for South Carolina IT Fundamentals — Fundamentals of Cybersecurity
Total Standards: 98Mapped: 90Completion: 91%
A.1
Identify major causes of work-related accidents in offices.
Fundamentals of Cybersecurity
18.4 Personal Safety
Advanced Cybersecurity
20.4 Personal Safety
A.2
Demonstrate appropriate ergonomic practices.
A.3
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Florida Discovering Computer Science
1.9 Application Security
A.4
Identify potential abuse and unethical uses of computers and networks.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
A.5
Explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices).
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
1.4 Cyber Ethics and Laws
A.6
Differentiate between freeware, shareware, and public domain software copyrights.
Fundamentals of Cybersecurity
4.7 Software Licenses
Georgia Introduction to Software Technology
5.5 Software Licenses
Florida Discovering Computer Science
3.9 Software Licenses
A.7
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
A.8
Identify netiquette including the use of email, social networking, blogs, texting, and chatting.
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
A.9
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
A.10
Discuss the importance of cyber safety and the impact of cyber bullying.
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
Fundamentals of Cybersecurity
18.1 Student Organizations
Advanced Cybersecurity
20.1 Student Organizations
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
Fundamentals of Cybersecurity
18.1 Student Organizations
Advanced Cybersecurity
20.1 Student Organizations
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
Fundamentals of Cybersecurity
18.1 Student Organizations
Advanced Cybersecurity
20.1 Student Organizations
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
Fundamentals of Cybersecurity
18.1 Student Organizations
Advanced Cybersecurity
20.1 Student Organizations
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
Fundamentals of Cybersecurity
18.1 Student Organizations
Advanced Cybersecurity
20.1 Student Organizations
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation.
Fundamentals of Cybersecurity
4.11 Command Line Interface
8.2 Using Databases
Florida Discovering Computer Science
3.10 Command Line Interface
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying, illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
1.4 Cyber Ethics and Laws
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, Creative Commons, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Florida Discovering Computer Science
1.9 Application Security
D.1
Demonstrate creativity and innovation.
Fundamentals of Cybersecurity
3.1 Create an Escape Room
9.1 The Game of Risk
D.2
Demonstrate critical thinking and problem-solving skills.
Fundamentals of Cybersecurity
3.1 Create an Escape Room
7.2 Troubleshooting Methodology
9.1 The Game of Risk
D.3
Demonstrate initiative and self-direction.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
D.4
Demonstrate integrity.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
D.5
Demonstrate work ethic.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
D.6
Demonstrate conflict resolution skills.
Fundamentals of Cybersecurity
7.1 Communication is Key!
Georgia Introduction to Software Technology
6.1 Communication is Key!
D.7
Demonstrate listening and speaking skills.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
D.8
Demonstrate respect for diversity.
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
5.9 Impact of the Internet
8.1 Data as a Resource
D.9
Demonstrate customer service orientation.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
D.10
Demonstrate teamwork.
Fundamentals of Cybersecurity
3.1 Create an Escape Room
9.1 The Game of Risk
E.1
Demonstrate global or “big picture” thinking.
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
5.9 Impact of the Internet
E.2
Demonstrate career and life management skills and goal-making.
Fundamentals of Cybersecurity
18.2 Alternative Learning Opportunities
18.3 Resume and Interview Prep
Advanced Cybersecurity
20.2 Alternative Learning Opportunities
20.3 Resume and Interview Prep
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
Fundamentals of Cybersecurity
18.2 Alternative Learning Opportunities
18.3 Resume and Interview Prep
Advanced Cybersecurity
20.2 Alternative Learning Opportunities
20.3 Resume and Interview Prep
E.4
Demonstrate time and resource management skills.
Fundamentals of Cybersecurity
3.1 Create an Escape Room
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.2 Building a Knowledge Base
6.3 Star in a Video!
E.5
Demonstrates information literacy skills.
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
Florida Discovering Computer Science
1.4 Can All Information Be Trusted?
E.6
Demonstrates information security skills.
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
1.5 Personal Data Security
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
E.7
Demonstrates information technology skills.
Fundamentals of Cybersecurity
5.1 Computers Speak Binary
6.1 Internal Components
7.2 Troubleshooting Methodology
Georgia Introduction to Software Technology
4.1 Internal Components
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
E.9
Demonstrate job-specific mathematics skills.
Fundamentals of Cybersecurity
2.3 Asymmetric Encryption
5.1 Computers Speak Binary
5.2 Bits, Text, and Numbers
8.2 Using Databases
8.3 Security in Coding
E.10
Demonstrates professionalism in the workplace.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
E.11
Demonstrate reading and writing skills.
Fundamentals of Cybersecurity
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
Georgia Introduction to Software Technology
6.1 Communication is Key!
6.2 Building a Knowledge Base
6.3 Star in a Video!
E.12
Demonstrates workplace safety.
Fundamentals of Cybersecurity
8.5 Environmental Controls
18.4 Personal Safety
Advanced Cybersecurity
20.4 Personal Safety
F.1
Compare and contrast notational systems (e.g., binary, hexadecimal, ASCII, unicode).
Fundamentals of Cybersecurity
5.1 Computers Speak Binary
5.2 Bits, Text, and Numbers
5.3 Encoding Images in Binary
F.2
Compare and contrast fundamental data types and their characteristics.
Fundamentals of Cybersecurity
14.3 Variables and Types
Advanced Cybersecurity
12.3 Variables and Types
CompTIA Tech+ Prep
2.3 Variables and Types
Florida Discovering Computer Science
4.4 Variables and Types
F.3
Illustrate the basics of computing and processing.
Fundamentals of Cybersecurity
4.1 Operating Systems
4.6 Software and Applications
Georgia Introduction to Software Technology
5.4 Software and Applications
F.4
Explain the value of data and information.
Fundamentals of Cybersecurity
8.1 Data as a Resource
F.5
Compare and contrast common units of measure (e.g., bit/byte, KB, MB, GB).
Fundamentals of Cybersecurity
5.1 Computers Speak Binary
F.6
Explain the troubleshooting methodology.
Fundamentals of Cybersecurity
7.2 Troubleshooting Methodology
G.1
Classify common types of input/output device interfaces (e.g., networking, peripheral device, graphic device).
Fundamentals of Cybersecurity
6.3 Peripheral Devices
6.5 Network Devices
Georgia Introduction to Software Technology
4.2 Peripheral Devices
Florida Discovering Computer Science
3.3 Peripheral Devices
3.5 Network Devices
G.2
Design efficient device placement to create optimum airflow, humidity, temperature, and dust accumulation.
Fundamentals of Cybersecurity
8.5 Environmental Controls
G.3
Differentiate various computer connector/ports, (e.g., video, eSATA, thunderbolt, USB, HDMI, ethernet, RJ-45, RJ-11, audio, and power).
Fundamentals of Cybersecurity
6.5 Network Devices
Florida Discovering Computer Science
3.5 Network Devices
G.4
Set up and install peripheral devices to a laptop or PC.
Fundamentals of Cybersecurity
6.3 Peripheral Devices
Georgia Introduction to Software Technology
4.2 Peripheral Devices
Florida Discovering Computer Science
3.3 Peripheral Devices
G.5
Identify the primary causes of electrostatic discharge and ways to mitigate the effects of ESD on electronic devices.
G.6
Identify situations where various power peripherals should be used (e.g., UPS, surge protector, power strip).
G.7
Explain the purpose of common internal computing components (e.g., motherboard/system board, RAM, CPU, storage, NIC).
Fundamentals of Cybersecurity
6.1 Internal Components
6.4 Storage Options
6.5 Network Devices
Georgia Introduction to Software Technology
4.1 Internal Components
Florida Discovering Computer Science
3.4 Storage Options
3.5 Network Devices
G.8
Compare and contrast common Internet service types (e.g., fiber optic, cable, DSL).
Fundamentals of Cybersecurity
6.7 Network Options
Florida Discovering Computer Science
3.6 Network Options
G.9
Compare and contrast storage types (e.g., volatile vs. non-volatile, local storage types, local network storage types, cloud storage).
Fundamentals of Cybersecurity
6.4 Storage Options
Florida Discovering Computer Science
3.4 Storage Options
G.10
Compare and contrast common computing devices and their purposes (e.g., mobile phones. gaming consoles, IoT (internet of things), security systems, IP (internet protocol) camera).
Fundamentals of Cybersecurity
1.6 Cybersecurity Essentials
4.5 Laptops and Tablets
G.11
Explain basic networking concepts (e.g., DNS, LAN vs WAN, IP address, HTTP/S, POP, IMAP, SMTP, modem, switch, firewall, VOIP).
Fundamentals of Cybersecurity
5.5 IP Addresses
5.6 Routing and Packets
6.5 Network Devices
Florida Discovering Computer Science
2.2 IP Addresses
2.3 Routing and Packets
3.5 Network Devices
G.12
Explain the basic features and functions of wireless devices (e.g., airdrop, unlocking/security, bluetooth pairing, wireless connection setup, mail configuration, airplane mode).
G.13
Configure and secure a basic wireless network.
Fundamentals of Cybersecurity
6.7 Network Options
Florida Discovering Computer Science
3.6 Network Options
G.14
Describe Material Safety Data Sheets (MSDS).
Fundamentals of Cybersecurity
8.5 Environmental Controls
H.1
Explain the purpose of operating systems.
Fundamentals of Cybersecurity
4.1 Operating Systems
H.2
Compare and contrast common mobile and desktop operating systems and their functions and features for Android, Linux, iOS, Windows, and Chrome OS.
Fundamentals of Cybersecurity
4.1 Operating Systems
4.3 Comparing Operating Systems
H.3
Compare and contrast components of an operating system (e.g., File systems and features, File management, Services, Processes, Drivers, Utilities, Interfaces).
Fundamentals of Cybersecurity
4.1 Operating Systems
4.3 Comparing Operating Systems
H.4
Explain the purpose and proper use of software (e.g., Productivity software, Collaboration Software, Business software, virtualization, open source).
Fundamentals of Cybersecurity
4.6 Software and Applications
Georgia Introduction to Software Technology
5.4 Software and Applications
H.5
Describe software compatibility in relationship to operating systems.
Fundamentals of Cybersecurity
4.4 Compatibility
H.6
Identify common file types and their extensions (e.g., documents, audio, images, video, executables, and compression formats).
H.7
Explain methods of application architecture and delivery models (e.g., Application delivery methods, Network required, Application architecture).
Fundamentals of Cybersecurity
4.7 Software Licenses
Georgia Introduction to Software Technology
5.5 Software Licenses
Florida Discovering Computer Science
3.9 Software Licenses
H.8
Given a scenario, configure and use web browsers.
Fundamentals of Cybersecurity
4.9 Browser Configuration
H.9
Compare and contrast general application concepts and uses.
Fundamentals of Cybersecurity
4.6 Software and Applications
Georgia Introduction to Software Technology
5.4 Software and Applications
I.1
Compare and contrast programming language categories.
Advanced Cybersecurity
12.8 Programming Languages
Florida Discovering Computer Science
4.10 Programming Languages
I.2
Use programing organizational techniques and interpret logic.
Fundamentals of Cybersecurity
14.1 The Language of Computers
14.9 Flowcharts and Pseudocode
Advanced Cybersecurity
12.1 The Language of Computers
12.8 Programming Languages
CompTIA Tech+ Prep
2.1 The Language of Computers
2.9 Flowcharts and Pseudocode
Florida Discovering Computer Science
4.1 The Language of Computers
4.10 Programming Languages
I.3
Explain the purpose and use of programming concepts.
Advanced Cybersecurity
12.8 Programming Languages
Florida Discovering Computer Science
4.10 Programming Languages
J.1
Explain database concepts and the purpose of a database.
Fundamentals of Cybersecurity
13.9 Data Security Items
Advanced Cybersecurity
11.1 Databases and Cybersecurity
CompTIA Tech+ Prep
1.9 Data Security Items
J.2
Compare and contrast various database structures (e.g., structured vs. semi-structured vs. non-structured, relational databases, non-relational databases).
Fundamentals of Cybersecurity
13.9 Data Security Items
CompTIA Tech+ Prep
1.9 Data Security Items
J.3
Summarize methods used to interface with databases (e.g., relational methods such as data manipulation or data definition, database access methods, export/import).
Fundamentals of Cybersecurity
13.9 Data Security Items
CompTIA Tech+ Prep
1.9 Data Security Items
K.1
Research and discuss common security threats found in IT.
Explain methods to secure devices and best practices (e.g., antivirus software, enabling passwords, validating legitimate sources, removal of malicious software).
Fundamentals of Cybersecurity
1.7 Common Cyber Attacks and Prevention
K.4
Summarize methods and concepts used in IT behavioral security concepts. a. Expectations of privacy when using various computing applications or devices b. Acceptable Use Policy and Procedures c. Handlings of confidential information
Fundamentals of Cybersecurity
1.5 Personal Data Security
K.5
Compare and contrast authentication, non-repudiation, authorization, and accounting concepts (e.g., biometrics, video, digital signatures).
Fundamentals of Cybersecurity
1.5 Personal Data Security
K.6
Explain password best practices (e.g., length, complexity).
Fundamentals of Cybersecurity
1.5 Personal Data Security
K.7
Explain common uses of encryption (e.g., HTTPS, VPN).
Fundamentals of Cybersecurity
2.2 Symmetric Encryption
2.4 Authentication Methods
K.8
Explain business continuity concepts (e.g., disaster recovery, redundancy, data backup, contingency plans).
Fundamentals of Cybersecurity
8.7 Risky Business
L.1
Research the field of emerging technologies.
Fundamentals of Cybersecurity
5.9 Impact of the Internet
L.2
Identify the following emerging technologies and their purpose (e.g., AR/VR, Artificial Intelligence, blockchain, chatbots, cloud computing, dynamic network analysis, gesturebased interaction, marketing automation, podcasting, predictive analytic, predictive sales, streaming media (audio/video), telepresence ).
Florida Discovering Computer Science
2.5 Emerging Technologies and Society
L.3
Research and present an emerging technology to solve a real-world problem.
Florida Discovering Computer Science
2.5 Emerging Technologies and Society
M.1
Apply strategies for identifying routine hardware and software problems current to everyday life.
Fundamentals of Cybersecurity
7.2 Troubleshooting Methodology
M.2
Identify compatibility issues and describe operational problems caused by hardware errors.
M.3
Explain how technology can be used to solve problems.
Fundamentals of Cybersecurity
5.9 Impact of the Internet
M.4
Explain the software development process used to solve problems.
Georgia Introduction to Software Technology
5.6 Software Development
M.5
Explore commonly used documentation tools for design specifications (e.g., flowcharts, visual and textual storyboards).
Georgia Introduction to Software Technology
5.6 Software Development
N.1
Compare and contrast careers in IT/IS with their education, training requirements, industry certifications and salary ranges.
Fundamentals of Cybersecurity
10.1 After Fundamentals of Cybersecurity
N.2
Describe how computing enhances other career fields.
N.3
Connect with colleges and companies by using various networking platforms.