Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1.1.1
Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law (Level 1 (L1), Level 2 (L2), Complementary (C)) |
|
1.1.2
Research nationally recognized CTSOs (L1, L2, C) |
|
1.1.3
Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) (L1, L2, C) |
|
1.2.1
Discuss the purpose of parliamentary procedure (L1, L2, C) |
|
1.2.2
Demonstrate the proper use of parliamentary procedure (L1, L2, C) |
|
1.2.3
Differentiate between an office and a committee (L1, L2, C) |
|
1.2.4
Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions (L1, L2, C) |
|
1.2.5
Participate in local, regional, state, or national conferences, events, or competitions (L1, L2, C) |
|
1.2.6
Describe the importance of a constitution and bylaws to the operation of a CTSO chapter (L1, L2, C) |
|
1.3.1
Explore opportunities in community service-related work-based learning (WBL) (L1, L2, C) |
|
1.3.2
Participate in a service learning (program related) and/or community service project or activity (L1, L2, C) |
|
1.3.3
Engage with business and industry partners for community service (L1, L2, C) |
|
1.4.1
Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) (L1, L2, C) |
|
1.4.2
Describe the appropriate professional/workplace attire and its importance (L1, L2, C) |
|
1.4.3
Investigate industry-standard credentials/certifications available within this Career Cluster™ (L1, L2, C) |
|
1.4.4
Participate in authentic contextualized instructional activities (L1, L2, C) |
|
1.4.5
Demonstrate technical skills in various student organization activities/events (L1, L2, C) |
|
1.5.1
Make a connection between program standards to career pathway(s) (L1, L2, C) |
|
1.5.2
Explain the importance of participation and completion of a program of study (L1, L2, C) |
|
1.5.3
Promote community awareness of local student organizations associated with CTE programs (L1, L2, C) |
|
2.1.1
Demonstrate the proper use of safety devices based on industry regulations (L1) |
|
2.1.2
Research the environmental impact of production based on industry standards (L1) |
|
2.1.3
Research local, state, federal, and international regulations related to material handling (L1) |
|
2.1.4
Demonstrate secure disposal of technology materials and data (L1) |
|
2.1.5
Introduce Material Safety Data Sheets (MSDS) (L1) |
|
2.1.6
Explain the relationship between organization and safety (L1) |
|
2.1.7
Demonstrate an organized work environment (L1) |
|
2.1.8
Demonstrate electrical safety (e.g., grounding, ESD [static]) (L1) |
|
2.1.9
Apply installation safety (e.g., lifting, overhead movements) (L1) |
|
2.1.10
Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems, natural disasters) (L1) |
|
2.2.1
Explain common tools used in computer repair (L1) |
|
2.2.2
Demonstrate the use of common networking and repair tools (L1) |
|
2.2.3
Select the proper tool for diagnostic and troubleshooting procedures (L1) |
|
2.2.4
Discuss fire suppression systems, the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems, and industry standards when dealing with the loss of power (L1) |
|
3.1.1
Analyze legal issues in technology (L1) |
|
3.1.2
Evaluate intellectual property laws (L1) |
|
3.1.3
Explain differences between licensing, copyright, and infringement (L1) |
|
3.1.4
Explain the differences between restricted content, prohibited or illegal content (L1) |
|
3.1.5
Examine state, federal, and international regulations related to technology (e.g., legal holds, disposal methods, data retention, discoverability, data protection) (L1) |
|
3.2.1
Analyze acceptable use policies (L1) |
|
3.2.2
Explain the difference between technology policies, privacy standards, and best practices (L1) |
|
3.2.3
Explain data and privacy encryption issues related to using technology (L1) |
|
3.2.4
Evaluate appropriate consent policies to monitoring various stakeholders (L1) |
|
3.2.5
Explain appropriate data classification (L1) |
|
3.3.1
Communicate with customers to ensure understanding of customer requirements, scope, and concerns (L1) |
|
3.3.2
Utilize appropriate documentation systems (L1) |
|
3.3.3
Explain the purpose of business agreements (e.g., memos of understanding, service level agreement, statement of work, master services agreement) (L1) |
|
4.1.1
Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, Central Processing Unit (CPU) features, memory module attributes, and expansion business types) (L1) |
|
4.1.2
Use industry standard vocabulary to identify components (L1) |
|
4.2.1
Select and install appropriate system unit components to meet customer specifications (L1) |
|
4.2.2
Interpret BIOS/UEFI settings for basic hardware components (L1) |
|
4.2.3
Configure the settings of basic hardware components (L1) |
|
4.2.4
Troubleshoot basic hardware components and resolve issues (L1) |
|
4.3.1
Categorize audio and video device components, connectors, and cables (L1) |
|
4.3.2
Install appropriate sound and video cards to match specifications and end-user requirements (L1) |
|
4.3.3
Configure display and video settings (L1) |
|
4.3.4
Manage sound card and audio device settings (L1) |
|
4.4.1
Identify external device components, connectors, and cables (L1) |
|
4.4.2
Connect external devices using the appropriate connectors and cables (L1) |
|
4.4.3
Manage device driver updates and roll back drivers (L1) |
|
4.4.4
Enable or disable devices (L1) |
|
4.4.5
Install drivers for external devices (L1) |
|
4.4.6
Prepare devices for safe removal (L1) |
|
4.4.7
Manipulate system utilities to configure storage and external devices (L1) |
|
4.5.1
Install small office/home office network (SOHO) multifunction device/printers and configure appropriate settings (L1) |
|
4.5.2
Compare and contrast differences between the various print technologies and the associated imaging process (L1) |
|
4.5.3
Perform appropriate printer maintenance (L1) |
|
5.1.1
Use industry standard vocabulary in relation to operating systems (OS) (L1, L2) |
|
5.1.2
Compare and contrast (L1, L2) |
|
5.1.3
Install and secure operating systems (L1, L2) |
|
5.1.4
Install and configure Windows networking (L1, L2) |
|
5.2.1
Explain various features and tools of operating systems (L1, L2) |
|
5.2.2
Apply appropriate command line tools (L1, L2) |
|
5.2.3
Select appropriate operating system features and tools based on customer requirements (L1, L2) |
|
5.2.4
Configure Windows Update settings (L1, L2) |
|
5.2.5
Configure local users and groups for a Windows networking system (L1, L2) |
|
5.2.6
Configure User Access Control (UAC) (L1, L2) |
|
5.2.7
Use Windows Control Panel utilities (L1, L2) |
|
5.2.8
Perform common preventive maintenance procedures using the appropriate Windows OS tools (L1, L2) |
|
5.2.9
Troubleshoot common PC security issues using best practices (L1, L2) |
|
5.3.1
Explain key terms and acronyms used in diagnostic testing and troubleshooting (L1, L2) |
|
5.3.2
Identify common symptoms for a given discrepancy (L1, L2) |
|
5.3.3
Develop a solution for a given discrepancy (L1, L2) |
|
5.3.4
Document the solution (L1, L2) |
|
5.4.1
Identify common features and functionality of Mac OS, Chrome, and other Linux operating systems (L1, L2) |
|
5.4.2
Set up and use client-side virtualization and introduce server virtualization topics (L1, L2) |
|
5.4.3
Identify basic features of mobile operating systems (L1, L2) |
|
5.4.4
Install and configure basic mobile device network connectivity and email (L1, L2) |
|
5.4.5
Summarize methods and data related to mobile device synchronization (L1, L2) |
|
5.4.6
Compare and contrast methods to secure mobile devices (L1, L2) |
|
5.4.7
Explain the characteristics of various types of other mobile devices (L1) |
|
5.4.8
Compare and contrast accessories, features, and ports of mobile and IoT devices (L1, L2) |
|
5.4.9
Troubleshoot common mobile OS and tablet software/hardware issues (L1, L2) |
|
5.5.1
Compare and contrast laptops, tablets, and computer form factors (L1) |
|
5.5.2
Explain current trends in laptops and tablet applications (L1) |
|
5.5.3
Compare laptop and tablet operating systems (L1) |
|
5.5.4
Explain the function of components within the display of a laptop and tablet (L1) |
|
5.5.5
Compare and contrast accessories, features, and ports of laptops and tablets (L1) |
|
5.6.1
Identify basic cloud concepts (L1) |
|
6.1.1
Describe the OSI model and relate to hardware in a network (L1, L2) |
|
6.1.2
Implement the appropriate industry policy and procedures (L1, L2) |
|
6.1.3
Compare and contrast the ports and protocols (HTTP – Hypertext Transfer Protocol, NetBIOS – Network Basic Input/Output System, SMTP – Simple Mail Transfer Protocol, TCP – Transmission Control Protocol, UDP – User Datagram Protocol, etc.) (L1, L2) |
|
6.2.1
Describe encapsulation/de-encapsulation (L1) |
|
6.2.2
Explain modulation techniques (L1) |
|
6.2.3
Apply numbering systems (e.g., binary, octal, hexadecimal) (L1) |
|
6.2.4
Demonstrate addressing and subnetting techniques (L1) |
|
6.2.5
Compare broadband/baseband (L1) |
|
6.2.6
Compare and contrast bit rates versus baud rates (L1) |
|
6.2.7
Describe code-division multiple access (CDMA) (L1) |
|
6.2.8
Explain the difference between carrier sense multiple access with collision detection (CSMA/CD) and collision avoidance (CSMA/CA) (L1) |
|
6.2.9
Describe wavelength (L1) |
|
6.2.10
Apply transmission control protocol/internet protocol (TCP/IP) suite (TCP, UDP, ICMP – internet control message protocol) (L1) |
|
6.3.1
Compare main distribution frame (MDF) and intermediate distribution frame (IDF) (L1, L2) |
|
6.3.2
Implement a cable management solution (L1, L2) |
|
6.3.3
Analyze and create a power management plan (i.e., power converters, circuits, UPS – uninterruptible power supply [power redundancy], inverters, load capacity) (L1, L2) |
|
6.3.4
Determine proper airflow for optimal performance (L1, L2) |
|
6.3.5
Utilize correct rack systems for location and operation (L1) |
|
6.3.6
Employ consistent labeling methodologies (port, system, circuit, patch panel) (L1) |
|
6.3.7
Develop a plan to monitor rack security and environmental conditions (L1) |
|
8.5.1
Install software and hardware patches and updates (OS, critical, non-critical, etc.) (L1) |
|
8.5.2
Compare and contrast firmware and driver updates (L1) |
|
8.5.3
Recognize the difference between feature releases/security updates (L1) |
|
8.5.4
Develop rollout/rollback procedures (L1) |
|
9.1.1
Describe the steps of the cybersecurity lifecycle (e.g., people, process, and tools) (L1) |
|
9.1.2
Write a set of principles, rules, and practices to provide guidance and direction (L1) |
|
9.1.3
Follow appropriate decision-making models to determine correct response procedures (L1) |
|
9.2.1
Plan, prepare, and develop scope for a Cyber Incident Response Plan (L1) |
|
9.2.2
Determine correct detection, mitigation, and reporting processes (L1) |
|
9.2.3
Evaluate assessment and decision-making steps when handling an incident or event (L1) |
|
9.2.4
Determine correct investigative procedures (L1) |
|
9.2.5
Gather intelligence from a variety of sources, including open source and others (L1) |
|
9.2.6
Document intelligence-gathering efforts, including who, what, when, where, why, and how (L1) |
|
9.2.7
Determine the extent of event or incident scope, including severity (L1) |
|
10.2.1
Explain the proper use of penetration testing versus vulnerability scanning (L1) |
|
10.2.2
Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters (L1) |
|
10.2.3
Discover the common types of cyber threat actors, including Cybercriminals, AttentionSeekers, Script Kiddies, Hacktivists, and Nation States (L1) |
|
10.2.4
Explain and summarize the common cybersecurity attacks, including the preferred tactics, techniques, and procedures (TTPS) of threat actors (L1) |
|
10.2.5
Examine and summarize the targets of cyber threat actors, including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications (L1) |
|
10.2.6
Review and examine geopolitical flashpoints (L1) |
|
10.3.4
Identify encryption methods and demonstrate tools to decipher encrypted data (L1) |
|
10.3.6
Identify Web application exploits and vulnerabilities (L1) |
|
10.3.7
Describe and demonstrate Web Application Security and Scanning methods and tools (L1) |
|
10.3.9
Describe and demonstrate a working knowledge of phishing attacks and mitigation steps (L1) |
|
11.1.1
Describe job skills needed for potential careers in new and emerging technologies (L1) |
|
11.1.2
Explore potential uses for and industries that may use emerging technologies (L1) |
|
11.1.3
Explain the role of ethics as it relates to security and emerging technologies (L1) |
|