# CTE Resource Center - Verso - Cyber Security and Cyber Forensics Infusion Units Task/Competency List

CTE Resource Center - Verso

Virginia’s CTE Resource Center

The 2019 edition of this course is still available. Click here.

2020/2021 Competency-Based Task/Competency List for Cyber Security and Cyber Forensics Infusion Units (CYBR/Locally determined)

Tasks/competencies bordered in blue are considered optional when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.

Expand all

Ajax loader

Demonstrating Personal Qualities and Abilities

  1. Demonstrate creativity and innovation.
  2. Demonstrate critical thinking and problem solving.
  3. Demonstrate initiative and self-direction.
  4. Demonstrate integrity.
  5. Demonstrate work ethic.

Demonstrating Interpersonal Skills

  1. Demonstrate conflict-resolution skills.
  2. Demonstrate listening and speaking skills.
  3. Demonstrate respect for diversity.
  4. Demonstrate customer service skills.
  5. Collaborate with team members.

Demonstrating Professional Competencies

  1. Demonstrate big-picture thinking.
  2. Demonstrate career- and life-management skills.
  3. Demonstrate continuous learning and adaptability.
  4. Manage time and resources.
  5. Demonstrate information-literacy skills.
  6. Demonstrate an understanding of information security.
  7. Maintain working knowledge of current information-technology (IT) systems.
  8. Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  9. Apply mathematical skills to job-specific tasks.
  10. Demonstrate professionalism.
  11. Demonstrate reading and writing skills.
  12. Demonstrate workplace safety.

Examining All Aspects of an Industry

  1. Examine aspects of planning within an industry/organization.
  2. Examine aspects of management within an industry/organization.
  3. Examine aspects of financial responsibility within an industry/organization.
  4. Examine technical and production skills required of workers within an industry/organization.
  5. Examine principles of technology that underlie an industry/organization.
  6. Examine labor issues related to an industry/organization.
  7. Examine community issues related to an industry/organization.
  8. Examine health, safety, and environmental issues related to an industry/organization.

Addressing Elements of Student Life

  1. Identify the purposes and goals of the student organization.
  2. Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
  3. Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
  4. Identify Internet safety issues and procedures for complying with acceptable use standards.

Exploring Work-Based Learning

  1. Identify the types of work-based learning (WBL) opportunities.
  2. Reflect on lessons learned during the WBL experience.
  3. Explore career opportunities related to the WBL experience.
  4. Participate in a WBL experience, when appropriate.


Exploring the Foundations of Cyber Security

  1. Define cyber system and industry-specific terminology.
  2. Provide background on fundamental information technology security concepts.
  3. Create a framework to protect information systems.
  4. Describe information technology ethics and an acceptable use policy (AUP).
  5. Act upon AUP infractions.

Working with Virtual Machines

  1. Define components of and terminology related to virtual machines.
  2. Identify advantages and disadvantages of using virtual machines.
  3. Determine software downloading and installation procedures for virtual machines.
  4. Perform common tasks, using a virtual machine.

Exploring Cyber Careers

  1. Research career opportunities for cyber security/forensics professionals.
  2. Identify the educational pathways for emerging cyber security and cyber forensics professionals.
  3. Identify career paths and job titles within the cyber security/forensics industry and related Career Clusters.


Establishing Passwords

  1. Verify that Web sites are secure before submitting personal or corporate information.
  2. Describe vulnerabilities associated with using automated teller machines (ATM).
  3. Describe keylogging vulnerabilities.
  4. Establish a password protocol and policy.

Maintaining Endpoint Security

  1. Install an operating system and components.
  2. Install service packs and updates.
  3. Update installed applications.
  4. Install and update anti-virus/anti-spyware utilities.
  5. Configure critical operating system parameters.
  6. Enable security and auditing logs.
  7. Back up a system.
  8. Restore a system from a backup.
  9. Secure a router connection.
  10. Secure other personal/mobile devices.
  11. Secure a game console.

Maintaining Network Security

  1. Describe network topologies.
  2. Identify network vulnerabilities.
  3. Describe methods for strengthening network security.
  4. Identify components of physical security.
  5. Identify common network devices.
  6. Identify protocols.
  7. Describe the fundamentals of domain names.
  8. Describe network configuration tools.

Implementing Threat Mitigation

  1. Set up a schedule for anti-virus scans.
  2. Run an anti-virus scan.
  3. Respond to results from an anti-virus scan.
  4. Research the nature (i.e., motivations) and scope (i.e., prevalence) of current and past threats.
  5. Report system anomalies.


Exploring Ethical and Legal Issues

  1. Identify laws applicable to cyber.
  2. Describe the rule of law and its impact on cyber forensics.
  3. Identify rules of evidence relevant to cyber forensics.

Applying Legal Procedures

  1. Describe ISO/IEC-27037 and its relevance to cyber forensics.
  2. Describe the importance of using a write blocker or best effort to preserve evidence.
  3. Create a forensic image and establish hash code, using a write blocker.
  4. Establish and maintain the chain of custody.

Identifying Media

  1. Identify types of media hardware.
  2. Identify types of hardware interfaces.

Exploring Media Forensics

  1. Identify common file systems.
  2. Identify types of artifacts.
  3. Identify geometry parameters of physical media.
  4. Recover artifacts from physical media.

Conducting Mobile Devices Forensics

  1. Change EXIF (exchangeable image file format).
  2. Extract text messages.
  3. Extract call logs.
  4. Extract unique identifiers from components.