Please enable JavaScript to use CodeHS

Nevada Cybersecurity 3 Framework


Standard Description
6.1.1 Categorize Ethernet wired network adapter components, features, and connectors Lessons
6.1.2 Categorize Ethernet wireless access point components, features, connectors, and cables Lessons
6.1.3 Describe common network connectivity devices and their roles Lessons
6.1.4 Analyze properties of basic network protocols Lessons
6.1.5 Apply appropriate networking utilities to view, test, and troubleshoot basic network configuration, topology, communicant, and connectivity problems Lessons
6.2.1 Deploy best practices to secure any device accessing a network Lessons
6.2.2 Compare and contrast physical security controls Lessons
6.2.3 Compare and contrast risk related concepts Lessons
6.2.4 Implement network hardening techniques Lessons
6.2.5 Configure a basic firewall Lessons
6.2.6 Explain the purpose of various network access control models Lessons
6.2.7 Secure SOHO wired and wireless networks Lessons
6.2.8 Identify common network vulnerabilities, threats, and risks Lessons
6.2.9 Analyze and implement security settings on figure BIOS/UEFI security settings Lessons
6.3.1 Implement various networking troubleshooting methodology Lessons
6.3.2 Analyze and interpret the output of troubleshooting tools Lessons
6.3.3 Troubleshoot and resolve common wireless issues Lessons
6.3.4 Troubleshoot and resolve common copper and fiber cable issues Lessons
6.3.5 Troubleshoot and resolve common network issues Lessons
6.3.6 Troubleshoot and resolve common security issues Lessons
6.3.7 Troubleshoot and resolve common WAN issues Lessons
6.4.1 Explain the functions and application of various network devices Lessons
6.4.2 Compare the use of networking services and applications Lessons
6.4.3 Install and configure networking services and applications Lessons
6.4.4 Explain the characteristics and benefits of various WAN technologies Lessons
6.4.5 Install and terminate various cable types and connectors using appropriate tools Lessons
6.4.6 Differentiate between network infrastructure implementations Lessons
6.4.7 Implement and configure the appropriate addressing schema Lessons
6.4.8 Explain the basics of routing Lessons
6.4.9 Describe the elements of unified communications technologies Lessons
7.1.1 Describe use of packet tracing tools and network analyzing tools Lessons
7.1.2 Demonstrate use of network monitoring tools Lessons
7.1.3 Demonstrate use of port and vulnerability scanning tools Lessons
7.1.4 Describe the use of SMTP monitoring software Lessons
7.1.5 Demonstrate understanding of security information and event management (SIEM) tools Lessons
7.1.6 Demonstrate use of environmental monitoring tools Lessons
7.1.7 Operate power monitoring tools Lessons
7.1.8 Demonstrate use of wireless survey tools Lessons
7.2.1 Analyze SYSLOG data Lessons
7.2.2 Demonstrate use of log management Lessons
7.2.3 Apply interface monitoring tools Lessons
7.2.4 Evaluate system performance metrics against baseline data Lessons
7.2.5 Evaluate system metrics and logs for resource depletion Lessons
7.2.6 Evaluate system metrics and logs for network connectivity Lessons
7.3.1 Prepare archives/backups Lessons
7.3.2 Build system baseline based on normal operations Lessons
7.3.3 Describe provisioning and de-provisioning of mobile devices (enterprise, BYOD) Lessons
7.3.4 Illustrate network access control (NAC) Lessons
7.3.5 Document a configuration management strategy Lessons
7.4.1 Compare and contrast protecting SCADA systems and industrial control systems (ICS) Lessons
7.4.2 Determine a plan to protect legacy systems Lessons
7.4.3 Explain how to separate private/public networks Lessons
7.4.4 Describe theft detection technologies (honeypot/honeynet) Lessons
7.4.5 Research the need for a testing lab (development ops/DevOps) Lessons
7.4.6 Determine a plan for load balancing the network Lessons
7.4.7 Creating a plan for performance optimization (tuning) Lessons
7.5.1 Install software and hardware patches and updates (OS, critical, non-critical, etc.) Lessons
7.5.2 Compare and contrast firmware and driver updates Lessons
7.5.3 Recognize the difference between feature releases/security updates Lessons
7.5.4 Develop rollout/rollback procedures Lessons
7.6.1 Setup, configure, and secure a VLAN Lessons
7.6.2 Configure a Spanning Tree Protocol (STP) (IEEE 802.1D) ensuring you do not create any loops Lessons
7.6.3 Setup an Ethernet Interface via the interface configuration file including demonstrating how to give your network card an IP address (DHCP), set up routing information, configure IP masquerading, and set default routes Lessons
7.6.4 Setup and configure a default gateway defining where to send packets for IP addresses for which they can determine no specific route Lessons
7.6.5 Describe and demonstrate several common techniques for transmitting power over Ethernet cabling (PoE and PoE+ 802.3af, 802.3at) Lessons
7.6.6 Compare and contrast managed vs. unmanaged switches Lessons