Standards in this Framework
| Standard | Description | 
|---|---|
| 1 | Demonstrate creativity and innovation. | 
| 2 | Demonstrate critical thinking and problem solving. | 
| 3 | Demonstrate initiative and self-direction. | 
| 4 | Demonstrate integrity. | 
| 5 | Demonstrate work ethic. | 
| 6 | Demonstrate conflict-resolution skills. | 
| 7 | Demonstrate listening and speaking skills. | 
| 8 | Demonstrate respect for diversity. | 
| 9 | Demonstrate customer service skills. | 
| 10 | Collaborate with team members. | 
| 11 | Demonstrate big-picture thinking. | 
| 12 | Demonstrate career- and life-management skills. | 
| 13 | Demonstrate continuous learning and adaptability. | 
| 14 | Manage time and resources. | 
| 15 | Demonstrate information-literacy skills. | 
| 16 | Demonstrate an understanding of information security. | 
| 17 | Maintain working knowledge of current information-technology (IT) systems. | 
| 18 | Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. | 
| 19 | Apply mathematical skills to job-specific tasks. | 
| 20 | Demonstrate professionalism. | 
| 21 | Demonstrate reading and writing skills. | 
| 22 | Demonstrate workplace safety. | 
| 23 | Examine aspects of planning within an industry/organization. | 
| 24 | Examine aspects of management within an industry/organization. | 
| 25 | Examine aspects of financial responsibility within an industry/organization. | 
| 26 | Examine technical and production skills required of workers within an industry/organization. | 
| 27 | Examine principles of technology that underlie an industry/organization. | 
| 28 | Examine labor issues related to an industry/organization. | 
| 29 | Examine community issues related to an industry/organization. | 
| 30 | Examine health, safety, and environmental issues related to an industry/organization. | 
| 31 | Identify the purposes and goals of the student organization. | 
| 32 | Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. | 
| 33 | Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. | 
| 34 | Identify Internet safety issues and procedures for complying with acceptable use standards. | 
| 35 | Identify the types of work-based learning (WBL) opportunities. | 
| 36 | Reflect on lessons learned during the WBL experience. | 
| 37 | Explore career opportunities related to the WBL experience. | 
| 38 | Participate in a WBL experience, when appropriate. | 
| 39 | Describe Cybersecurity | 
| 40 | Define information assurance | 
| 41 | Describe the critical factors of information security | 
| 42 | Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration | 
| 43 | Define risk | 
| 44 | Identify the concepts of cybersecurity risk management | 
| 45 | Describe cybersecurity threats to an organization | 
| 46 | Explain why organizations need to manage risk | 
| 47 | Discuss national or industry standards/regulations that relate to cybersecurity | 
| 48 | Describe the cyberattack surface of various organizations | 
| 49 | Analyze risks affecting critical infrastructure | 
| 50 | Describe a network | 
| 51 | Describe a wired/cabled network | 
| 52 | Describe a wireless network | 
| 53 | Compare cabled/wired and wireless networks | 
| 54 | Compare networking conceptual models | 
| 55 | Discuss services, their relationship to the OSI model, and potential vulnerabilities | 
| 56 | Differentiate among network types | 
| 57 | Examine the concept of the Internet as a network of connected systems | 
| 58 | Identify networking protocols | 
| 59 | Describe the difference between a cyber threat and a vulnerability | 
| 60 | Describe types of cyber threats | 
| 61 | Analyze types of current cyber threats | 
| 62 | Identify the perpetrators of different types of malicious hacking | 
| 63 | Describe the characteristics of vulnerabilities | 
| 64 | Identify the prevention of and protection against cyber threats | 
| 65 | Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks | 
| 66 | Differentiate between ethics and laws | 
| 67 | Distinguish among types of ethical concerns | 
| 68 | Define cyberbullying | 
| 69 | Identify actions that constitute cyberbullying | 
| 70 | Identify possible warning signs of someone being cyberbullied | 
| 71 | Identify laws applicable to cybersecurity | 
| 72 | Explain the concept of “personally identifiable information” | 
| 73 | Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it | 
| 74 | Identify ways to control and protect personal data | 
| 75 | Demonstrate net etiquette (netiquette) as it relates to cybersecurity | 
| 76 | Analyze the social and legal significance of the ongoing collection of personal digital information | 
| 77 | Distinguish between data, information, and knowledge | 
| 78 | Identify the most common ways data is collected | 
| 79 | Identify the most common ways data can be stored | 
| 80 | Explain the difference between data at rest, data in transit, and data being processed | 
| 81 | Identify the most common ways data is used | 
| 82 | Discuss how data can be compromised, corrupted, or lost | 
| 83 | Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) | 
| 84 | Define the function of a computer operating system | 
| 85 | Identify the components of an operating system | 
| 86 | List types of operating systems | 
| 87 | Evaluate the potential vulnerabilities, threats, and common exploits to an operating system | 
| 88 | Identify best practices for protecting operating systems | 
| 89 | Describe the concept of malware and techniques to guard against it | 
| 90 | Evaluate critical operating system security parameters | 
| 91 | Describe security and auditing logs | 
| 92 | Describe the role of a system backup | 
| 93 | Define virtualization technology | 
| 94 | Identify advantages and disadvantages of using virtual machines | 
| 95 | Define programming in the context of cybersecurity | 
| 96 | Differentiate between computer programming languages | 
| 97 | Evaluate common programming flaws that lead to vulnerabilities | 
| 98 | Identify best practices in secure coding and design | 
| 99 | Identify ubiquitous computing | 
| 100 | Discuss security and privacy implications of ubiquitous computing | 
| 101 | Research career opportunities for cybersecurity professionals | 
| 102 | Identify the educational pathways for emerging cybersecurity professionals | 
| 103 | Identify the educational pathways for emerging cybersecurity professionals | 
| 104 | Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters | 
| 105 | Research the cyber threats and security measures related to career pathways | 
| 106 | Identify testing skills/strategies for a certification examination | 
| 107 | Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course | 
| 108 | Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) | 
| 109 | Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) |