Standards in this Framework
Standard | Description |
---|---|
F1 | Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces. |
F2 | Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork. |
F3 | Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing. |
F4 | Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway. |
F5 | Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork. |
F6 | Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience. |
F7 | Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback. |
1 | Compare and contrast common operating systems. |
2 | Evaluate and critique features of a given operating system used by a client and determine system requirements for upgrading to a more recent version of the operating system. |
3 | Demonstrate methods for installing and upgrading operating systems in actual or simulated settings. |
4 | Select and use system utilities and tools and evaluate the results in an actual or simulated work environment. |
5 | Resolve common connectivity issues and explain how to use utilities and tools as part of this process |
6 | Configure Microsoft Windows network settings on a computer in an actual or simulated work environment. |
7 | Use features and tools of Mac and Linux operating systems. |
8 | Use the best practice methodology to install, replace, and upgrade system components. |
9 | Troubleshoot problems related to motherboards, RAM, CPUs, expansion cards, and power |
10 | Troubleshoot hard drive failures and RAID array issues. |
11 | Troubleshoot technical problems common to mobile devices, using effective safety procedures. |
12 | Solve common problems with wired and wireless networks. |
13 | Explain how system utilities are used to maintain optimum computer performance. |
14 | Troubleshoot common problems with various operating systems, using industry standard solutions. |
15 | Resolve PC security issues including pop-ups, security alerts, slow performance, connectivity issues, and crashes or failures in the computer system. |
16 | Troubleshoot common mobile operating system application issues. |
17 | Resolve mobile operating system security issues. |
18 | Explain how physical security measures enhance the safety of devices, systems, and networks, including badge readers, smart cards, door locks, biometrics, privacy screens, hardware tokens, cable locks, server locks, USB locks, entry control rosters, key fobs, and mantraps. |
19 | Explain how logical security tools protect networks. |
20 | Explain wireless security protocols and authentication methods. |
21 | Perform maintenance to detect, remove, and prevent malware. |
22 | Describe how social engineering threats and vulnerabilities impact users, including phishing, spear phishing, impersonation, shoulder surfing, tailgating, dumpster diving, DDos, DoS, zero-day, man-in-the-middle, brute force, dictionary, rainbow table, spoofing, non-compliant systems, and zombie. |
23 | Explain differences in security settings, including user authentication and administrator rights. |
24 | Implement best practices to secure a workstation. |
25 | Explain and use effective methods for securing mobile devices |
26 | Summarize methods of data destruction and disposal |
27 | Configure security of wireless and wired networks including assigning IP addresses, firewall settings, updates, and physical security. |
28 | Explain the concept of technical change management in a given, industry-related scenario. |
29 | Create and implement a plan for technical documentation. |
30 | Create and implement processes and options for basic disaster prevention and recovery. |
31 | Create and implement safety procedures for grounding, handling, and storing sensitive devices, maintaining personal safety, and handling toxic waste. |
32 | Explain the impact of the environment on devices and summarize effective controls to address issues with temperature, humidity, ventilation, power surges, airborne particles, dust, and debris. |
33 | Summarize effective processes for addressing privacy, licensing, and policy issues and prohibited content and activities. |
34 | Describe scripting file types, environment variables, comment syntax, basic script constructs, and data types. |
35 | Utilize remote access technologies including RDP, Telnet, SSH, screen share, and file share. |
36 | Summarize the security vulnerabilities of remote access technologies. |