Please enable JavaScript to use CodeHS

Standards Framework

for Nevada Cybersecurity II Effective 2023

151

Standards in this Framework

Standard Description
1.1.1 Discuss the requirements of CTSO participation/involvement as described in Carl D. Perkins Law (Level 1 (L1), Level 2 (L2), Complementary (C))
1.1.2 Research nationally recognized CTSOs (L1, L2, C)
1.1.3 Investigate the impact of federal and state government regarding the progression and operation of CTSOs (e.g., Federal Statutes and Regulations, Nevada Administrative Code [NAC], Nevada Revised Statutes [NRS]) (L1, L2, C)
1.2.1 Discuss the purpose of parliamentary procedure (L1, L2, C)
1.2.2 Demonstrate the proper use of parliamentary procedure (L1, L2, C)
1.2.3 Differentiate between an office and a committee (L1, L2, C)
1.2.4 Discuss the importance of participation in local, regional, state, and national conferences, events, and competitions (L1, L2, C)
1.2.5 Participate in local, regional, state, or national conferences, events, or competitions (L1, L2, C)
1.2.6 Describe the importance of a constitution and bylaws to the operation of a CTSO chapter (L1, L2, C)
1.3.1 Explore opportunities in community service-related work-based learning (WBL) (L1, L2, C)
1.3.2 Participate in a service learning (program related) and/or community service project or activity (L1, L2, C)
1.3.3 Engage with business and industry partners for community service (L1, L2, C)
1.4.1 Demonstrate college and career readiness (e.g., applications, resumes, interview skills, presentation skills) (L1, L2, C)
1.4.2 Describe the appropriate professional/workplace attire and its importance (L1, L2, C)
1.4.3 Investigate industry-standard credentials/certifications available within this Career Cluster™ (L1, L2, C)
1.4.4 Participate in authentic contextualized instructional activities (L1, L2, C)
1.4.5 Demonstrate technical skills in various student organization activities/events (L1, L2, C)
1.5.1 Make a connection between program standards to career pathway(s) (L1, L2, C)
1.5.2 Explain the importance of participation and completion of a program of study (L1, L2, C)
1.5.3 Promote community awareness of local student organizations associated with CTE programs (L1, L2, C)
5.1.1 Use industry standard vocabulary in relation to operating systems (OS) (L1, L2)
5.1.2 Compare and contrast (L1, L2)
5.1.3 Install and secure operating systems (L1, L2)
5.1.4 Install and configure Windows networking (L1, L2)
5.2.1 Explain various features and tools of operating systems (L1, L2)
5.2.2 Apply appropriate command line tools (L1, L2)
5.2.3 Select appropriate operating system features and tools based on customer requirements (L1, L2)
5.2.4 Configure Windows Update settings (L1, L2)
5.2.5 Configure local users and groups for a Windows networking system (L1, L2)
5.2.6 Configure User Access Control (UAC) (L1, L2)
5.2.7 Use Windows Control Panel utilities (L1, L2)
5.2.8 Perform common preventive maintenance procedures using the appropriate Windows OS tools (L1, L2)
5.2.9 Troubleshoot common PC security issues using best practices (L1, L2)
5.3.1 Explain key terms and acronyms used in diagnostic testing and troubleshooting (L1, L2)
5.3.2 Identify common symptoms for a given discrepancy (L1, L2)
5.3.3 Develop a solution for a given discrepancy (L1, L2)
5.3.4 Document the solution (L1, L2)
5.4.1 Identify common features and functionality of Mac OS, Chrome, and other Linux operating systems (L1, L2)
5.4.2 Set up and use client-side virtualization and introduce server virtualization topics (L1, L2)
5.4.3 Identify basic features of mobile operating systems (L1, L2)
5.4.4 Install and configure basic mobile device network connectivity and email (L1, L2)
5.4.5 Summarize methods and data related to mobile device synchronization (L1, L2)
5.4.6 Compare and contrast methods to secure mobile devices (L1, L2)
5.4.7 Explain the characteristics of various types of other mobile devices (L1)
5.4.8 Compare and contrast accessories, features, and ports of mobile and IoT devices (L1, L2)
5.4.9 Troubleshoot common mobile OS and tablet software/hardware issues (L1, L2)
5.6.2 Summarize the properties and purpose of services provided by networked hosts (L2)
6.1.4 Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.) (L2)
6.1.5 Utilize appropriate wired connections (L2)
6.1.6 Utilize appropriate wireless connections (L2)
6.3.1 Compare main distribution frame (MDF) and intermediate distribution frame (IDF) (L1, L2)
6.3.2 Implement a cable management solution (L1, L2)
6.3.3 Analyze and create a power management plan (i.e., power converters, circuits, UPS – uninterruptible power supply [power redundancy], inverters, load capacity) (L1, L2)
6.3.4 Determine proper airflow for optimal performance (L1, L2)
7.1.1 Categorize Ethernet wired network adapter components, features, and connectors (L2)
7.1.2 Categorize Ethernet wireless access point components, features, connectors, and cables (L2)
7.1.3 Describe common network connectivity devices and their roles (L2)
7.1.4 Distinguish between the various network types (L2)
7.1.5 Apply appropriate networking utilities to view, test, and troubleshoot basic network configuration, topology, communicant, and connectivity problems (L2)
7.2.1 Deploy best practices to secure any device accessing a network (L2)
7.2.2 Compare and contrast physical security controls (L2)
7.2.3 Compare and contrast risk-related concepts (L2)
7.2.4 Implement network hardening techniques (L2)
7.2.5 Configure a basic firewall (L2)
7.2.6 Explain the purpose of various network access control models (L2)
7.2.7 Secure SOHO wired and wireless networks (L2)
7.2.8 Identify common network vulnerabilities, threats, and risks (L2)
7.2.9 Analyze and implement security settings on figure BIOS/UEFI security settings (L2)
7.3.1 Implement various networking troubleshooting methodologies (L2)
7.3.2 Analyze and interpret the output of troubleshooting tools (L2)
7.3.3 Troubleshoot and resolve common wireless issues (L2)
7.3.4 Troubleshoot and resolve common copper and fiber cable issues (L2)
7.3.5 Troubleshoot and resolve common network issues (L2)
7.3.6 Troubleshoot and resolve common security issues (L2)
7.3.7 Troubleshoot and resolve common wide area network (WAN) issues (L2)
7.4.1 Explain the functions and application of various network devices (L2)
7.4.2 Compare the use of networking services and applications (L2)
7.4.3 Install and configure networking services and applications (L2)
7.4.4 Explain the characteristics and benefits of various WAN technologies (L2)
7.4.5 Install and terminate various cable types and connectors using appropriate tools (L2)
7.4.6 Differentiate between network infrastructure implementations (L2)
7.4.7 Implement and configure the appropriate addressing schema (L2)
7.4.8 Explain the basics of routing (L2)
7.4.9 Describe the elements of unified communications technologies (L2)
8.1.1 Describe the use of packet tracing tools and network analyzing tools (L2)
8.1.2 Demonstrate the use of network monitoring tools (L2)
8.1.3 Demonstrate the use of port and vulnerability scanning tools (L2)
8.1.4 Describe the use of SMTP monitoring software (L2)
8.1.5 Demonstrate an understanding of security information and event management (SIEM) tools (L2)
8.1.6 Demonstrate the use of environmental monitoring tools (L2)
8.1.7 Operate power monitoring tools (L2)
8.1.8 Demonstrate the use of wireless survey tools (L2)
8.2.1 Analyze SYSLOG data (L2)
8.2.2 Demonstrate the use of log management (L2)
8.2.3 Apply interface monitoring tools (L2)
8.2.4 Evaluate system performance metrics against baseline data (L2)
8.2.5 Evaluate system metrics and logs for resource depletion (L2)
8.2.6 Evaluate system metrics and logs for network connectivity (L2)
8.3.1 Prepare archives/backups (L2)
8.3.2 Build a system baseline based on normal operations (L2)
8.3.3 Describe provisioning and de-provisioning of mobile devices (enterprise, BYOD – bring your own device) (L2)
8.3.4 Illustrate network access control (NAC) (L2)
8.3.5 Document a configuration management strategy (L2)
8.4.1 Compare and contrast protecting supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS) (L2)
8.4.2 Determine a plan to protect legacy systems (L2)
8.4.3 Explain how to separate private/public networks (L2)
8.4.4 Describe theft detection technologies (honeypot/honeynet) (L2)
8.4.5 Research the need for a testing lab (development ops/DevOps) (L2)
8.4.6 Determine a plan for load balancing the network (L2)
8.4.7 Create a plan for performance optimization (tuning) (L2)
8.6.1 Set up, configure, and secure a virtual local area network (VLAN), physically or virtually (L2)
8.6.2 Configure a Spanning Tree Protocol (STP), ensuring you do not create any loops (L2)
8.6.3 Set up an Ethernet Interface via the interface configuration file, including demonstrating how to give your network card an IP address (DHCP – dynamic host configuration protocol); set up routing information; configure IP masquerading; and set default routes (L2)
8.6.4 Set up and configure a default gateway, defining where to send packets for IP addresses for which they can determine no specific route (L2)
8.6.5 Describe and demonstrate several common techniques for transmitting power over Ethernet cabling (L2)
8.6.6 Compare and contrast managed versus unmanaged switches (L2)
9.2.8 Determine the correct containment steps based on the type of incident or event encountered (L2)
9.2.9 Implement the correct eradication response and processes (L2)
9.2.10 Determine the next steps post investigation (post breach) from legal, HR, news media response (L2)
9.3.1 Determine the appropriate security control, technique, or process based on the property, system, or data you are protecting (L2)
9.3.2 Explain the importance of security controls, techniques, and threat risk assessments (L2)
9.3.3 Select the appropriate solution to eliminate vulnerabilities and establish a security baseline (L2)
9.3.4 Develop plans to protect a variety of property, systems, or data (L2)
9.3.5 Implement the appropriate controls to ensure security of property, systems, or data (L2)
9.3.6 Compare and contrast alternative methods to mitigate security risks for data in transit and data at rest (L2)
9.4.1 Describe the digital chain of custody process for tracking data and equipment (legal evidence) (L2)
9.4.2 Describe all steps to capture and maintain evidence (L2)
9.4.3 Follow chain of custody procedures (L2)
9.4.4 Maintain detailed records (e.g., chain of custody forms, evidence collection forms) (L2)
9.4.5 Track digital evidence (e.g., how it has been gathered, tracked, and protected) (L2)
9.4.6 Describe a chain of custody (L2)
9.4.7 Develop a plan for data transport, encryption to avoid alteration of data, and legal holds (L2)
9.4.8 Develop a plan for recovery, disposal of evidence, and follow-up (L2)
9.4.9 Write a forensics summary report (L2)
10.1.1 Summarize basic forensic concepts and practices, including eDiscovery, documentation, chain of custody, and data transport (L2)
10.1.2 Determine a first responder’s logical approach during an investigation with objective, evidence-based research (L2)
10.1.3 Review the First Responder steps and processes for proper documentation (L2)
10.1.4 Explain what eDiscovery is, including the contextual process for electronic evidence collection (Electronically Stored Information [ESI]) (L2)
10.1.5 Observe and discuss legal restrictions, stipulations, regulatory compliance, and confidentiality when gathering evidence (L2)
10.1.6 Summarize chain of custody processes during investigations (L2)
10.3.1 Describe and demonstrate various methods and tools for threat detection and eDiscovery (L2)
10.3.2 Describe and demonstrate vulnerability management methods, practices, and scanning tools (L2)
10.3.3 Describe and demonstrate various practices, methods, and tools for penetration testing (L2)
10.3.5 Review basic cryptography concepts, methods, and their relationship to forensics (L2)
10.3.8 Identify methods or tools to eliminate cloud exploits and vulnerabilities (L2)
10.4.1 Explain what malware is, including its history (L2)
10.4.2 Review and define the most common malware terminologies (L2)
10.4.3 Describe the ways and methods malware is spread (L2)
10.4.4 Review current types of malware (e.g., viruses, worms, trojan horses, rootkits, ransomware, keyloggers, and grayware attacks) (L2)
10.4.5 Select the appropriate types of mitigation and deterrent techniques for malware scenarios (L2)
10.4.6 Use appropriate tools and techniques to eliminate malware from spreading (L2)