CTE22.IT.CTL.3d
Construct charts, tables, or graphs using functions and data.
Construct charts, tables, or graphs using functions and data.
Construct charts, tables, or graphs using functions and data.
Apply enhanced leadership and professional career skills needed in information technology careers.
Develop and present a professional presentation offering potential solutions to a current issue.
Demonstrate leadership and career skills in job placement, job shadowing, entrepreneurship, or internship, or by obtaining an industry-recognized credential of value.
Participate in leadership development opportunities available through the appropriate student organization and/or professional organizations in the information technology field.
Demonstrate written and oral communication skills through presentations, public speaking, live or virtual interviews, and/or an employment portfolio.
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
Identify and discuss ethical considerations and consequences resulting from technological advances.
Examples: deepfake, facial recognition, big data, privacy concerns
Research and discuss federal laws, regulations, and agencies that govern online activities and individual and corporate network use.
Examples: Computer Security Act, Sarbanes-Oxley Act, Gramm-Leach-Bliley Act, Computer Fraud and Abuse Act, Payment Card Industry Data Security Standard (PCI DSS); COPPA, HIPAA, FERPA, and CMMC regulations
Gather and share information regarding ethical standards which apply to cybersecurity professionals.
Describe national and international standards and frameworks related to security operations.
Examples: Center for Internet Security (CIS), National Institute of Standards and Technology (NIST) RMF/CSF, International Organization for Standardization (ISO)
Identify security policies related to the employees of organizations or businesses and discuss the importance of establishing such policies.
Examples: personnel policies, acceptable use, non-disclosure agreements, credential policies
Explain and differentiate among identification, authentication, authorization, and accounting for controlling access.
Identify and describe authentication types and attributes.
Compare and contrast authorization access control models.
Examples: mandatory access control (MAC), discretionary access control (DAC), role-based access control (RBAC), lattice
Explain the principle of least privilege as it relates to account policy.
Perform the specific duties associated with using an administrator/root account in a given computer system.
Select and implement user account management controls for a given scenario.
Implement secure password and account policies in an operating system.
Perform basic system audits and analyze log files in a given scenario.
Use the command/terminal line to configure security settings.
Perform basic system administration tasks in more than one operating system.
Differentiate among types of networking cable mediums and standards to determine which type to use in a given situation.
Examples: copper cabling, fiber optic
Compare and contrast notational systems, including binary, hexadecimal, decimal, and ASCII.
Identify and describe common TCP and UDP ports and services.
Examples: DNS, HTTP, SSH, TELNET, TLS, FTP, SMTP, IMAP, POP, DHCP, LDAP, NTP, SNMP, RDP, SCP, RTP
Classify IP addresses according to IPv4 and IPv6, private and public IP ranges, and special IPs.
Use subnetting to determine the number of hosts and/or subnets on a given network.
Differentiate between the OSI and TCP/IP models, layers, encapsulation, and decapsulation.
Use various network tools in computer operating systems environments.
Examples: ipconfig, ifconfig Ping, nslookup, tracert, netstat, iptables; Windows, Linux, Apple