Checkfu

Standard set

Advanced Cybersecurity (2020 - 2021)

Advanced CybersecurityGrades 09, VocationalTraining, 12, 11, 10CSP ID: 094887C7343C4F03AC309AB339AFCFBCStandards: 98

Standards

Showing 98 of 98 standards.

Filter by depth

TEIAC.A

Depth 0

Employability Skills

TEIAC.B

Depth 0

Legal Issues

TEIAC.C

Depth 0

Malware

TEIAC.D

Depth 0

Threats and Attacks

TEIAC.E

Depth 0

Cryptology

TEIAC.F

Depth 0

Wireless

TEIAC.G

Depth 0

Security

TEIAC.H

Depth 0

Response and Recovery`

TEIAC.I

Depth 0

Testing

TEIAC.J

Depth 0

Risk Management

TEIAC.K

Depth 0

Student Organizations

TEIAC.A.1

Depth 1

demonstrate employability skills required by business and industry

TEIAC.B.2

Depth 1

explore concepts of cybersecurity related to legal and ethical decisions

TEIAC.C.3

Depth 1

investigate concepts of malware threats

TEIAC.D.4

Depth 1

demonstrate how to analyze and react to various threats and vulnerabilities

TEIAC.E.5

Depth 1

apply advanced principles of cryptology

TEIAC.F.6

Depth 1

apply advanced communications and wireless security techniques

TEIAC.G.7

Depth 1

implement organizational security techniques

TEIAC.H.8

Depth 1

implement contingency planning (incident response and disaster recovery) techniques

TEIAC.I.9

Depth 1

perform security analysis, as well as testing and evaluation

TEIAC.J.10

Depth 1

implement risk management techniques for personal computer and network systems

TEIAC.J.11

Depth 1

demonstrate how to work with advanced methods of cybersecurity

TEIAC.K.12

Depth 1

explore how related student organizations are integral parts of career and technology education courses through leadership development, school and community service projects, entrepreneurship development, and competitive events

TEIAC.A.1.a

Depth 2

communicate effectively through writing, speaking, listening, reading, and interpersonal abilities

TEIAC.A.1.b

Depth 2

demonstrate creativity by asking challenging questions and applying innovative procedures and methods

TEIAC.A.1.c

Depth 2

exhibit critical thinking and problem solving skills to locate, analyze, and apply information in career planning and employment situations

TEIAC.A.1.d

Depth 2

model work readiness traits required for success in the workplace including integrity, honesty, accountability, punctuality, time management, and respect for diversity

TEIAC.A.1.e

Depth 2

apply the appropriate skill sets to be productive in a changing, technological, diverse workplace to be able to work independently and apply team work skills

TEIAC.A.1.f

Depth 2

present a professional image through appearance, behavior, and language

TEIAC.B.2.a

Depth 2

describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks

TEIAC.B.2.b

Depth 2

investigate potential abuse and unethical uses of computers and networks

TEIAC.B.2.c

Depth 2

explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices)

TEIAC.B.2.d

Depth 2

differentiate between freeware, shareware, and public domain software copyrights

TEIAC.B.2.e

Depth 2

discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications

TEIAC.B.2.f

Depth 2

identify netiquette including the use of e-mail, social networking, blogs, texting, and chatting

TEIAC.B.2.g

Depth 2

explain proper netiquette, including the use of e-mail, social networking, blogs, texting, and chatting

TEIAC.B.2.h

Depth 2

discuss the importance of cyber safety and the impact of cyber bullying

TEIAC.C.3.a

Depth 2

analyze and differentiate among types of malware

TEIAC.C.3.b

Depth 2

identify malware code, including strings

TEIAC.C.3.c

Depth 2

demonstrate skill in handling malware [NICE 153]

TEIAC.C.3.d

Depth 2

demonstrate skill in preserving evidence integrity according to standard operating procedures or national standards [NICE 217]

TEIAC.D.4.a

Depth 2

analyze and differentiate among types of network attacks (e.g., virus, worms, trojans, unpatched software, password cracking, advanced persistent threats, etc.)

TEIAC.D.4.b

Depth 2

distinguish between different social engineering attacks (e.g., baiting, phishing/spear phishing, pretexting/ blagging, tailgating, quid pro quo, etc.)

TEIAC.D.4.c

Depth 2

distinguish between reconnaissance/footprinting, infiltration, network breach, network exploitation, and attack for effects (e.g., deceive, disrupt, degrade, and destroy)

TEIAC.D.4.d

Depth 2

demonstrate an understanding of DoS/DDoS, session hijacking, HTTP spoofing, DNS attacks, switch attacks, man-in the-middle (MITM) attacks, and cross site scripting, and drive-by-attacks

TEIAC.E.5.a

Depth 2

use and apply appropriate cryptographic tools and products

TEIAC.E.5.b

Depth 2

explain the core concepts of Public Key Infrastructure

TEIAC.E.5.c

Depth 2

demonstrate knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]) and implement PKI, certificate management, and associated components [NICE 79]

TEIAC.E.5.d

Depth 2

install and configure Pretty Good Privacy (PGP) and send/receive PGP encrypted email

TEIAC.E.5.e

Depth 2

install and view a digital certificate

TEIAC.E.5.f

Depth 2

understand and master process to enroll for digital certificates

TEIAC.E.5.g

Depth 2

renew, revoke, backup, and restore public and private key certificates

TEIAC.E.5.h

Depth 2

install and secure a Certificate Authority (CA)

TEIAC.E.5.i

Depth 2

backup and restore a Certificate Authority (CA)

TEIAC.F.6.a

Depth 2

implement wireless networks in a secure manner

TEIAC.F.6.b

Depth 2

analyze and differentiate among types of wireless attacks

TEIAC.F.6.c

Depth 2

configure a wireless Access Point (WPA, WPA-2)

TEIAC.F.6.d

Depth 2

demonstrate use of InSSIDer and Netstumbler on wireless communications

TEIAC.F.6.e

Depth 2

change the power level of a Wireless Local Area Network (WLAN) Access Point

TEIAC.F.6.f

Depth 2

demonstrate knowledge of Virtual Private network (VPN) security and configure Virtual Private Network (VPN) [NICE 148]

TEIAC.F.6.g

Depth 2

demonstrate knowledge of remote access policy Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP)

TEIAC.G.7.a

Depth 2

explain the impact and proper use of environmental controls

TEIAC.G.7.b

Depth 2

explain the importance of security-related awareness and training

TEIAC.G.7.c

Depth 2

install environmental controls through Basic Input/Output System (BIOS)

TEIAC.G.7.d

Depth 2

write organizational security policies (e.g., email, wireless, etc.)

TEIAC.H.8.a

Depth 2

demonstrate knowledge of incident response and handling methodologies [NICE 61]

TEIAC.H.8.b

Depth 2

demonstrate knowledge of incident categories, incident responses, and timeliness for responses and compare and contrast aspects of business continuity [NICE 60]

TEIAC.H.8.c

Depth 2

execute disaster recovery plans and procedures

TEIAC.H.8.

Depth 2

demonstrate the ability to capture volatile memory contents

TEIAC.H.8.e

Depth 2

 perform imaging functions, such as operating system, network, and software configurations

TEIAC.H.8.g

Depth 2

restore a machine from a known good backup

TEIAC.I.9.a

Depth 2

analyze and differentiate among types of mitigation and deterrent techniques

TEIAC.I.9.b

Depth 2

implement assessment tools and techniques to discover security threats and vulnerabilities

TEIAC.I.9.c

Depth 2

explain the proper use of penetration testing versus vulnerability scanning in the context of vulnerability assessments

TEIAC.I.9.d

Depth 2

demonstrate skill in conducting vulnerability scans and recognizing vulnerabilities in security systems (e.g., Nessus, Nmap, Retina) [NICE 3]

TEIAC.I.9.e

Depth 2

conduct a security audit

TEIAC.I.9.f

Depth 2

view and modify an Address Resolution Protocol (ARP) table

TEIAC.I.9.g

Depth 2

evaluate the patch status of a machine

TEIAC.I.9.

Depth 2

demonstrate knowledge of pack-level analysis in order to install and view packet sniffer [NICE 93]

TEIAC.I.9.i

Depth 2

perform secure data destruction (e.g., Secure Erase, BCWipe)

TEIAC.J.10.a

Depth 2

explain risk-related concepts

TEIAC.J.10.b

Depth 2

perform a risk assessment

TEIAC.J.10.c

Depth 2

identify mitigations for risks from risk assessment

TEIAC.J.10.d

Depth 2

conduct appropriate risk mitigation strategies

TEIAC.J.11.a

Depth 2

apply and implement secure network administration principles

TEIAC.J.11.b

Depth 2

demonstrate knowledge of how network services and protocols interact to provide network communications in order to securely implement and use common protocols [NICE 50]

TEIAC.J.11.c

Depth 2

identify commonly used default network ports

TEIAC.J.11.d

Depth 2

set up a Network Address Translation (NAT) device

TEIAC.J.11.e

Depth 2

spoof a Media Access Control (MAC) address

TEIAC.J.11.f

Depth 2

configure Virtual Private Network (VPN)

TEIAC.J.11.g

Depth 2

demonstrate creativity by asking challenging questions and applying innovative procedures and methods

TEIAC.J.11.h

Depth 2

demonstrate knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol (TCP/IP), Dynamic Host Configuration Protocol (DHCP) and directory services (e.g., Domain Name System [DNS] by setting up common protocols, e.g., Secure Shell [SSH], netstat, Simple Mail Transfer Protocol [SMTP], nslookup, Telnet, DNS/Bind, FTP, IIS/Web pages, DHCP/DNS server) [NICE 81]

TEIAC.J.11.i

Depth 2

locate open ports by completing a port scan

TEIAC.J.11.j

Depth 2

demonstrate the knowledge and use of network statistics (netstat)

TEIAC.K.12.a

Depth 2

explore the impact and opportunities a student organization can develop to bring business and education together in a positive working relationship through innovative leadership and career development programs

TEIAC.K.12.b

Depth 2

explore the local, state, and national opportunities available to students through participation in related student organization including but not limited to conferences, competitions, community service, philanthropy, and other activities

TEIAC.K.12.c

Depth 2

explain how participation in career and technology education student organizations can promote lifelong responsibility for community service and professional development

TEIAC.K.12.d

Depth 2

explore the competitive events related to the content of this course and the required competencies, skills, and knowledge for each related event for individual, team, and chapter competitions

Framework metadata

Source document
AKS Curriculum
License
CC BY 4.0 US