Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
127.769.1A
(A) identify and demonstrate employable work behaviors such as regular attendance, punctuality, maintenance of a professional work environment, and effective written and verbal communication; |
|
127.769.1B
(B) identify and demonstrate positive personal qualities such as authenticity, resilience, initiative, and a willingness to learn new knowledge and skills; |
|
127.769.1C
(C) solve problems and think critically; |
|
127.769.1D
(D) demonstrate leadership skills and function effectively as a team member; and |
|
127.769.1E
(E) demonstrate an understanding of ethical and legal responsibilities in relation to the field of cybersecurity. |
|
127.769.2A
(A) identify job and internship opportunities as well as accompanying duties and tasks; |
|
127.769.2B
(B) research careers in cybersecurity and information assurance along with the education and job skills required for obtaining a job in both the public and private sectors; |
|
127.769.2C
(C) identify and discuss certifications for cybersecurity-related careers; and |
|
127.769.2D
(D) research and develop resumes, digital portfolios, or professional profiles in the cybersecurity field. |
|
127.769.3A
(A) demonstrate and advocate for ethical and legal behaviors both online and offline among peers, family, community, and employers; |
|
127.769.3B
(B) research local, state, national, and international cyber law such as the PATRIOT Act of 2001, General Data Protection Regulation, and Digital Millennium Copyright Act; |
|
127.769.3C
(C) research historic cases or events regarding cyber; |
|
127.769.3D
(D) demonstrate an understanding of ethical and legal behavior when presented with various scenarios related to cyber activities; |
|
127.769.3E
(E) define and identify techniques such as hacking, phishing, social engineering, online piracy, spoofing, and data vandalism; and |
|
127.769.3F
(F) identify and use appropriate methods for citing sources. |
|
127.769.4A
(A) identify motivations for hacking; |
|
127.769.4B
(B) identify and describe the impact of cyberattacks on the global community, society, and individuals; |
|
127.769.4C
(C) distinguish between a cyber attacker and a cyber defender; |
|
127.769.4D
(D) differentiate types of hackers such as black hats, white hats, and gray hats; |
|
127.769.4E
(E) determine possible outcomes and legal ramifications of ethical versus malicious hacking practices; and |
|
127.769.4F
(F) debate the varying perspectives of ethical versus malicious hacking. |
|
127.769.5A
(A) define cyberterrorism, state-sponsored cyberterrorism, and hacktivism; |
|
127.769.5B
(B) compare and contrast physical terrorism and cyberterrorism, including domestic and foreign actors; |
|
127.769.5C
(C) define and explain intelligence gathering and counterterrorism; |
|
127.769.5D
(D) identify the role of cyber defenders in protecting national interests and corporations; |
|
127.769.5E
(E) identify the role of cyber defense in society and the global economy; and |
|
127.769.5F
(F) explain the importance of protecting public infrastructures such as electrical power grids, water systems, pipelines, transportation, and nuclear plants. |
|
127.769.6A
(A) identify and understand the nature and value of privacy; |
|
127.769.6B
(B) analyze the positive and negative implications of a digital footprint and the maintenance and monitoring of an online presence; |
|
127.769.6C
(C) discuss the role and impact of technology on privacy; |
|
127.769.6D
(D) identify the signs, emotional effects, and legal consequences of cyberbullying and cyberstalking; and |
|
127.769.6E
(E) identify and discuss effective ways to prevent, deter, and report cyberbullying. |
|
127.769.7A
(A) define information security and cyber defense; |
|
127.769.7B
(B) identify basic risk management and risk assessment principles related to cybersecurity threats and vulnerabilities; |
|
127.769.7C
(C) explain the fundamental concepts of confidentiality, integrity, availability, authentication, and authorization; |
|
127.769.7D
(D) describe the inverse relationship between privacy and security; |
|
127.769.7E
(E) identify and analyze cybersecurity breaches and incident responses; |
|
127.769.7F
(F) identify and analyze security concerns in areas such as physical, network, cloud, and web; |
|
127.769.7G
(G) define and discuss challenges faced by cybersecurity professionals; |
|
127.769.7H
(H) identify common risks, alerts, and warning signs of compromised computer and network systems; |
|
127.769.7I
(I) understand and explore the vulnerability of network-connected devices; and |
|
127.769.7J
(J) use appropriate cybersecurity terminology. |
|
127.769.8A
(A) define malware, including spyware, ransomware, viruses, and rootkits; |
|
127.769.8B
(B) identify the transmission and function of malware such as Trojans, worms, and viruses; |
|
127.769.8C
(C) discuss the impact malware has had on the cybersecurity landscape; |
|
127.769.8D
(D) explain the role of reverse engineering for detecting malware and viruses; |
|
127.769.8E
(E) compare free and commercial antivirus software alternatives; and |
|
127.769.8F
(F) compare free and commercial anti-malware software alternatives. |
|
127.769.9A
(A) define system hardening; |
|
127.769.9B
(B) demonstrate basic use of system administration privileges; |
|
127.769.9C
(C) explain the importance of patching operating systems; |
|
127.769.9D
(D) explain the importance of software updates; |
|
127.769.9E
(E) describe standard practices to configure system services; |
|
127.769.9F
(F) explain the importance of backup files; and |
|
127.769.9G
(G) research and understand standard practices for securing computers, networks, and operating systems. |
|
127.769.10A
(A) identify basic network addressing and devices, including switches and routers; |
|
127.769.10B
(B) analyze incoming and outgoing rules for traffic passing through a firewall; |
|
127.769.10C
(C) identify well known ports by number and service provided, including port 22 (ssh), port 80 (http), and port 443 (https); |
|
127.769.10D
(D) identify commonly exploited ports and services, including ports 20 and 21 (ftp) and port 23 (telnet); and |
|
127.769.10E
(E) identify common tools for monitoring ports and network traffic. |
|
127.769.11A
(A) define what constitutes a secure password; |
|
127.769.11B
(B) create a secure password policy, including length, complexity, account lockout, and rotation; |
|
127.769.11C
(C) identify methods of password cracking such as brute force and dictionary attacks; and |
|
127.769.11D
(D) examine and configure security options to allow and restrict access based on user roles. |
|
127.769.12A
(A) identify the different types of user accounts and groups on an operating system; |
|
127.769.12B
(B) explain the fundamental concepts and standard practices related to access control, including authentication, authorization, and accounting; |
|
127.769.12C
(C) compare methods for single- and dual-factor authentication such as passwords, biometrics, personal identification numbers (PINs), and security tokens; |
|
127.769.12D
(D) define and explain the purpose of an air-gapped computer; and |
|
127.769.12E
(E) explain how hashes and checksums may be used to validate the integrity of transferred data. |
|
127.769.13A
(A) explain the importance of digital forensics to law enforcement, government agencies, and corporations; |
|
127.769.13B
(B) identify the role of chain of custody in digital forensics; |
|
127.769.13C
(C) explain the four steps of the forensics process, including collection, examination, analysis, and reporting; |
|
127.769.13D
(D) identify when a digital forensics investigation is necessary; |
|
127.769.13E
(E) identify information that can be recovered from digital forensics investigations such as metadata and event logs; and |
|
127.769.13F
(F) analyze the purpose of event logs and identify suspicious activity. |
|
127.769.14A
(A) explain the purpose of cryptography and encrypting data; |
|
127.769.14B
(B) research historical uses of cryptography; and |
|
127.769.14C
(C) review simple cryptography methods such as shift cipher and substitution cipher. |
|
127.769.15A
(A) define and describe vulnerability, payload, exploit, port scanning, and packet sniffing as they relate to hacking; |
|
127.769.15B
(B) define and describe cyberattacks, including man-in-the-middle, distributed denial of service, and spoofing; |
|
127.769.15C
(C) explain how computer vulnerabilities leave systems open to cyberattacks; |
|
127.769.15D
(D) identify threats to systems such as back-door attacks and insider threats; |
|
127.769.15E
(E) differentiate types of social engineering attacks such as phishing, shoulder surfing, hoaxes, and dumpster diving; |
|
127.769.15F
(F) explain how users are the most common vehicle for compromising a system at the application level; and |
|
127.769.15G
(G) identify various types of application-specific attacks. |
|
127.769.16A
(A) identify internal and external threats to computer systems; |
|
127.769.16B
(B) identify the capabilities of vulnerability assessment tools, including open source tools; and |
|
127.769.16C
(C) explain the concept of penetration testing, tools, and techniques. |
|
127.769.17A
(A) compare risks associated with connecting devices to public and private wireless networks; |
|
127.769.17B
(B) explain device vulnerabilities and security solutions on a wireless network; |
|
127.769.17C
(C) compare wireless encryption protocols; |
|
127.769.17D
(D) debate the broadcasting or hiding of a wireless service set identifier (SSID); and |
|
127.769.17E
(E) research and discuss wireless threats such as MAC spoofing and war driving. |
|
127.769.18A
(A) define application security; |
|
127.769.18B
(B) identify methods of application security such as secure development practices; |
|
127.769.18C
(C) discuss methods of online spoofing such as web links in email, instant messaging, social media, and other online communication with malicious links; |
|
127.769.18D
(D) explain the purpose and function of vulnerability scanners; |
|
127.769.18E
(E) explain how coding errors may create system vulnerabilities; and |
|
127.769.18F
(F) analyze the risks of distributing insecure programs. |
|
127.769.19A
(A) describe the impact of granting applications unnecessary permissions; |
|
127.769.19B
(B) describe the risks of granting third parties access to personal and proprietary data on social media and systems; and |
|
127.769.19C
(C) describe the risks involved with accepting Terms of Service (ToS) or End User License Agreements (EULA) without a basic understanding of the terms or agreements. |
|