Standards in this Framework
Standards Mapped
Mapped to Course
| Standard | Lessons |
|---|---|
|
A.1
Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work. |
|
|
A.2
Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn. |
|
|
A.3
Employ effective reading, writing, and technical documentation skills. |
|
|
A.4
Solve problems using critical thinking techniques and structured troubleshooting methodologies. |
|
|
A.5
Demonstrate leadership skills and collaborate effectively as a team member. |
|
|
A.6
Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines. |
|
|
A.7
Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security. |
|
|
A.8
Demonstrate time-management skills and the ability to prioritize tasks in a technical setting. |
|
|
B.1
Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking. |
|
|
B.2
Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations. |
|
|
B.3
Demonstrate effective interview skills for roles in IT and networking. |
|
|
C.1
Use technology as a tool for research, organization, communication, and problem-solving. |
|
|
C.2
Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information. |
|
|
C.3
Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications. |
|
|
C.4
Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use. |
|
|
D.1
Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards. |
|
|
D.2
Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting. |
|
|
D.3
Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting. |
|
|
E.1
Design and implement infrastructures, including LANs, WANs, and VPNs, to support secure and efficient data communication. |
|
|
E.2
Configure and troubleshoot routing and switching devices, such as routers and managed switches, according to industry standards. |
|
|
E.3
Utilize subnetting, IP addressing, and network protocols (TCP/IP, DNS, DHCP) to design secure network configurations. |
|
|
E.4
Apply techniques for optimizing network performance and securing network traffic. |
|
|
F.1
Implement network security controls, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., HTTPS TLS). |
|
|
F.2
Configure and troubleshoot virtual private networks (VPNs) and other remote access solutions to protect data transmission. |
|
|
F.3
Demonstrate knowledge of wireless security settings, including encryption standards (WPA2, WPA3) and access control. |
|
|
F.4
Monitor network activity and logs to detect and respond to security threats. |
|
|
G.1
Identify and analyze security vulnerabilities in network systems using vulnerability scanning tools and penetration testing methods. |
|
|
G.2
Conduct risk assessments and apply best practices for risk mitigation, including patch management, configuration management, and security policies. |
|
|
G.3
Explain and implement access control models, such as role-based access control (RBAC), and multi-factor authentication (MFA). |
|
|
G.4
Perform security audits and apply remediation strategies to strengthen the security posture of network environments. |
|
|
H.1
Create and enforce security policies, procedures, and incident response plans based on organizational needs. |
|
|
H.2
Explain and implement data protection strategies, including data classification, encryption, and secure disposal methods. |
|
|
H.3
Apply principles of social engineering awareness and conduct training to enhance security culture within an organization. |
|
|
H.4
Demonstrate an understanding of regulatory compliance and privacy laws, such as GDPR and HIPAA, and their impact on cybersecurity practices. |
|
|
I.1
Demonstrate effective communication skills in documenting and reporting security incidents and resolutions. |
|
|
I.2
Apply advanced mathematical concepts, including probability and statistics, for analyzing network traffic patterns and threat data. |
|
|
I.3
Use scientific and forensic principles to investigate and analyze security incidents in digital systems. |
|
|
J.1
Compare IT vs. OT environments (safety/availability priorities, legacy systems, real-time constraints). |
|
|
J.2
Describe the Purdue Model and recommend segmentation for ICS/IIoT networks. |
|
|
J.3
Identify common OT threats (e.g., ransomware in manufacturing, insecure remote access) and basic mitigations (e.g., allow-listing, change control). |
|
|
J.4
Apply secure-by-design concepts (threat modeling, SBOM awareness, default-deny) to simple OT scenarios. |
|
|
J.5
Explain how incident response and business continuity differ in OT contexts (safety and recovery windows). |
|
|
K.1
Differentiate IaaS, PaaS, and SaaS and shared-responsibility models. |
|
|
K.2
Configure identity, MFA, and baseline policies in a sandbox cloud tenant. |
|
|
K.3
Interpret basic cloud service provider logs (e.g., sign-in, resource changes) to identify misconfigurations. |
|
|
K.4
Describe risks of public storage, exposed keys, and over-permissive roles; propose remediations. |
|
|
L.1
Map the identity lifecycle (provision, review, de-provision) and enforce least-privilege via roles. |
|
|
L.2
Implement MFA choices and evaluate usability vs. security trade-offs. |
|
|
L.3
Explain single sign-on (SSO) and federated identity at a conceptual level. |
|
|
M.1
Explain common web/app flaws (OWASP Top 10 at a survey level) and simple input validation. |
|
|
M.2
Use static/dynamic analysis tools in a safe lab to spot low-risk issues. |
|
|
M.3
Propose remediation and secure coding guidelines appropriate to a high-school level. |
|
|
N.1
Complete beginner-to-intermediate CTF labs (e.g., privilege escalation basics, simple web exploitation) in a safe, isolated environment. |
|
|
N.2
Produce brief write-ups capturing approach, tools used, and lessons learned. |
|
|
N.3
Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved. |
|
|
O.1
Describe how anomaly detection and clustering can support security operations center (SOC) workflows. |
|
|
O.2
Recognize adversarial uses of AI (e.g., phishing at scale, deepfakes) and propose controls (e.g., content provenance, user education). |
|