Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons |
|---|---|
|
A.1
Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work. |
|
|
A.2
Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn. |
|
|
A.3
Employ effective reading, writing, and technical documentation skills. |
|
|
A.4
Solve problems using critical thinking techniques and structured troubleshooting methodologies. |
|
|
A.5
Demonstrate leadership skills and collaborate effectively as a team member. |
|
|
A.6
Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines. |
|
|
A.7
Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security. |
|
|
A.8
Demonstrate time-management skills and the ability to prioritize tasks in a technical setting. |
|
|
B.1
Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking. |
|
|
B.2
Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations. |
|
|
B.3
Demonstrate effective interview skills for roles in IT and networking. |
|
|
C.1
Use technology as a tool for research, organization, communication, and problem-solving. |
|
|
C.2
Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information. |
|
|
C.3
Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications. |
|
|
C.4
Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use. |
|
|
D.1
Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards. |
|
|
D.2
Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting. |
|
|
D.3
Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting. |
|
|
E.1
Identify and describe the functions of different computer hardware components, including CPUs, memory, storage, and peripheral devices. |
|
|
E.2
Perform basic hardware installation, configuration, and troubleshooting in line with industry standards. |
|
|
E.3
Demonstrate the ability to install and configure operating systems, focusing on system updates, patches, and driver installations. |
|
|
E.4
Explain the importance of and perform regular maintenance and upgrades on hardware and software systems. |
|
|
F.1
Understand basic networking concepts, including IP addressing and network protocols, to prepare for configuration and troubleshooting. |
|
|
F.2
Configure and troubleshoot wired and wireless network connections, adhering to industry protocols and standards. |
|
|
F.3
Apply fundamental concepts of network security, including firewalls, antivirus software, and network access controls. |
|
|
F.4
Demonstrate the ability to set up and secure both home and small business networks, emphasizing cybersecurity best practices. |
|
|
G.1
Describe common security threats, vulnerabilities, and attacks, including phishing, malware, and social engineering. |
|
|
G.2
Identify basic data security measures, such as data encryption, secure passwords, and data backup strategies. |
|
|
G.3
Demonstrate knowledge of access controls, user permissions, and authentication methods for protecting information systems. |
|
|
G.4
Describe the core cybersecurity frameworks including the CIA Triad, Defense in Depth, and Authentication, Authorization, and Accounting (AAA) and how they influence cybersecurity policies and practices. |
|
|
G.5
Conduct basic risk assessments and apply strategies to mitigate potential cybersecurity threats. |
|
|
H.1
Identify and troubleshoot common hardware, software, and network issues using systematic diagnostic methods. |
|
|
H.2
Document technical issues, troubleshooting steps, and solutions in line with industry documentation practices. |
|
|
H.3
Demonstrate the use of technical support tools, such as remote assistance, for resolving user issues. |
|
|
H.4
Apply customer service skills in technical support scenarios, practicing professional communication and problem-solving techniques. |
|
|
I.1
Harden operating systems (local policies, secure services, update/patch cadence) and configure endpoint protection (AV/EDR). |
|
|
I.2
Apply least-privilege and standard user policies; manage local groups and permissions. |
|
|
I.3
Configure basic logging and review event logs to identify suspicious activity. |
|
|
I.4
Create and test a simple data backup/restore plan for endpoints. |
|
|
J.1
Use decomposition, pattern recognition, abstraction, and algorithms to plan solutions. |
|
|
J.2
Write and run simple scripts (e.g., Python, Bash, or PowerShell) to parse logs, hash files, or query system info. |
|
|
J.3
Use regular expressions and command-line tools to filter and transform data. |
|
|
J.4
Document scripts with comments and basic error handling. |
|
|
K.1
Explain what modern AI/ML systems do (at a high level) and their limitations (e.g., hallucinations, bias, data leakage). |
|
|
K.2
Use AI tools responsibly for research and drafting (prompt hygiene, citation, privacy-safe inputs). |
|
|
K.3
Identify security risks of AI systems (e.g., prompt injection, model poisoning, data exfiltration) in age-appropriate scenarios. |
|
|
L.1
Track current industry news and summarize quarterly trends (e.g., AI, cloud, OT). |
|
|
L.2
Map evolving roles to skills/credentials (e.g., Security Operations, GRC, Cloud Security, OT Security) and update an individual learning plan. |
|
|
M.1
Complete beginner capture-the-flag (CTF) labs (e.g., password cracking basics, log triage, web challenges) in a safe, isolated environment. |
|
|
M.2
Reflect on problem-solving approaches and document write-ups in a portfolio. |
|
|
M.3
Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved. |
|
|
N.1
Perform basic OS installation or imaging and initial configuration (accounts, updates, drivers). |
|
|
N.2
Configure user profiles and local authentication settings on Windows, Linux, or macOS. |
|
|
N.3
Connect and troubleshoot common peripherals and printers at a basic level. |
|
|
N.4
Describe safe tool use and ESD precautions during basic hardware service. |
|