19.01 |
Define cybersecurity. |
Lessons
|
19.02 |
Describe how information security evolved into cybersecurity and the impact of the Internet on the pace and nature of the evolution. |
Lessons
|
19.03 |
Describe the individual elements that comprise the CIA triad (i.e., Confidentiality, Integrity, Availability). |
Lessons
|
19.04 |
Define and explain the various types of hackers and the role each plays in cybersecurity. |
Lessons
|
19.05 |
Describe various methodologies used by hackers and the basis for their employment. |
Lessons
|
19.06 |
Describe the individual elements of the AAA model (Authentication, Authorization and Accounting). |
Lessons
|
20.01 |
Describe the role of the National Security Agency. |
Lessons
|
20.02 |
Describe current trends in cyberattacks and strategies for combating them. |
Lessons
|
20.03 |
Describe the legal implications of computer hacking and other forms of cyberattacks. |
Lessons
|
20.04 |
Understand the importance of the weekly bulletins distributed by the United States Computer Emergency Readiness Team (US-CERT). |
Lessons
|
20.05 |
Determine if any software or hardware on a given network has vulnerabilities outlined in the most recent US-CERT bulletin. |
Lessons
|
21.01 |
Differentiate between cybersecurity and information assurance. |
Lessons
|
21.02 |
Define confidentiality and give examples of security breaches. |
Lessons
|
21.03 |
Define integrity and give examples of security breaches. |
Lessons
|
21.04 |
Define authenticity and give examples of security breaches. |
Lessons
|
21.05 |
Define accountability (non-repudiation) and give examples of security breaches. |
Lessons
|
22.01 |
Describe the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). |
Lessons
|
22.02 |
Demonstrate and understanding of common computer and programming terminology. |
Lessons
|
22.03 |
Explain the physical and logical architecture of a microcomputer system. |
Lessons
|
22.04 |
Describe the file types used in the operation of a computer. |
Lessons
|
22.05 |
Compare and contrast memory technologies (e.g., RAM, ROM, virtual memory, memory management). |
Lessons
|
23.01 |
Compare operating system file naming conventions. |
Lessons
|
23.02 |
Describe the common elements that comprise the architecture of an operating system (e.g., kernel, file manager, memory manager, device manager, network manager). |
Lessons
|
23.03 |
Demonstrate proficiency with file management and structure (e.g., folder creation, file creation, backup, copy, delete, open, save). |
Lessons
|
23.04 |
Demonstrate a working knowledge of standard file formats. |
Lessons
|
23.05 |
Describe the purpose of various operating systems (e.g., Windows, Mac, iOS, Android and Linux). |
Lessons
|
23.06 |
Describe the difference between client and network operating systems. |
Lessons
|
23.07 |
Differentiate between different operating systems and applications and Macros. |
Lessons
|
23.08 |
Explain the basics of boot sequences, methods and startup utilities. |
Lessons
|
23.09 |
Compare and contrast open source and proprietary software. |
Lessons
|
23.10 |
Describe common system utilities used in performing computer maintenance. |
Lessons
|
24.01 |
Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. |
Lessons
|
24.02 |
Describe the purpose of the OSI model and each of its layers. |
Lessons
|
24.03 |
Explain specific functions belonging to each OSI model layer. |
Lessons
|
24.04 |
Understand how two network nodes communicate through the OSI model. |
Lessons
|
24.05 |
Discuss the structure and purpose of data packets and frames. |
Lessons
|
24.06 |
Describe the two types of addressing covered by the OSI model. |
Lessons
|
25.01 |
Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. |
Lessons
|
25.02 |
Describe the purpose of the TCP/IP model and each of its layers. |
Lessons
|
25.03 |
Explain specific functions belonging to each TCP/IP model layer. |
Lessons
|
25.04 |
Understand how two network nodes communicate through the TCP/IP model. |
Lessons
|
25.05 |
Describe the two types of addressing covered by the TCP/IP model. |
Lessons
|
26.01 |
Describe the services and protocols used in the OSI Application Layer (i.e., DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP). |
Lessons
|
26.02 |
Describe the services and protocols used in the OSI Transport Layer (i.e., TCP, TLS/SSL, UDP). |
Lessons
|
26.03 |
Describe the services and protocols used in the OSI Network Layer (i.e., IP, ICMP, IGMP, IPsec). |
Lessons
|
26.04 |
Describe the services and protocols used in the OSI Data Link Layer (i.e., ARP, OSPF, L2TP, PPP). |
Lessons
|
27.01 |
Define networking and describe the purpose of a network. |
Lessons
|
27.02 |
Describe the conceptual background of digital networks and cloud computing including terminology and basics. |
Lessons
|
27.03 |
Describe various types of networks and the advantages and disadvantages of each (e.g., peer to peer, client/server, server/thin client, ROI). |
Lessons
|
27.04 |
Describe the use, advantages, and disadvantages of various network media (e.g. coaxial, twisted pair, fiber optics). |
Lessons
|
27.05 |
Describe the function of various network devices (e.g., managed switch, switched hub or switch, router, bridge, gateway, access points, modem). |
Lessons
|
27.06 |
Describe how network devices are identified (i.e., IP addressing). |
Lessons
|
27.07 |
Explain the protocols commonly used in a network environment. |
Lessons
|
27.08 |
Differentiate between public and private IP addresses. |
Lessons
|
27.09 |
Describe the common ports and corresponding protocols used in a network. |
Lessons
|
27.10 |
Describe the difference between the Internet and intranet. |
Lessons
|
27.11 |
Compare and contrast IPv4 and IPv6. |
Lessons
|
27.12 |
Compare and contrast the different methods for network connectivity (e.g., broadband, wireless, Bluetooth, cellular). |
Lessons
|
27.13 |
Discuss the differences between Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Virtual Local Area Network (VLAN), and Virtual Private Network (VPN). |
Lessons
|
28.01 |
Describe the various types of cloud computing (IaaS, PaaS, SaaS) and modes of delivery (Public, Private, Community, Hybrid). |
Lessons
|
28.02 |
Describe practices that aid in protecting the Hybrid cloud model. |
Lessons
|
28.03 |
Describe the challenges and solutions associated with securing embedded devices. |
Lessons
|
29.01 |
Distinguish between vulnerability and a threat. |
Lessons
|
29.02 |
Discuss the different types of attacks (e.g., active, passive). |
Lessons
|
29.03 |
Define security policy and explain its role in cybersecurity. |
Lessons
|
29.04 |
Describe the basic methods of authentication (e.g., password, biometrics, smart cards. two-factor authentication, multifactor authentication). |
Lessons
|
29.05 |
Describe the various forms of encryption methodologies (e.g., symmetric, asymmetric, block cipher, stream cipher). |
Lessons
|
29.06 |
Describe hash functions and their role in authentication. |
Lessons
|
29.07 |
Describe various method of access control used in computer security (e.g., policies, groups, Access Control List (ACL)). |
Lessons
|
29.08 |
Understand the concept of malware (i.e., ransomware, worms, viruses, adware) and how attackers use it to steal sensitive or confidential information. |
Lessons
|
30.01 |
Define cybercrime and discuss the challenges facing law enforcement. |
Lessons
|
30.02 |
Identify the key legislative acts that impact cybersecurity. |
Lessons
|
30.03 |
Describe the Federal criminal code related to computers and give examples of cybercrimes and penalties, particularly those involving inappropriate access. |
Lessons
|
30.04 |
Discuss the concept of digital forensics and its place in cybercrime investigations and incident response. |
Lessons
|
30.05 |
Distinguish among the Intellectual Property Rights of trademark, patent, and copyright. |
Lessons
|
30.06 |
Explain digital rights management and the implications of the Digital Millennium Copyright Act (DMCA). |
Lessons
|
30.07 |
Describe the implications of various social media on the safeguarding of personal or sensitive information. |
Lessons
|
30.08 |
Describe various safeguards that can be employed to help ensure that sensitive or confidential information is not inadvertently divulged or obtained. |
Lessons
|
31.01 |
Define virtual computing. |
Lessons
|
31.02 |
Explain the benefits of virtual computing. |
Lessons
|
31.03 |
Differentiate between guest and host operating systems. |
Lessons
|
31.04 |
Install desktop virtualization software. |
Lessons
|
31.05 |
Describe the role of the hypervisor. |
Lessons
|
31.06 |
Create and upgrade a virtual machine. |
Lessons
|
31.07 |
Optimize the performance of a virtual machine. |
Lessons
|
31.08 |
Preserve the state of a virtual machine. |
Lessons
|
31.09 |
Clone, move and share virtual machines. |
Lessons
|
31.10 |
Use basic (static) and dynamic virtual disks and disk drives. |
Lessons
|
31.11 |
Configure a virtual network. |
Lessons
|
31.12 |
Connect devices to a virtual machine. |
Lessons
|
31.13 |
Enable security settings on a virtual machine. |
Lessons
|
32.01 |
Configure 802.1x authentication for a given scenario. |
Lessons
|
32.02 |
Connect clients to a VPN. |
Lessons
|
32.03 |
Understand Authentication, Authorization and Accounting (AAA) management. |
Lessons
|
32.04 |
Differentiate between TACACS+ (Terminal Access Controller Access Control System) and RADIUS. |
Lessons
|
32.05 |
Differentiate between Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) protocols as they apply to VPN options. |
Lessons
|
32.06 |
Implement the use of SSH (Secure Shell). |
Lessons
|
32.07 |
Implement the use of IPsec (Internet Protocol Security). |
Lessons
|
32.08 |
Identify vulnerabilities associated with authentication. |
Lessons
|
32.09 |
Understand ways to implement VoIP technologies. |
Lessons
|
32.10 |
Demonstrate the use and purpose of Kerberos. |
Lessons
|
33.01 |
Configure access controls including biometric devices, keypads and security tokens. |
Lessons
|
33.02 |
Recognize social engineering attempts. |
Lessons
|
33.03 |
Evaluate environmental controls (e.g., EMI shielding, temperature, humidity and fire suppression). |
Lessons
|
33.04 |
Develop a method of training users to recognize, report, and avoid social engineering attempts. |
Lessons
|
33.05 |
Identify components of physical security, including mantraps, motion detection, alarm systems, locks, video surveillance, and fences/barricades. |
Lessons
|
33.06 |
Install a camera for a video surveillance system. |
Lessons
|
33.07 |
Configure an alarm system including a keypad and motion detector. |
Lessons
|
33.08 |
Recognize vulnerabilities associated with physical security. |
Lessons
|
33.09 |
Explain how a mantrap is used as a counter measure against tailgating. |
Lessons
|
34.01 |
Configure and maintain software and hardware firewalls. |
Lessons
|
34.02 |
Configure and secure routers. |
Lessons
|
34.03 |
Apply security settings to switches. |
Lessons
|
34.04 |
Configure and secure wireless devices. |
Lessons
|
34.05 |
Secure a LAN connected to a DSL/cable modem. |
Lessons
|
34.06 |
Configure a RAS (Remote Access Server) for remote connectivity. |
Lessons
|
34.07 |
Securely deploy a PBX (Private Branch Exchange). |
Lessons
|
34.08 |
Explain the benefits of implementing a VPN (Virtual Private Network). |
Lessons
|
34.09 |
Deploy IDS (intrusion detection system) and IPS (intrusion prevention systems). |
Lessons
|
34.1 |
Analyze the performance, efficiency and security of the network based on network monitoring and diagnostic software. |
Lessons
|
34.11 |
Employ techniques used to lock down workstations. |
Lessons
|
34.12 |
Configure and secure servers for a given scenario. |
Lessons
|
34.13 |
Understand and assess the security of mobile devices including but not limited to those using the Android, iOS and Windows platforms. |
Lessons
|
35.01 |
Explain the security implications of the Internet of Things (IoT) (i.e., understand the efforts to address authentication and updates to IoT devices). |
Lessons
|
35.02 |
Explain societal and security challenges associated with robotics. |
Lessons
|
35.03 |
Explain security challenges associated with serverless computing. |
Lessons
|
35.04 |
Explain societal and security challenges associated with the implementation of 5G. |
Lessons
|
35.05 |
Describe and explain the security challenges of Autonomous vehicles (i.e., the significance of vehicular cybersecurity and its relation to: computer vision, artificial intelligence, machine learning and deep learning). |
Lessons
|
36.01 |
Understand access control as it applies to MAC (Mandatory Access Control). |
Lessons
|
36.02 |
Understand access control as it applies to DAC (Discretionary Access Control). |
Lessons
|
36.03 |
Understand access control as it applies to RBAC (Role Based Access Control). |
Lessons
|
37.01 |
Understand and identify security concerns with the use of Coaxial Cable. |
Lessons
|
37.02 |
The student should be able to identify and understand security concerns for UTP/STP (Unshielded Twisted Pair / Shielded Twisted Pair). |
Lessons
|
37.03 |
Identify and understand security concerns fiber optic cable. |
Lessons
|
37.04 |
Identify security concerns associated with removable media. |
Lessons
|
37.05 |
Address pitfalls associated with tape backups. |
Lessons
|
37.06 |
Apply drive encryption to hard drives. |
Lessons
|
37.07 |
Secure flash drives. |
Lessons
|
37.08 |
Smartcards and secure USB memory. |
Lessons
|
38.01 |
Determine Security Zones. |
Lessons
|
38.02 |
Point out vulnerabilities on a DMZ (Demilitarized Zone). |
Lessons
|
38.03 |
Explain the security benefits of using an intranet. |
Lessons
|
38.04 |
Explain the security benefits of using an extranet. |
Lessons
|
38.05 |
Secure a VLAN (Virtual Local Area Network). |
Lessons
|
38.06 |
Describe the security benefits associated with NAT (Network Address Translation). |
Lessons
|
38.07 |
Justify the implementation of tunneling, for security purpose. |
Lessons
|
39.01 |
Select and employ appropriate communication concepts and strategies to enhance oral and written communication in the workplace. |
Lessons
|
39.02 |
Locate, organize and reference written information from various sources. |
Lessons
|
39.03 |
Design, develop and deliver formal and informal presentations using appropriate media to engage and inform diverse audiences. |
Lessons
|
39.04 |
Interpret verbal and nonverbal cues/behaviors that enhance communication. |
Lessons
|
39.05 |
Apply active listening skills to obtain and clarify information. |
Lessons
|
39.06 |
Develop and interpret tables and charts to support written and oral communications. |
Lessons
|
39.07 |
Exhibit public relations skills that aid in achieving customer satisfaction. |
Lessons
|
40.01 |
Employ critical thinking skills independently and in teams to solve problems and make decisions. |
Lessons
|
40.02 |
Employ critical thinking and interpersonal skills to resolve conflicts. |
Lessons
|
40.03 |
Identify and document workplace performance goals and monitor progress toward those goals. |
Lessons
|
40.04 |
Conduct technical research to gather information necessary for decision-making. |
Lessons
|
41.01 |
Use personal information management (PIM) applications to increase workplace efficiency. |
Lessons
|
41.02 |
Employ technological tools to expedite workflow including word processing, databases, reports, spreadsheets, multimedia presentations, electronic calendar, contacts, email, and internet applications. |
Lessons
|
41.03 |
Employ computer operations applications to access, create, manage, integrate, and store information. |
Lessons
|
41.04 |
Employ collaborative/groupware applications to facilitate group work. |
Lessons
|
42.01 |
Describe the nature and types of business organizations. |
Lessons
|
42.02 |
Explain the effect of key organizational systems on performance and quality. |
Lessons
|
42.03 |
List and describe quality control systems and/or practices common to the workplace. |
Lessons
|
42.04 |
Explain the impact of the global economy on business organizations. |
Lessons
|
43.01 |
Evaluate and justify decisions based on ethical reasoning. |
Lessons
|
43.02 |
Evaluate alternative responses to workplace situations based on personal, professional, ethical, legal responsibilities, and employer policies. |
Lessons
|
43.03 |
Identify and explain personal and long-term consequences of unethical or illegal behaviors in the workplace. |
Lessons
|
43.04 |
Interpret and explain written organizational policies and procedures. |
Lessons
|
43.05 |
Display proficiency in using team-oriented collaboration and video teleconferencing software (e.g. Teams, Zoom). |
Lessons
|