Standards in this Framework
| Standard | Description |
|---|---|
| 1 | Demonstrate creativity and innovation. |
| 2 | Demonstrate critical thinking and problem solving. |
| 3 | Demonstrate initiative and self-direction. |
| 4 | Demonstrate integrity. |
| 5 | Demonstrate work ethic. |
| 6 | Demonstrate conflict-resolution skills. |
| 7 | Demonstrate listening and speaking skills. |
| 8 | Demonstrate respect for diversity. |
| 9 | Demonstrate customer service skills. |
| 10 | Collaborate with team members. |
| 11 | Demonstrate big-picture thinking. |
| 12 | Demonstrate career- and life-management skills. |
| 13 | Demonstrate continuous learning and adaptability. |
| 14 | Manage time and resources. |
| 15 | Demonstrate information-literacy skills. |
| 16 | Demonstrate an understanding of information security. |
| 17 | Maintain working knowledge of current information-technology (IT) systems. |
| 18 | Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. |
| 19 | Apply mathematical skills to job-specific tasks. |
| 20 | Demonstrate professionalism. |
| 21 | Demonstrate reading and writing skills. |
| 22 | Demonstrate workplace safety. |
| 23 | Examine aspects of planning within an industry/organization. |
| 24 | Examine aspects of management within an industry/organization. |
| 25 | Examine aspects of financial responsibility within an industry/organization. |
| 26 | Examine technical and production skills required of workers within an industry/organization. |
| 27 | Examine principles of technology that underlie an industry/organization. |
| 28 | Examine labor issues related to an industry/organization. |
| 29 | Examine community issues related to an industry/organization. |
| 30 | Examine health, safety, and environmental issues related to an industry/organization. |
| 31 | Identify the purposes and goals of the student organization. |
| 32 | Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. |
| 33 | Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. |
| 34 | Identify Internet safety issues and procedures for complying with acceptable use standards. |
| 35 | Identify the types of work-based learning (WBL) opportunities. |
| 36 | Reflect on lessons learned during the WBL experience. |
| 37 | Explore career opportunities related to the WBL experience. |
| 38 | Participate in a WBL experience, when appropriate. |
| 39 | Describe Cybersecurity |
| 40 | Define information assurance |
| 41 | Describe the critical factors of information security |
| 42 | Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration |
| 43 | Define risk |
| 44 | Identify the concepts of cybersecurity risk management |
| 45 | Describe cybersecurity threats to an organization |
| 46 | Explain why organizations need to manage risk |
| 47 | Discuss national or industry standards/regulations that relate to cybersecurity |
| 48 | Describe the cyberattack surface of various organizations |
| 49 | Analyze risks affecting critical infrastructure |
| 50 | Describe a network |
| 51 | Describe a wired/cabled network |
| 52 | Describe a wireless network |
| 53 | Compare cabled/wired and wireless networks |
| 54 | Compare networking conceptual models |
| 55 | Discuss services, their relationship to the OSI model, and potential vulnerabilities |
| 56 | Differentiate among network types |
| 57 | Examine the concept of the Internet as a network of connected systems |
| 58 | Identify networking protocols |
| 59 | Describe the difference between a cyber threat and a vulnerability |
| 60 | Describe types of cyber threats |
| 61 | Analyze types of current cyber threats |
| 62 | Identify the perpetrators of different types of malicious hacking |
| 63 | Describe the characteristics of vulnerabilities |
| 64 | Identify the prevention of and protection against cyber threats |
| 65 | Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks |
| 66 | Differentiate between ethics and laws |
| 67 | Distinguish among types of ethical concerns |
| 68 | Define cyberbullying |
| 69 | Identify actions that constitute cyberbullying |
| 70 | Identify possible warning signs of someone being cyberbullied |
| 71 | Identify laws applicable to cybersecurity |
| 72 | Explain the concept of “personally identifiable information” |
| 73 | Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it |
| 74 | Identify ways to control and protect personal data |
| 75 | Demonstrate net etiquette (netiquette) as it relates to cybersecurity |
| 76 | Analyze the social and legal significance of the ongoing collection of personal digital information |
| 77 | Distinguish between data, information, and knowledge |
| 78 | Identify the most common ways data is collected |
| 79 | Identify the most common ways data can be stored |
| 80 | Explain the difference between data at rest, data in transit, and data being processed |
| 81 | Identify the most common ways data is used |
| 82 | Discuss how data can be compromised, corrupted, or lost |
| 83 | Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) |
| 84 | Define the function of a computer operating system |
| 85 | Identify the components of an operating system |
| 86 | List types of operating systems |
| 87 | Evaluate the potential vulnerabilities, threats, and common exploits to an operating system |
| 88 | Identify best practices for protecting operating systems |
| 89 | Describe the concept of malware and techniques to guard against it |
| 90 | Evaluate critical operating system security parameters |
| 91 | Describe security and auditing logs |
| 92 | Describe the role of a system backup |
| 93 | Define virtualization technology |
| 94 | Identify advantages and disadvantages of using virtual machines |
| 95 | Define programming in the context of cybersecurity |
| 96 | Differentiate between computer programming languages |
| 97 | Evaluate common programming flaws that lead to vulnerabilities |
| 98 | Identify best practices in secure coding and design |
| 99 | Identify ubiquitous computing |
| 100 | Discuss security and privacy implications of ubiquitous computing |
| 101 | Research career opportunities for cybersecurity professionals |
| 102 | Identify the educational pathways for emerging cybersecurity professionals |
| 103 | Identify the educational pathways for emerging cybersecurity professionals |
| 104 | Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters |
| 105 | Research the cyber threats and security measures related to career pathways |
| 106 | Identify testing skills/strategies for a certification examination |
| 107 | Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course |
| 108 | Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) |
| 109 | Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) |