# CTE Resource Center - Verso - Cybersecurity Software Operations Task/Competency List

CTE Resource Center - Verso

Virginia’s CTE Resource Center

2019/2020 Competency-Based Task/Competency List for Cybersecurity Software Operations (6304/36 weeks)

Tasks/competencies bordered in blue are considered optional when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.

Expand all

Ajax loader

Demonstrating Personal Qualities and Abilities

  1. Demonstrate creativity and innovation.
  2. Demonstrate critical thinking and problem solving.
  3. Demonstrate initiative and self-direction.
  4. Demonstrate integrity.
  5. Demonstrate work ethic.

Demonstrating Interpersonal Skills

  1. Demonstrate conflict-resolution skills.
  2. Demonstrate listening and speaking skills.
  3. Demonstrate respect for diversity.
  4. Demonstrate customer service skills.
  5. Collaborate with team members.

Demonstrating Professional Competencies

  1. Demonstrate big-picture thinking.
  2. Demonstrate career- and life-management skills.
  3. Demonstrate continuous learning and adaptability.
  4. Manage time and resources.
  5. Demonstrate information-literacy skills.
  6. Demonstrate an understanding of information security.
  7. Maintain working knowledge of current information-technology (IT) systems.
  8. Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  9. Apply mathematical skills to job-specific tasks.
  10. Demonstrate professionalism.
  11. Demonstrate reading and writing skills.
  12. Demonstrate workplace safety.

Examining All Aspects of an Industry

  1. Examine aspects of planning within an industry/organization.
  2. Examine aspects of management within an industry/organization.
  3. Examine aspects of financial responsibility within an industry/organization.
  4. Examine technical and production skills required of workers within an industry/organization.
  5. Examine principles of technology that underlie an industry/organization.
  6. Examine labor issues related to an industry/organization.
  7. Examine community issues related to an industry/organization.
  8. Examine health, safety, and environmental issues related to an industry/organization.

Addressing Elements of Student Life

  1. Identify the purposes and goals of the student organization.
  2. Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
  3. Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
  4. Identify Internet safety issues and procedures for complying with acceptable use standards.

Exploring Work-Based Learning

  1. Identify the types of work-based learning (WBL) opportunities.
  2. Reflect on lessons learned during the WBL experience.
  3. Explore career opportunities related to the WBL experience.
  4. Participate in a WBL experience, when appropriate.

Using Desktop Systems Concepts

  1. Navigate an end user’s digital operating system network/environment.
  2. Compare current digital operating systems.
  3. Navigate the digital operating system environment.
  4. Demonstrate the procedures followed when installing digital operating systems.
  5. Manage a file system structure.
  6. Compare server operating systems.
  7. Explain different types of drive partitions and file system formats.
  8. Explain file system formats.
  9. Analyze current and emerging specialized server hardware.
  10. Manage partitions and volumes.
  11. Explain the authentication of users in a network environment.
  12. Install applications.

Introducing Network Design Essentials

  1. Define aspects of networks.
  2. Define types of network architecture.
  3. Differentiate between distributed and centralized computing.
  4. Identify services delivered by a server.
  5. Describe standard network LAN topologies.
  6. Describe variations of standard topologies.
  7. Describe the role of the network adapter.
  8. Describe the functions of networking infrastructure (e.g., adapter, router, switch, bridge, wireless access point).
  9. Describe the primary features of each major access method.

Exploring Networking Media

  1. Define terms related to wired and wireless network media.
  2. Identify the types and uses of wired network media.
  3. Identify the types and uses of wireless network media.
  4. Describe the concept of broadband.
  5. Describe the types of modems.

Understanding Networking Standards and Models

  1. Describe each layer of the Open Systems Interconnection (OSI) model.
  2. Describe devices in a network environment and their place in the OSI model.
  3. Define the basic components of a network packet.
  4. Describe networking protocols.
  5. Map network processes.
  6. Identify the workings of a WAN.

Conducting TCP/IP Activities

  1. Describe TCP/IP.
  2. Compare static and dynamic IP routing.
  3. Configure TCP/IP.
  4. Test a TCP/IP configuration, using operating-system-specific commands.
  5. Identify the network and host identifications' TCP/IP addresses.
  6. Compare IPv4 and IPv6.
  7. Explain the function of a subnet mask and classless inter-domain routing (CIDR) format.
  8. Describe a loopback address.
  9. Describe the services provided by Network Basic Input/Output System (NetBIOS) over TCP/IP.
  10. Explain the process of host name resolution.
  11. Modify the host’s file to resolve host names.
  12. Configure File Transfer Protocol (FTP).
  13. Explain the purpose of the Simple Network Management Protocol (SNMP).
  14. Describe the implementation of a virtual LAN (VLAN).

Ensuring Network Security

  1. Monitor network traffic.
  2. Analyze network systems for security vulnerabilities.
  3. Explain the core security principles used in network management.
  4. Analyze threats and risks to networks and local account policies.
  5. Analyze internal and external threats to computer networks.
  6. Identify strategies to mitigate risk.
  7. Identify sustainable computer networking practices.
  8. Install a virtualized operating system.
  9. Describe the different types of network adapter modes for virtual operating systems.
  10. Incorporate security scanning tools such as Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) and/or security appliances.
  11. Identify threats and vulnerabilities from users.
  12. Identify security measures to physical threats to network systems.
  13. Identifying other risks and threats to systems.

Providing Basic User Training and Support

  1. Identify training needs.
  2. Provide an orientation to a network system (system onboarding).
  3. Develop a training plan.
  4. Provide training to users.
  5. Create a user manual.
  6. Provide ongoing basic user support.

Performing Legal and Ethical Functions

  1. Identify copyright and licensing laws that apply to computer use and network administration.
  2. Describe procedures to ensure the proper licensing of a client-server operating system and applications.
  3. Identify ethical behavior that is expected of users and administrators.
  4. Describe procedures for documentation found in network policies.
  5. Explain network hardening.
  6. Manage a network.
  7. Optimize a network.

Preparing for Industry Certification

  1. Describe the process and requirements for obtaining industry certifications.
  2. Identify testing skills/strategies for a certification examination.
  3. Demonstrate ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams).
  4. Complete an industry certification examination representative of skills learned in this course.

Developing Employability Skills

  1. Research careers in networking and systems security.
  2. Compose a résumé for electronic processing.
  3. Assemble a professional portfolio that contains representative samples of student work.
  4. Create a cover letter to accompany a résumé.
  5. Complete manual and electronic application forms.
  6. Participate in an internship program.
  7. Research a company in preparation for a job interview.
  8. Participate in a mock interview.
  9. Compose an interview follow-up letter.
  10. Identify the steps to follow when resigning from a position.
  11. Identify potential employment barriers for nontraditional groups and ways to overcome these barriers.