| 1 |
Demonstrate creativity and innovation. |
Lessons
|
| 2 |
Demonstrate critical thinking and problem solving. |
Lessons
|
| 3 |
Demonstrate initiative and self-direction. |
Lessons
|
| 4 |
Demonstrate integrity. |
Lessons
|
| 5 |
Demonstrate work ethic. |
Lessons
|
| 6 |
Demonstrate conflict-resolution skills. |
Lessons
|
| 7 |
Demonstrate listening and speaking skills. |
Lessons
|
| 8 |
Demonstrate respect for diversity. |
Lessons
|
| 9 |
Demonstrate customer service skills. |
Lessons
|
| 10 |
Collaborate with team members. |
Lessons
|
| 11 |
Demonstrate big-picture thinking. |
Lessons
|
| 12 |
Demonstrate career- and life-management skills. |
Lessons
|
| 13 |
Demonstrate continuous learning and adaptability. |
Lessons
|
| 14 |
Manage time and resources. |
Lessons
|
| 15 |
Demonstrate information-literacy skills. |
Lessons
|
| 16 |
Demonstrate an understanding of information security. |
Lessons
|
| 17 |
Maintain working knowledge of current information-technology (IT) systems. |
Lessons
|
| 18 |
Demonstrate proficiency with technologies, tools, and machines common to a specific occupation. |
Lessons
|
| 19 |
Apply mathematical skills to job-specific tasks. |
Lessons
|
| 20 |
Demonstrate professionalism. |
Lessons
|
| 21 |
Demonstrate reading and writing skills. |
Lessons
|
| 22 |
Demonstrate workplace safety. |
Lessons
|
| 23 |
Examine aspects of planning within an industry/organization. |
Lessons
|
| 24 |
Examine aspects of management within an industry/organization. |
Lessons
|
| 25 |
Examine aspects of financial responsibility within an industry/organization. |
Lessons
|
| 26 |
Examine technical and production skills required of workers within an industry/organization. |
Lessons
|
| 27 |
Examine principles of technology that underlie an industry/organization. |
Lessons
|
| 28 |
Examine labor issues related to an industry/organization. |
Lessons
|
| 29 |
Examine community issues related to an industry/organization. |
Lessons
|
| 30 |
Examine health, safety, and environmental issues related to an industry/organization. |
Lessons
|
| 31 |
Identify the purposes and goals of the student organization. |
Lessons
|
| 32 |
Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult. |
Lessons
|
| 33 |
Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects. |
Lessons
|
| 34 |
Identify Internet safety issues and procedures for complying with acceptable use standards. |
Lessons
|
| 35 |
Identify the types of work-based learning (WBL) opportunities. |
Lessons
|
| 36 |
Reflect on lessons learned during the WBL experience. |
Lessons
|
| 37 |
Explore career opportunities related to the WBL experience. |
Lessons
|
| 38 |
Participate in a WBL experience, when appropriate. |
Lessons
|
| 39 |
Describe Cybersecurity |
Lessons
|
| 40 |
Define information assurance |
Lessons
|
| 41 |
Describe the critical factors of information security |
Lessons
|
| 42 |
Explain cybersecurity services as they relate to intrusion prevention capabilities that protect systems against unauthorized access, exploitation, and data exfiltration |
Lessons
|
| 43 |
Define risk |
Lessons
|
| 44 |
Identify the concepts of cybersecurity risk management |
Lessons
|
| 45 |
Describe cybersecurity threats to an organization |
Lessons
|
| 46 |
Explain why organizations need to manage risk |
Lessons
|
| 47 |
Discuss national or industry standards/regulations that relate to cybersecurity |
Lessons
|
| 48 |
Describe the cyberattack surface of various organizations |
Lessons
|
| 49 |
Analyze risks affecting critical infrastructure |
Lessons
|
| 50 |
Describe a network |
Lessons
|
| 51 |
Describe a wired/cabled network |
Lessons
|
| 52 |
Describe a wireless network |
Lessons
|
| 53 |
Compare cabled/wired and wireless networks |
Lessons
|
| 54 |
Compare networking conceptual models |
Lessons
|
| 55 |
Discuss services, their relationship to the OSI model, and potential vulnerabilities |
Lessons
|
| 56 |
Differentiate among network types |
Lessons
|
| 57 |
Examine the concept of the Internet as a network of connected systems |
Lessons
|
| 58 |
Identify networking protocols |
Lessons
|
| 59 |
Describe the difference between a cyber threat and a vulnerability |
Lessons
|
| 60 |
Describe types of cyber threats |
Lessons
|
| 61 |
Analyze types of current cyber threats |
Lessons
|
| 62 |
Identify the perpetrators of different types of malicious hacking |
Lessons
|
| 63 |
Describe the characteristics of vulnerabilities |
Lessons
|
| 64 |
Identify the prevention of and protection against cyber threats |
Lessons
|
| 65 |
Identify the cyber risks associated with bring your own device (BYOD) opportunities on computer networks |
Lessons
|
| 66 |
Differentiate between ethics and laws |
Lessons
|
| 67 |
Distinguish among types of ethical concerns |
Lessons
|
| 68 |
Define cyberbullying |
Lessons
|
| 69 |
Identify actions that constitute cyberbullying |
Lessons
|
| 70 |
Identify possible warning signs of someone being cyberbullied |
Lessons
|
| 71 |
Identify laws applicable to cybersecurity |
Lessons
|
| 72 |
Explain the concept of “personally identifiable information” |
Lessons
|
| 73 |
Explain how and why personal data is valuable to both an individual and to the organizations (e.g., governments, businesses) that collect it, analyze it, and make decisions based on it |
Lessons
|
| 74 |
Identify ways to control and protect personal data |
Lessons
|
| 75 |
Demonstrate net etiquette (netiquette) as it relates to cybersecurity |
Lessons
|
| 76 |
Analyze the social and legal significance of the ongoing collection of personal digital information |
Lessons
|
| 77 |
Distinguish between data, information, and knowledge |
Lessons
|
| 78 |
Identify the most common ways data is collected |
Lessons
|
| 79 |
Identify the most common ways data can be stored |
Lessons
|
| 80 |
Explain the difference between data at rest, data in transit, and data being processed |
Lessons
|
| 81 |
Identify the most common ways data is used |
Lessons
|
| 82 |
Discuss how data can be compromised, corrupted, or lost |
Lessons
|
| 83 |
Explain how businesses and individuals can protect themselves against threats to their data (e.g., firewalls, encryption, disabling, backups, permissions) |
Lessons
|
| 84 |
Define the function of a computer operating system |
Lessons
|
| 85 |
Identify the components of an operating system |
Lessons
|
| 86 |
List types of operating systems |
Lessons
|
| 87 |
Evaluate the potential vulnerabilities, threats, and common exploits to an operating system |
Lessons
|
| 88 |
Identify best practices for protecting operating systems |
Lessons
|
| 89 |
Describe the concept of malware and techniques to guard against it |
Lessons
|
| 90 |
Evaluate critical operating system security parameters |
Lessons
|
| 91 |
Describe security and auditing logs |
Lessons
|
| 92 |
Describe the role of a system backup |
Lessons
|
| 93 |
Define virtualization technology |
Lessons
|
| 94 |
Identify advantages and disadvantages of using virtual machines |
Lessons
|
| 95 |
Define programming in the context of cybersecurity |
Lessons
|
| 96 |
Differentiate between computer programming languages |
Lessons
|
| 97 |
Evaluate common programming flaws that lead to vulnerabilities |
Lessons
|
| 98 |
Identify best practices in secure coding and design |
Lessons
|
| 99 |
Identify ubiquitous computing |
Lessons
|
| 100 |
Discuss security and privacy implications of ubiquitous computing |
Lessons
|
| 101 |
Research career opportunities for cybersecurity professionals |
Lessons
|
| 102 |
Identify the educational pathways for emerging cybersecurity professionals |
Lessons
|
| 103 |
Identify the educational pathways for emerging cybersecurity professionals |
Lessons
|
| 104 |
Identify career paths and job titles within the cybersecurity/cyber forensics industry and Career Clusters |
Lessons
|
| 105 |
Research the cyber threats and security measures related to career pathways |
Lessons
|
| 106 |
Identify testing skills/strategies for a certification examination |
Lessons
|
| 107 |
Describe the process and requirements for obtaining industry certifications related to the Cybersecurity Fundamentals course |
Lessons
|
| 108 |
Demonstrate the ability to complete selected practice examinations (e.g., practice questions similar to those on certification exams) |
Lessons
|
| 109 |
Successfully complete an industry certification examination representative of skills learned in this course (e.g., Microsoft, IC3, CompTIA) |
Lessons
|