2019/2020 Competency-Based Task/Competency List for Cybersecurity Fundamentals (6302/36 weeks)
Tasks/competencies when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.are considered optional
Demonstrating Personal Qualities and Abilities
Demonstrating Interpersonal Skills
Demonstrating Professional Competencies
- Demonstrate big-picture thinking.
- Demonstrate career- and life-management skills.
- Demonstrate continuous learning and adaptability.
- Manage time and resources.
- Demonstrate information-literacy skills.
- Demonstrate an understanding of information security.
- Maintain working knowledge of current information-technology (IT) systems.
- Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
- Apply mathematical skills to job-specific tasks.
- Demonstrate professionalism.
- Demonstrate reading and writing skills.
- Demonstrate workplace safety.
Examining All Aspects of an Industry
- Examine aspects of planning within an industry/organization.
- Examine aspects of management within an industry/organization.
- Examine aspects of financial responsibility within an industry/organization.
- Examine technical and production skills required of workers within an industry/organization.
- Examine principles of technology that underlie an industry/organization.
- Examine labor issues related to an industry/organization.
- Examine community issues related to an industry/organization.
- Examine health, safety, and environmental issues related to an industry/organization.
Addressing Elements of Student Life
- Identify the purposes and goals of the student organization.
- Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
- Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
- Identify Internet safety issues and procedures for complying with acceptable use standards.
Exploring Work-Based Learning
Exploring Cybersecurity Fundamentals
- Describe cybersecurity.
- Define information assurance.
- Describe the critical factors of information security.
- Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration.
- Define risk.
- Identify the concepts of cybersecurity risk management.
- Describe cybersecurity threats to an organization.
- Explain why organizations need to manage risk.
- Discuss national or industry standards/regulations that relate to cybersecurity.
- Describe the cyberattack surface of various organizations.
- Analyze risks affecting critical infrastructure.
Examining Computer Networks as a Foundational Element of Cybersecurity
- Describe a network.
- Describe a wired/cabled network.
- Describe a wireless network.
- Compare cabled/wired and wireless networks.
- Compare networking conceptual models.
- Discuss services, their relationship to the OSI model, and potential vulnerabilities.
- Differentiate among network types.
- Examine the concept of the Internet as a network of connected systems.
- Identify networking protocols.
Understanding Cyber Threats and Vulnerabilities
- Describe the difference between a cyber threat and a vulnerability.
- Describe types of cyber threats.
- Analyze types of current cyber threats.
- Identify the perpetrators of different types of malicious hacking.
- Describe the characteristics of vulnerabilities.
- Identify the prevention of and protections against cyber threats.
- Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks.
Exploring Ethics as it Relates to Cybersecurity
- Differentiate between ethics and laws.
- Distinguish among types of ethical concerns.
- Define cyber bullying.
- Identify actions that constitute cyber bullying.
- Identify possible warning signs of someone being cyber bullied.
- Identify laws applicable to cybersecurity.
- Explain the concept of “personally identifiable information.”
- Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it.
- Identify ways to control and protect personal data.
- Demonstrate net etiquette (netiquette) as it relates to cybersecurity.
- Analyze the social and legal significance of the ongoing collection of personal digital information.
Examining Data Security as it Relates to Cybersecurity
- Distinguish between data, information, and knowledge.
- Identify the most common ways data is collected.
- Identify the most common ways data can be stored.
- Explain the difference between data at rest, data in transit, and data being processed.
- Identify the most common ways data is used.
- Discuss how data can be compromised, corrupted, or lost.
- Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions).
Securing Operating Systems
- Define the function of a computer operating system.
- Identify the components of an operating system.
- List types of operating systems.
- Evaluate the potential vulnerabilities, threats, and common exploits to an operating system.
- Identify best practices for protecting operating systems.
- Describe the concept of malware and techniques to guard against it.
- Evaluate critical operating system security parameters.
- Describe security and auditing logs.
- Describe the role of a system backup.
- Define virtualization technology.
- Identify advantages and disadvantages of using virtual machines.
Programming as a Component of Cybersecurity
Exploring Cybersecurity Implications for Current and Emerging Technologies
Exploring Cybersecurity Careers
- Research career opportunities for cybersecurity professionals.
- Explore the Career Clusters affected by current and emerging technology.
- Identify the educational pathways for emerging cybersecurity professionals.
- Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters.
- Research the cyber threats and security measures related to career pathways.
Preparing for Industry Certification
- Identify testing skills/strategies for a certification examination.
- Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course.
- Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams).
- Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA).