CTE Resource Center - Verso

Virginia’s CTE Resource Center

2018/2019 Competency-Based Task/Competency List for Cyber Security and Cyber Forensics Infusion Units (CYBR/Locally determined)

Tasks/competencies bordered in blue are considered optional when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.

Expand all

Ajax loader

Demonstrating Workplace Readiness Skills: Personal Qualities and People Skills

  1. Demonstrate positive work ethic.
  2. Demonstrate integrity.
  3. Demonstrate teamwork skills.
  4. Demonstrate self-representation skills.
  5. Demonstrate diversity awareness.
  6. Demonstrate conflict-resolution skills.
  7. Demonstrate creativity and resourcefulness.

Demonstrating Workplace Readiness Skills: Professional Knowledge and Skills

  1. Demonstrate effective speaking and listening skills.
  2. Demonstrate effective reading and writing skills.
  3. Demonstrate critical-thinking and problem-solving skills.
  4. Demonstrate healthy behaviors and safety skills.
  5. Demonstrate an understanding of workplace organizations, systems, and climates.
  6. Demonstrate lifelong-learning skills.
  7. Demonstrate job-acquisition and advancement skills.
  8. Demonstrate time-, task-, and resource-management skills.
  9. Demonstrate job-specific mathematics skills.
  10. Demonstrate customer-service skills.

Demonstrating Workplace Readiness Skills: Technology Knowledge and Skills

  1. Demonstrate proficiency with technologies common to a specific occupation.
  2. Demonstrate information technology skills.
  3. Demonstrate an understanding of Internet use and security issues.
  4. Demonstrate telecommunications skills.

Examining All Aspects of an Industry

  1. Examine aspects of planning within an industry/organization.
  2. Examine aspects of management within an industry/organization.
  3. Examine aspects of financial responsibility within an industry/organization.
  4. Examine technical and production skills required of workers within an industry/organization.
  5. Examine principles of technology that underlie an industry/organization.
  6. Examine labor issues related to an industry/organization.
  7. Examine community issues related to an industry/organization.
  8. Examine health, safety, and environmental issues related to an industry/organization.

Addressing Elements of Student Life

  1. Identify the purposes and goals of the student organization.
  2. Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
  3. Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
  4. Identify Internet safety issues and procedures for complying with acceptable use standards.


Exploring the Foundations of Cyber Security

  1. Define cyber system and industry-specific terminology.
  2. Provide background on fundamental information technology security concepts.
  3. Create a framework to protect information systems.
  4. Describe information technology ethics and an acceptable use policy (AUP).
  5. Act upon AUP infractions.

Working with Virtual Machines

  1. Define components of and terminology related to virtual machines.
  2. Identify advantages and disadvantages of using virtual machines.
  3. Determine software downloading and installation procedures for virtual machines.
  4. Perform common tasks, using a virtual machine.

Exploring Cyber Careers

  1. Research career opportunities for cyber security/forensics professionals.
  2. Identify the educational pathways for emerging cyber security and cyber forensics professionals.
  3. Identify career paths and job titles within the cyber security/forensics industry and related Career Clusters.


Establishing Passwords

  1. Verify that Web sites are secure before submitting personal or corporate information.
  2. Describe vulnerabilities associated with using automated teller machines (ATM).
  3. Describe keylogging vulnerabilities.
  4. Establish a password protocol and policy.

Maintaining Endpoint Security

  1. Install an operating system and components.
  2. Install service packs and updates.
  3. Update installed applications.
  4. Install and update anti-virus/anti-spyware utilities.
  5. Configure critical operating system parameters.
  6. Enable security and auditing logs.
  7. Back up a system.
  8. Restore a system from a backup.
  9. Secure a router connection.
  10. Secure other personal/mobile devices.
  11. Secure a game console.

Maintaining Network Security

  1. Describe network topologies.
  2. Identify network vulnerabilities.
  3. Describe methods for strengthening network security.
  4. Identify components of physical security.
  5. Identify common network devices.
  6. Identify protocols.
  7. Describe the fundamentals of domain names.
  8. Describe network configuration tools.

Implementing Threat Mitigation

  1. Set up a schedule for anti-virus scans.
  2. Run an anti-virus scan.
  3. Respond to results from an anti-virus scan.
  4. Research the nature (i.e., motivations) and scope (i.e., prevalence) of current and past threats.
  5. Report system anomalies.


Exploring Ethical and Legal Issues

  1. Identify laws applicable to cyber.
  2. Describe the rule of law and its impact on cyber forensics.
  3. Identify rules of evidence relevant to cyber forensics.

Applying Legal Procedures

  1. Describe ISO/IEC-27037 and its relevance to cyber forensics.
  2. Describe the importance of using a write blocker or best effort to preserve evidence.
  3. Create a forensic image and establish hash code, using a write blocker.
  4. Establish and maintain the chain of custody.

Identifying Media

  1. Identify types of media hardware.
  2. Identify types of hardware interfaces.

Exploring Media Forensics

  1. Identify common file systems.
  2. Identify types of artifacts.
  3. Identify geometry parameters of physical media.
  4. Recover artifacts from physical media.

Conducting Mobile Devices Forensics

  1. Change EXIF (exchangeable image file format).
  2. Extract text messages.
  3. Extract call logs.
  4. Extract unique identifiers from components.