CTE22.IT.C1.21
Perform an install of an operating system in a virtual environment.
Perform an install of an operating system in a virtual environment.
Perform an install of an operating system in a virtual environment.
Apply the parts of the CIA triad (confidentiality, integrity, and availability) to a given security scenario.
Describe various types of physical security controls and explain their importance.
Analyze attributes of various types of malware and other attacks to determine the key characteristics of each type.
Examples: virus, worm, brute force, backdoor, spyware, remote access tool (RAT)
Describe various types of social engineering.
Describe various types of application attacks and threats.
Examples: cross-site scripting, SQL injection, buffer overflow
Analyze types of network attacks.
Examples: man in the middle, layer 2 attacks, denial of service, DNS poisoning
Identify and analyze wireless network threats.
Examples: evil twin, bluesnarfing, jamming, disassociation
Describe different types of threat actors and threat vectors.
Examples: APT’s; black hat, white hat, and gray hat hackers; supply chain; social media
Predict security concerns and possible vulnerabilities associated with system hardening.
Examples: weak configurations, open ports and services, third-party risks
Describe the techniques used in security assessments.
Examples: threat hunting, vulnerability scans, security information and event management (SIEM)
Explain basic cryptographic concepts.
Examples: historic ciphers, symmetric, asymmetric, hashing, quantum computing uses
Describe the purpose and scope of a cybersecurity disaster recovery plan for a given simulated or actual work environment.
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
Identify and integrate secure protocols and services in a given scenario.
Examples: SSH, tunnel and transport, IMAP, S/MIME, SFTP, FTPS
Differentiate among firewall technologies.
Examples: stateful vs. stateless, web application firewall
Illustrate secure network designs, creating diagrams by hand or with networking software.
Examples: load balancing, network segmentation, virtual private network, network based intrusion systems
Configure wireless security settings.
Examples: WPA3, SAE, PEAP, RADIUS, site surveys, WAP, WPS, IEEE 802.1x
Apply secure mobile solutions in a given environment.
Examples: NFC, mobile application management (MAM), BYOD, rooting, jailbreaking, sideloading
Describe the value of implementing security concepts in an enterprise environment.
Examples: configuration and baseline management, IP schema, data loss prevention, honeypots
Identify and explain equalization and cloud computing concepts.
Examples: platform as a service (PaaS), software-defined networking visibility (SDN), virtual machine (VM)
Compare and contrast cloud security controls.
Examples: cloud native controls vs. third-party solutions, virtual networks
Compare and contrast secure application development, deployment, and automation concepts.
Examples: server-side vs. client-side execution and validation, automation/scripting
Summarize types of authentication protocols and authorization design concepts used in network security.
Examples: Kerberos, attribute-based access control (ABAC)
Explain the security vulnerabilities and constraints of embedded and specialized systems.
Examples: system control and data acquisition (SCADA), industrial control system (ICS), Internet of Things (IoT), inability to patch
Explain penetration testing techniques and exercise types.
Examples: white box, black box, red team, blue team
Explain the importance of having policies, processes, and procedures for carrying out incident response plans.
Examples: attack frameworks, cyber kill chain, incident response process
Compare and contrast symmetric and asymmetric algorithms and their security uses.
Describe the primary components of public key infrastructure and explain why these structures are critical to organizations.
Examples: Pretty Good Privacy (PGP), establishing confidentiality in email