Standards in this Framework
| Standard | Description |
|---|---|
| A.1 | Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work. |
| A.2 | Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn. |
| A.3 | Employ effective reading, writing, and technical documentation skills. |
| A.4 | Solve problems using critical thinking techniques and structured troubleshooting methodologies. |
| A.5 | Demonstrate leadership skills and collaborate effectively as a team member. |
| A.6 | Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines. |
| A.7 | Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security. |
| A.8 | Demonstrate time-management skills and the ability to prioritize tasks in a technical setting. |
| B.1 | Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking. |
| B.2 | Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations. |
| B.3 | Demonstrate effective interview skills for roles in IT and networking. |
| C.1 | Use technology as a tool for research, organization, communication, and problem-solving. |
| C.2 | Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information. |
| C.3 | Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications. |
| C.4 | Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use. |
| D.1 | Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards. |
| D.2 | Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting. |
| D.3 | Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting. |
| E.1 | Identify and describe the functions of different computer hardware components, including CPUs, memory, storage, and peripheral devices. |
| E.2 | Perform basic hardware installation, configuration, and troubleshooting in line with industry standards. |
| E.3 | Demonstrate the ability to install and configure operating systems, focusing on system updates, patches, and driver installations. |
| E.4 | Explain the importance of and perform regular maintenance and upgrades on hardware and software systems. |
| F.1 | Understand basic networking concepts, including IP addressing and network protocols, to prepare for configuration and troubleshooting. |
| F.2 | Configure and troubleshoot wired and wireless network connections, adhering to industry protocols and standards. |
| F.3 | Apply fundamental concepts of network security, including firewalls, antivirus software, and network access controls. |
| F.4 | Demonstrate the ability to set up and secure both home and small business networks, emphasizing cybersecurity best practices. |
| G.1 | Describe common security threats, vulnerabilities, and attacks, including phishing, malware, and social engineering. |
| G.2 | Identify basic data security measures, such as data encryption, secure passwords, and data backup strategies. |
| G.3 | Demonstrate knowledge of access controls, user permissions, and authentication methods for protecting information systems. |
| G.4 | Describe the core cybersecurity frameworks including the CIA Triad, Defense in Depth, and Authentication, Authorization, and Accounting (AAA) and how they influence cybersecurity policies and practices. |
| G.5 | Conduct basic risk assessments and apply strategies to mitigate potential cybersecurity threats. |
| H.1 | Identify and troubleshoot common hardware, software, and network issues using systematic diagnostic methods. |
| H.2 | Document technical issues, troubleshooting steps, and solutions in line with industry documentation practices. |
| H.3 | Demonstrate the use of technical support tools, such as remote assistance, for resolving user issues. |
| H.4 | Apply customer service skills in technical support scenarios, practicing professional communication and problem-solving techniques. |
| I.1 | Harden operating systems (local policies, secure services, update/patch cadence) and configure endpoint protection (AV/EDR). |
| I.2 | Apply least-privilege and standard user policies; manage local groups and permissions. |
| I.3 | Configure basic logging and review event logs to identify suspicious activity. |
| I.4 | Create and test a simple data backup/restore plan for endpoints. |
| J.1 | Use decomposition, pattern recognition, abstraction, and algorithms to plan solutions. |
| J.2 | Write and run simple scripts (e.g., Python, Bash, or PowerShell) to parse logs, hash files, or query system info. |
| J.3 | Use regular expressions and command-line tools to filter and transform data. |
| J.4 | Document scripts with comments and basic error handling. |
| K.1 | Explain what modern AI/ML systems do (at a high level) and their limitations (e.g., hallucinations, bias, data leakage). |
| K.2 | Use AI tools responsibly for research and drafting (prompt hygiene, citation, privacy-safe inputs). |
| K.3 | Identify security risks of AI systems (e.g., prompt injection, model poisoning, data exfiltration) in age-appropriate scenarios. |
| L.1 | Track current industry news and summarize quarterly trends (e.g., AI, cloud, OT). |
| L.2 | Map evolving roles to skills/credentials (e.g., Security Operations, GRC, Cloud Security, OT Security) and update an individual learning plan. |
| M.1 | Complete beginner capture-the-flag (CTF) labs (e.g., password cracking basics, log triage, web challenges) in a safe, isolated environment. |
| M.2 | Reflect on problem-solving approaches and document write-ups in a portfolio. |
| M.3 | Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved. |
| N.1 | Perform basic OS installation or imaging and initial configuration (accounts, updates, drivers). |
| N.2 | Configure user profiles and local authentication settings on Windows, Linux, or macOS. |
| N.3 | Connect and troubleshoot common peripherals and printers at a basic level. |
| N.4 | Describe safe tool use and ESD precautions during basic hardware service. |