laptop and tablet (L1)
5.5.5 Compare and contrast accessories, features, and ports of laptops and tablets (L1)
5.6.1 Identify basic cloud concepts (L1)
6.1.1 Describe the OSI model and relate to hardware in a network (L1, L2)
6.1.2 Implement the appropriate industry policy and procedures (L1, L2)
6.1.3 Compare and contrast the ports and protocols (HTTP – Hypertext Transfer Protocol, NetBIOS – Network Basic Input/Output System, SMTP – Simple Mail Transfer Protocol, TCP – Transmission Control Protocol, UDP – User Datagram Protocol, etc.) (L1, L2)
6.2.1 Describe encapsulation/de-encapsulation (L1)
6.2.2 Explain modulation techniques (L1)
6.2.3 Apply numbering systems (e.g., binary, octal, hexadecimal) (L1)
6.2.4 Demonstrate addressing and subnetting techniques (L1)
6.2.5 Compare broadband/baseband (L1)
6.2.6 Compare and contrast bit rates versus baud rates (L1)
6.2.7 Describe code-division multiple access (CDMA) (L1)
6.2.8 Explain the difference between carrier sense multiple access with collision detection (CSMA/CD) and collision avoidance (CSMA/CA) (L1)
6.2.9 Describe wavelength (L1)
6.2.10 Apply transmission control protocol/internet protocol (TCP/IP) suite (TCP, UDP, ICMP – internet control message protocol) (L1)
6.3.1 Compare main distribution frame (MDF) and intermediate distribution frame (IDF) (L1, L2)
6.3.2 Implement a cable management solution (L1, L2)
6.3.3 Analyze and create a power management plan (i.e., power converters, circuits, UPS – uninterruptible power supply [power redundancy], inverters, load capacity) (L1, L2)
6.3.4 Determine proper airflow for optimal performance (L1, L2)
6.3.5 Utilize correct rack systems for location and operation (L1)
6.3.6 Employ consistent labeling methodologies (port, system, circuit, patch panel) (L1)
6.3.7 Develop a plan to monitor rack security and environmental conditions (L1)
8.5.1 Install software and hardware patches and updates (OS, critical, non-critical, etc.) (L1)
8.5.2 Compare and contrast firmware and driver updates (L1)
8.5.3 Recognize the difference between feature releases/security updates (L1)
8.5.4 Develop rollout/rollback procedures (L1)
9.1.1 Describe the steps of the cybersecurity lifecycle (e.g., people, process, and tools) (L1)
9.1.2 Write a set of principles, rules, and practices to provide guidance and direction (L1)
9.1.3 Follow appropriate decision-making models to determine correct response procedures (L1)
9.2.1 Plan, prepare, and develop scope for a Cyber Incident Response Plan (L1)
9.2.2 Determine correct detection, mitigation, and reporting processes (L1)
9.2.3 Evaluate assessment and decision-making steps when handling an incident or event (L1)
9.2.4 Determine correct investigative procedures (L1)
9.2.5 Gather intelligence from a variety of sources, including open source and others (L1)
9.2.6 Document intelligence-gathering efforts, including who, what, when, where, why, and how (L1)
9.2.7 Determine the extent of event or incident scope, including severity (L1)
10.2.1 Explain the proper use of penetration testing versus vulnerability scanning (L1)
10.2.2 Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters (L1)
10.2.3 Discover the common types of cyber threat actors, including Cybercriminals, AttentionSeekers, Script Kiddies, Hacktivists, and Nation States (L1)
10.2.4 Explain and summarize the common cybersecurity attacks, including the preferred tactics, techniques, and procedures (TTPS) of threat actors (L1)
10.2.5 Examine and summarize the targets of cyber threat actors, including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications (L1)
10.2.6 Review and examine geopolitical flashpoints (L1)
10.3.4 Identify encryption methods and demonstrate tools to decipher encrypted data (L1)
10.3.6 Identify Web application exploits and vulnerabilities (L1)
10.3.7 Describe and demonstrate Web Application Security and Scanning methods and tools (L1)
10.3.9 Describe and demonstrate a working knowledge of phishing attacks and mitigation steps (L1)
11.1.1 Describe job skills needed for potential careers in new and emerging technologies (L1)
11.1.2 Explore potential uses for and industries that may use emerging technologies (L1)
11.1.3 Explain the role of ethics as it relates to security and emerging technologies (L1)