Standards in this Framework
Standard | Description |
---|---|
1.1 | Compare and contrast common operating system types and their purposes. |
1.2 | Compare and contrast features of Microsoft Windows versions |
1.3 | Summarize general OS installation considerations and upgrade methods. |
1.4 | Given a scenario, use appropriate Microsoft command line tools. |
1.5 | Given a scenario, use Microsoft operating system features and tools. |
1.6 | Given a scenario, use Microsoft Windows Control Panel utilities |
1.7 | Summarize application installation and configuration concepts. |
1.8 | Given a scenario, configure Microsoft Windows networking on a client/desktop. |
1.9 | Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems. |
2.1 | Summarize the importance of physical security measures. |
2.2 | Explain logical security concepts. |
2.3 | Compare and contrast wireless security protocols and authentication methods. |
2.4 | Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. |
2.5 | Compare and contrast social engineering, threats, and vulnerabilities. |
2.6 | Compare and contrast the differences of basic Microsoft Windows OS security settings. |
2.7 | Given a scenario, implement security best practices to secure a workstation. |
2.8 | Given a scenario, implement methods for securing mobile devices. |
2.9 | Given a scenario, implement appropriate data destruction and disposal methods. |
2.10 | Given a scenario, configure security on SOHO wireless and wired networks. |
3.1 | Given a scenario, troubleshoot Microsoft Windows OS problems. |
3.2 | Given a scenario, troubleshoot and resolve PC security issues. |
3.3 | Given a scenario, use best practice procedures for malware removal. |
3.4 | Given a scenario, troubleshoot mobile OS and application issues. |
3.5 | Given a scenario, troubleshoot mobile OS and application security issues. |
4.1 | Compare and contrast best practices associated with types of documentation. |
4.2 | Given a scenario, implement basic change management best practices. |
4.3 | Given a scenario, implement basic disaster prevention and recovery methods. |
4.4 | Explain common safety procedures. |
4.5 | Explain environmental impacts and appropriate controls |
4.6 | Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts. |
4.7 | Given a scenario, use proper communication techniques and professionalism |
4.8 | Identify the basics of scripting. |
4.9 | Given a scenario, use remote access technologies. |