Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
1.1
Compare and contrast common operating system types and their purposes. |
|
1.2
Compare and contrast features of Microsoft Windows versions |
|
1.3
Summarize general OS installation considerations and upgrade methods. |
|
1.4
Given a scenario, use appropriate Microsoft command line tools. |
|
1.5
Given a scenario, use Microsoft operating system features and tools. |
|
1.6
Given a scenario, use Microsoft Windows Control Panel utilities |
|
1.7
Summarize application installation and configuration concepts. |
|
1.8
Given a scenario, configure Microsoft Windows networking on a client/desktop. |
|
1.9
Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems. |
|
2.1
Summarize the importance of physical security measures. |
|
2.2
Explain logical security concepts. |
|
2.3
Compare and contrast wireless security protocols and authentication methods. |
|
2.4
Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. |
|
2.5
Compare and contrast social engineering, threats, and vulnerabilities. |
|
2.6
Compare and contrast the differences of basic Microsoft Windows OS security settings. |
|
2.7
Given a scenario, implement security best practices to secure a workstation. |
|
2.8
Given a scenario, implement methods for securing mobile devices. |
|
2.9
Given a scenario, implement appropriate data destruction and disposal methods. |
|
2.10
Given a scenario, configure security on SOHO wireless and wired networks. |
|
3.1
Given a scenario, troubleshoot Microsoft Windows OS problems. |
|
3.2
Given a scenario, troubleshoot and resolve PC security issues. |
|
3.3
Given a scenario, use best practice procedures for malware removal. |
|
3.4
Given a scenario, troubleshoot mobile OS and application issues. |
|
3.5
Given a scenario, troubleshoot mobile OS and application security issues. |
|
4.1
Compare and contrast best practices associated with types of documentation. |
|
4.2
Given a scenario, implement basic change management best practices. |
|
4.3
Given a scenario, implement basic disaster prevention and recovery methods. |
|
4.4
Explain common safety procedures. |
|
4.5
Explain environmental impacts and appropriate controls |
|
4.6
Explain the processes for addressing prohibited content/ activity, and privacy, licensing, and policy concepts. |
|
4.7
Given a scenario, use proper communication techniques and professionalism |
|
4.8
Identify the basics of scripting. |
|
4.9
Given a scenario, use remote access technologies. |
|