# CTE Resource Center - Verso - Cybersecurity Fundamentals Task/Competency List

CTE Resource Center - Verso

Virginia’s CTE Resource Center

2019/2020 Competency-Based Task/Competency List for Cybersecurity Fundamentals (6302/36 weeks)

Tasks/competencies bordered in blue are considered optional when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.

Expand all

Ajax loader

Demonstrating Personal Qualities and Abilities

  1. Demonstrate creativity and innovation.
  2. Demonstrate critical thinking and problem solving.
  3. Demonstrate initiative and self-direction.
  4. Demonstrate integrity.
  5. Demonstrate work ethic.

Demonstrating Interpersonal Skills

  1. Demonstrate conflict-resolution skills.
  2. Demonstrate listening and speaking skills.
  3. Demonstrate respect for diversity.
  4. Demonstrate customer service skills.
  5. Collaborate with team members.

Demonstrating Professional Competencies

  1. Demonstrate big-picture thinking.
  2. Demonstrate career- and life-management skills.
  3. Demonstrate continuous learning and adaptability.
  4. Manage time and resources.
  5. Demonstrate information-literacy skills.
  6. Demonstrate an understanding of information security.
  7. Maintain working knowledge of current information-technology (IT) systems.
  8. Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  9. Apply mathematical skills to job-specific tasks.
  10. Demonstrate professionalism.
  11. Demonstrate reading and writing skills.
  12. Demonstrate workplace safety.

Examining All Aspects of an Industry

  1. Examine aspects of planning within an industry/organization.
  2. Examine aspects of management within an industry/organization.
  3. Examine aspects of financial responsibility within an industry/organization.
  4. Examine technical and production skills required of workers within an industry/organization.
  5. Examine principles of technology that underlie an industry/organization.
  6. Examine labor issues related to an industry/organization.
  7. Examine community issues related to an industry/organization.
  8. Examine health, safety, and environmental issues related to an industry/organization.

Addressing Elements of Student Life

  1. Identify the purposes and goals of the student organization.
  2. Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
  3. Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
  4. Identify Internet safety issues and procedures for complying with acceptable use standards.

Exploring Work-Based Learning

  1. Identify the types of work-based learning (WBL) opportunities.
  2. Reflect on lessons learned during the WBL experience.
  3. Explore career opportunities related to the WBL experience.
  4. Participate in a WBL experience, when appropriate.

Exploring Cybersecurity Fundamentals

  1. Describe cybersecurity.
  2. Define information assurance.
  3. Describe the critical factors of information security.
  4. Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration.
  5. Define risk.
  6. Identify the concepts of cybersecurity risk management.
  7. Describe cybersecurity threats to an organization.
  8. Explain why organizations need to manage risk.
  9. Discuss national or industry standards/regulations that relate to cybersecurity.
  10. Describe the cyberattack surface of various organizations.
  11. Analyze risks affecting critical infrastructure.

Examining Computer Networks as a Foundational Element of Cybersecurity

  1. Describe a network.
  2. Describe a wired/cabled network.
  3. Describe a wireless network.
  4. Compare cabled/wired and wireless networks.
  5. Compare networking conceptual models.
  6. Discuss services, their relationship to the OSI model, and potential vulnerabilities.
  7. Differentiate among network types.
  8. Examine the concept of the Internet as a network of connected systems.
  9. Identify networking protocols.

Understanding Cyber Threats and Vulnerabilities

  1. Describe the difference between a cyber threat and a vulnerability.
  2. Describe types of cyber threats.
  3. Analyze types of current cyber threats.
  4. Identify the perpetrators of different types of malicious hacking.
  5. Describe the characteristics of vulnerabilities.
  6. Identify the prevention of and protections against cyber threats.
  7. Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks.

Exploring Ethics as it Relates to Cybersecurity

  1. Differentiate between ethics and laws.
  2. Distinguish among types of ethical concerns.
  3. Define cyber bullying.
  4. Identify actions that constitute cyber bullying.
  5. Identify possible warning signs of someone being cyber bullied.
  6. Identify laws applicable to cybersecurity.
  7. Explain the concept of “personally identifiable information.”
  8. Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it.
  9. Identify ways to control and protect personal data.
  10. Demonstrate net etiquette (netiquette) as it relates to cybersecurity.
  11. Analyze the social and legal significance of the ongoing collection of personal digital information.

Examining Data Security as it Relates to Cybersecurity

  1. Distinguish between data, information, and knowledge.
  2. Identify the most common ways data is collected.
  3. Identify the most common ways data can be stored.
  4. Explain the difference between data at rest, data in transit, and data being processed.
  5. Identify the most common ways data is used.
  6. Discuss how data can be compromised, corrupted, or lost.
  7. Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions).

Securing Operating Systems

  1. Define the function of a computer operating system.
  2. Identify the components of an operating system.
  3. List types of operating systems.
  4. Evaluate the potential vulnerabilities, threats, and common exploits to an operating system.
  5. Identify best practices for protecting operating systems.
  6. Describe the concept of malware and techniques to guard against it.
  7. Evaluate critical operating system security parameters.
  8. Describe security and auditing logs.
  9. Describe the role of a system backup.
  10. Define virtualization technology.
  11. Identify advantages and disadvantages of using virtual machines.

Programming as a Component of Cybersecurity

  1. Define programming in the context of cybersecurity.
  2. Differentiate between computer programming languages.
  3. Evaluate common programming flaws that lead to vulnerabilities.
  4. Identify best practices in secure coding and design.

Exploring Cybersecurity Implications for Current and Emerging Technologies

  1. Identify ubiquitous computing.
  2. Discuss security and privacy implications of ubiquitous computing.

Exploring Cybersecurity Careers

  1. Research career opportunities for cybersecurity professionals.
  2. Explore the Career Clusters affected by current and emerging technology.
  3. Identify the educational pathways for emerging cybersecurity professionals.
  4. Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters.
  5. Research the cyber threats and security measures related to career pathways.

Preparing for Industry Certification

  1. Identify testing skills/strategies for a certification examination.
  2. Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course.
  3. Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams).
  4. Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA).