Standards in this Framework
Standard | Description |
---|---|
1 | Demonstrate creativity and innovation. |
2 | Demonstrate critical thinking and problem solving. |
3 | Demonstrate initiative and self-direction. |
4 | Demonstrate integrity. |
5 | Demonstrate work ethic. |
6 | Demonstrate conflict-resolution skills. |
7 | Demonstrate listening and speaking skills. |
8 | Demonstrate respect for diversity. |
9 | Demonstrate customer service skills. |
10 | Collaborate with team members. |
11 | Demonstrate big-picture thinking. |
12 | Demonstrate career- and life-management skills. |
13 | Demonstrate continuous learning and adaptability. |
14 | Manage time and resources. |
15 | Demonstrate information-literacy skills. |
16 | Demonstrate an understanding of information security. |
17 | Maintain working knowledge of current information-technology (IT) systems. |
18 | Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. |
19 | Apply mathematical skills to job-specific tasks. |
20 | Demonstrate professionalism. |
21 | Demonstrate reading and writing skills. |
22 | Demonstrate workplace safety. |
23 | Examine aspects of planning within an industry/organization. |
24 | Examine aspects of management within an industry/organization. |
25 | Examine aspects of financial responsibility within an industry/organization. |
26 | Examine technical and production skills required of workers within an industry/organization. |
27 | Examine principles of technology that underlie an industry/organization. |
28 | Examine labor issues related to an industry/organization. |
29 | Examine community issues related to an industry/organization. |
30 | Examine health, safety, and environmental issues related to an industry/organization. |
31 | Identify the purposes and goals of the student organization. |
32 | Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. |
33 | Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. |
34 | Identify Internet safety issues and procedures for complying with acceptable use standards. |
35 | Identify the types of work-based learning (WBL) opportunities. |
36 | Reflect on lessons learned during the WBL experience. |
37 | Explore career opportunities related to the WBL experience. |
38 | Participate in a WBL experience, when appropriate. |
39 | Describe Cybersecurity |
40 | Define information assurance |
41 | Describe the critical factors of information security |
42 | Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration |
43 | Define risk |
44 | Identify the concepts of cybersecurity risk management |
45 | Describe cybersecurity threats to an organization |
46 | Explain why organizations need to manage risk |
47 | Discuss national or industry standards/regulations that relate to cybersecurity |
48 | Describe the cyberattack surface of various organizations |
49 | Analyze risks affecting critical infrastructure |
50 | Describe a network |
51 | Describe a wired/cabled network |
52 | Describe a wireless network |
53 | Compare cabled/wired and wireless networks |
54 | Compare networking conceptual models |
55 | Discuss services, their relationship to the OSI model, and potential vulnerabilities |
56 | Differentiate among network types |
57 | Examine the concept of the Internet as a network of connected systems |
58 | Identify networking protocols |
59 | Describe the difference between a cyber threat and a vulnerability |
60 | Describe types of cyber threats |
61 | Analyze types of current cyber threats |
62 | Identify the perpetrators of different types of malicious hacking |
63 | Describe the characteristics of vulnerabilities |
64 | Identify the prevention of and protection against cyber threats |
65 | Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks |
66 | Differentiate between ethics and laws |
67 | Distinguish among types of ethical concerns |
68 | Define cyberbullying |
69 | Identify actions that constitute cyberbullying |
70 | Identify possible warning signs of someone being cyberbullied |
71 | Identify laws applicable to cybersecurity |
72 | Explain the concept of “personally identifiable information” |
73 | Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it |
74 | Identify ways to control and protect personal data |
75 | Demonstrate net etiquette (netiquette) as it relates to cybersecurity |
76 | Analyze the social and legal significance of the ongoing collection of personal digital information |
77 | Distinguish between data, information, and knowledge |
78 | Identify the most common ways data is collected |
79 | Identify the most common ways data can be stored |
80 | Explain the difference between data at rest, data in transit, and data being processed |
81 | Identify the most common ways data is used |
82 | Discuss how data can be compromised, corrupted, or lost |
83 | Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) |
84 | Define the function of a computer operating system |
85 | Identify the components of an operating system |
86 | List types of operating systems |
87 | Evaluate the potential vulnerabilities, threats, and common exploits to an operating system |
88 | Identify best practices for protecting operating systems |
89 | Describe the concept of malware and techniques to guard against it |
90 | Evaluate critical operating system security parameters |
91 | Describe security and auditing logs |
92 | Describe the role of a system backup |
93 | Define virtualization technology |
94 | Identify advantages and disadvantages of using virtual machines |
95 | Define programming in the context of cybersecurity |
96 | Differentiate between computer programming languages |
97 | Evaluate common programming flaws that lead to vulnerabilities |
98 | Identify best practices in secure coding and design |
99 | Identify ubiquitous computing |
100 | Discuss security and privacy implications of ubiquitous computing |
101 | Research career opportunities for cybersecurity professionals |
102 | Identify the educational pathways for emerging cybersecurity professionals |
103 | Identify the educational pathways for emerging cybersecurity professionals |
104 | Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters |
105 | Research the cyber threats and security measures related to career pathways |
106 | Identify testing skills/strategies for a certification examination |
107 | Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course |
108 | Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) |
109 | Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) |