Standards in this Framework
| Standard | Description |
|---|---|
| A.1 | Identify and demonstrate positive work behaviors that enhance employability and job advancement, such as regular attendance, promptness, proper attire, maintenance of a clean and safe work environment, and pride in work. |
| A.2 | Demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, active listening, and a willingness to learn. |
| A.3 | Employ effective reading, writing, and technical documentation skills. |
| A.4 | Solve problems using critical thinking techniques and structured troubleshooting methodologies. |
| A.5 | Demonstrate leadership skills and collaborate effectively as a team member. |
| A.6 | Implement safety procedures, including proper handling of hardware and following cybersecurity guidelines. |
| A.7 | Exhibit an understanding of legal and ethical responsibilities in the IT field, following data privacy laws and best practices for security. |
| A.8 | Demonstrate time-management skills and the ability to prioritize tasks in a technical setting. |
| B.1 | Develop a career plan that includes the necessary education, certifications, job skills, and experience for specific roles in IT networking. |
| B.2 | Create a professional resume and portfolio that reflect skills, projects, certifications, and recommendations. |
| B.3 | Demonstrate effective interview skills for roles in IT and networking. |
| C.1 | Use technology as a tool for research, organization, communication, and problem-solving. |
| C.2 | Use digital tools, including computers, mobile devices, collaboration platforms, and cloud services, to access, manage, and create information. |
| C.3 | Demonstrate proficiency in using emerging and industry-standard technologies, including virtualization tools, network management software, and cybersecurity applications. |
| C.4 | Understand ethical and legal considerations for technology use, including the principles of data protection, copyright, and responsible technology use. |
| D.1 | Demonstrate the use of clear communication techniques, both written and verbal, that are consistent with industry standards. |
| D.2 | Apply mathematical concepts such as binary conversion, subnetting, and data rate calculations in network configuration and troubleshooting. |
| D.3 | Use scientific principles, such as signal properties and electromagnetic interference, in network design and troubleshooting. |
| E.1 | Design and implement infrastructures, including LANs, WANs, and VPNs, to support secure and efficient data communication. |
| E.2 | Configure and troubleshoot routing and switching devices, such as routers and managed switches, according to industry standards. |
| E.3 | Utilize subnetting, IP addressing, and network protocols (TCP/IP, DNS, DHCP) to design secure network configurations. |
| E.4 | Apply techniques for optimizing network performance and securing network traffic. |
| F.1 | Implement network security controls, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., HTTPS TLS). |
| F.2 | Configure and troubleshoot virtual private networks (VPNs) and other remote access solutions to protect data transmission. |
| F.3 | Demonstrate knowledge of wireless security settings, including encryption standards (WPA2, WPA3) and access control. |
| F.4 | Monitor network activity and logs to detect and respond to security threats. |
| G.1 | Identify and analyze security vulnerabilities in network systems using vulnerability scanning tools and penetration testing methods. |
| G.2 | Conduct risk assessments and apply best practices for risk mitigation, including patch management, configuration management, and security policies. |
| G.3 | Explain and implement access control models, such as role-based access control (RBAC), and multi-factor authentication (MFA). |
| G.4 | Perform security audits and apply remediation strategies to strengthen the security posture of network environments. |
| H.1 | Create and enforce security policies, procedures, and incident response plans based on organizational needs. |
| H.2 | Explain and implement data protection strategies, including data classification, encryption, and secure disposal methods. |
| H.3 | Apply principles of social engineering awareness and conduct training to enhance security culture within an organization. |
| H.4 | Demonstrate an understanding of regulatory compliance and privacy laws, such as GDPR and HIPAA, and their impact on cybersecurity practices. |
| I.1 | Demonstrate effective communication skills in documenting and reporting security incidents and resolutions. |
| I.2 | Apply advanced mathematical concepts, including probability and statistics, for analyzing network traffic patterns and threat data. |
| I.3 | Use scientific and forensic principles to investigate and analyze security incidents in digital systems. |
| J.1 | Compare IT vs. OT environments (safety/availability priorities, legacy systems, real-time constraints). |
| J.2 | Describe the Purdue Model and recommend segmentation for ICS/IIoT networks. |
| J.3 | Identify common OT threats (e.g., ransomware in manufacturing, insecure remote access) and basic mitigations (e.g., allow-listing, change control). |
| J.4 | Apply secure-by-design concepts (threat modeling, SBOM awareness, default-deny) to simple OT scenarios. |
| J.5 | Explain how incident response and business continuity differ in OT contexts (safety and recovery windows). |
| K.1 | Differentiate IaaS, PaaS, and SaaS and shared-responsibility models. |
| K.2 | Configure identity, MFA, and baseline policies in a sandbox cloud tenant. |
| K.3 | Interpret basic cloud service provider logs (e.g., sign-in, resource changes) to identify misconfigurations. |
| K.4 | Describe risks of public storage, exposed keys, and over-permissive roles; propose remediations. |
| L.1 | Map the identity lifecycle (provision, review, de-provision) and enforce least-privilege via roles. |
| L.2 | Implement MFA choices and evaluate usability vs. security trade-offs. |
| L.3 | Explain single sign-on (SSO) and federated identity at a conceptual level. |
| M.1 | Explain common web/app flaws (OWASP Top 10 at a survey level) and simple input validation. |
| M.2 | Use static/dynamic analysis tools in a safe lab to spot low-risk issues. |
| M.3 | Propose remediation and secure coding guidelines appropriate to a high-school level. |
| N.1 | Complete beginner-to-intermediate CTF labs (e.g., privilege escalation basics, simple web exploitation) in a safe, isolated environment. |
| N.2 | Produce brief write-ups capturing approach, tools used, and lessons learned. |
| N.3 | Engage with recognized gamified platforms (e.g., SANS BootUp CTF, NetWars Skill Quest) or equivalent, as available and approved. |
| O.1 | Describe how anomaly detection and clustering can support security operations center (SOC) workflows. |
| O.2 | Recognize adversarial uses of AI (e.g., phishing at scale, deepfakes) and propose controls (e.g., content provenance, user education). |