Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1
Demonstrate creativity and innovation. |
|
2
Demonstrate critical thinking and problem solving. |
|
3
Demonstrate initiative and self-direction. |
|
4
Demonstrate integrity. |
|
5
Demonstrate work ethic. |
|
6
Demonstrate conflict-resolution skills. |
|
7
Demonstrate listening and speaking skills. |
|
8
Demonstrate respect for diversity. |
|
9
Demonstrate customer service skills. |
|
10
Collaborate with team members. |
|
11
Demonstrate big-picture thinking. |
|
12
Demonstrate career- and life-management skills. |
|
13
Demonstrate continuous learning and adaptability. |
|
14
Manage time and resources. |
|
15
Demonstrate information-literacy skills. |
|
16
Demonstrate an understanding of information security. |
|
17
Maintain working knowledge of current information-technology (IT) systems. |
|
18
Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. |
|
19
Apply mathematical skills to job-specific tasks. |
|
20
Demonstrate professionalism. |
|
21
Demonstrate reading and writing skills. |
|
22
Demonstrate workplace safety. |
|
23
Examine aspects of planning within an industry/organization. |
|
24
Examine aspects of management within an industry/organization. |
|
25
Examine aspects of financial responsibility within an industry/organization. |
|
26
Examine technical and production skills required of workers within an industry/organization. |
|
27
Examine principles of technology that underlie an industry/organization. |
|
28
Examine labor issues related to an industry/organization. |
|
29
Examine community issues related to an industry/organization. |
|
30
Examine health, safety, and environmental issues related to an industry/organization. |
|
31
Identify the purposes and goals of the student organization. |
|
32
Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. |
|
33
Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. |
|
34
Identify Internet safety issues and procedures for complying with acceptable use standards. |
|
35
Identify the types of work-based learning (WBL) opportunities. |
|
36
Reflect on lessons learned during the WBL experience. |
|
37
Explore career opportunities related to the WBL experience. |
|
38
Participate in a WBL experience, when appropriate. |
|
39
Describe Cybersecurity |
|
40
Define information assurance |
|
41
Describe the critical factors of information security |
|
42
Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration |
|
43
Define risk |
|
44
Identify the concepts of cybersecurity risk management |
|
45
Describe cybersecurity threats to an organization |
|
46
Explain why organizations need to manage risk |
|
47
Discuss national or industry standards/regulations that relate to cybersecurity |
|
48
Describe the cyberattack surface of various organizations |
|
49
Analyze risks affecting critical infrastructure |
|
50
Describe a network |
|
51
Describe a wired/cabled network |
|
52
Describe a wireless network |
|
53
Compare cabled/wired and wireless networks |
|
54
Compare networking conceptual models |
|
55
Discuss services, their relationship to the OSI model, and potential vulnerabilities |
|
56
Differentiate among network types |
|
57
Examine the concept of the Internet as a network of connected systems |
|
58
Identify networking protocols |
|
59
Describe the difference between a cyber threat and a vulnerability |
|
60
Describe types of cyber threats |
|
61
Analyze types of current cyber threats |
|
62
Identify the perpetrators of different types of malicious hacking |
|
63
Describe the characteristics of vulnerabilities |
|
64
Identify the prevention of and protection against cyber threats |
|
65
Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks |
|
66
Differentiate between ethics and laws |
|
67
Distinguish among types of ethical concerns |
|
68
Define cyberbullying |
|
69
Identify actions that constitute cyberbullying |
|
70
Identify possible warning signs of someone being cyberbullied |
|
71
Identify laws applicable to cybersecurity |
|
72
Explain the concept of “personally identifiable information” |
|
73
Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it |
|
74
Identify ways to control and protect personal data |
|
75
Demonstrate net etiquette (netiquette) as it relates to cybersecurity |
|
76
Analyze the social and legal significance of the ongoing collection of personal digital information |
|
77
Distinguish between data, information, and knowledge |
|
78
Identify the most common ways data is collected |
|
79
Identify the most common ways data can be stored |
|
80
Explain the difference between data at rest, data in transit, and data being processed |
|
81
Identify the most common ways data is used |
|
82
Discuss how data can be compromised, corrupted, or lost |
|
83
Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) |
|
84
Define the function of a computer operating system |
|
85
Identify the components of an operating system |
|
86
List types of operating systems |
|
87
Evaluate the potential vulnerabilities, threats, and common exploits to an operating system |
|
88
Identify best practices for protecting operating systems |
|
89
Describe the concept of malware and techniques to guard against it |
|
90
Evaluate critical operating system security parameters |
|
91
Describe security and auditing logs |
|
92
Describe the role of a system backup |
|
93
Define virtualization technology |
|
94
Identify advantages and disadvantages of using virtual machines |
|
95
Define programming in the context of cybersecurity |
|
96
Differentiate between computer programming languages |
|
97
Evaluate common programming flaws that lead to vulnerabilities |
|
98
Identify best practices in secure coding and design |
|
99
Identify ubiquitous computing |
|
100
Discuss security and privacy implications of ubiquitous computing |
|
101
Research career opportunities for cybersecurity professionals |
|
102
Identify the educational pathways for emerging cybersecurity professionals |
|
103
Identify the educational pathways for emerging cybersecurity professionals |
|
104
Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters |
|
105
Research the cyber threats and security measures related to career pathways |
|
106
Identify testing skills/strategies for a certification examination |
|
107
Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course |
|
108
Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) |
|
109
Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) |
|