Standards in this Framework
| Standard | Description |
|---|---|
| 1.1 | Identify basic features of Microsoft Windows editions. |
| 1.2 | Given a scenario, use the appropriate Microsoft command-line tool. |
| 1.3 | Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS). |
| 1.4 | Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility. |
| 1.5 | Given a scenario, use the appropriate Windows settings. |
| 1.6 | Given a scenario, configure Microsoft Windows networking features on a client/desktop. |
| 1.7 | Given a scenario, apply application installation and configuration concepts. |
| 1.8 | Explain common OS types and their purposes. |
| 1.9 | Given a scenario, perform OS installations and upgrades in a diverse OS environment. |
| 1.10 | Identify common features and tools of the macOS/desktop OS. |
| 1.11 | Identify common features and tools of the Linux client/desktop OS. |
| 2.1 | Summarize various security measures and their purposes. |
| 2.2 | Compare and contrast wireless security protocols and authentication methods. |
| 2.3 | Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods. |
| 2.4 | Explain common social-engineering attacks, threats, and vulnerabilities. |
| 2.5 | Given a scenario, manage and configure basic security settings in the Microsoft Windows OS. |
| 2.6 | Given a scenario, configure a workstation to meet best practices for security. |
| 2.7 | Explain common methods for securing mobile and embedded devices. |
| 2.8 | Given a scenario, use common data destruction and disposal methods. |
| 2.9 | Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks. |
| 2.10 | Given a scenario, install and configure browsers and relevant security settings. |
| 3.1 | Given a scenario, troubleshoot common Windows OS problems. |
| 3.2 | Given a scenario, troubleshoot common personal computer (PC) security issues. |
| 3.3 | Given a scenario, use best practice procedures for malware removal. |
| 3.4 | Given a scenario, troubleshoot common mobile OS and application issues. |
| 3.5 | Given a scenario, troubleshoot common mobile OS and application security issues. |
| 4.1 | Given a scenario, implement best practices associated with documentation and support systems information management. |
| 4.2 | Explain basic change-management best practices. |
| 4.3 | Given a scenario, implement workstation backup and recovery methods |
| 4.4 | Given a scenario, use common safety procedures. |
| 4.5 | Summarize environmental impacts and local environmental controls. |
| 4.6 | Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. |
| 4.7 | Given a scenario, use proper communication techniques and professionalism. |
| 4.8 | Identify the basics of scripting. |
| 4.9 | Given a scenario, use remote access technologies. |