Standards - Career & Technical Education

Course: Cybersecurity III

CTE22.IT.C3.21

Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.

COS Examples

Examples: malware, unpatched security vulnerabilities, hidden backdoor programs, superuser or Admin Account privileges

Course: Cybersecurity III

CTE22.IT.C3.22

Analyze real-time data and apply security solutions for infrastructure management in real-world scenarios.

COS Examples

Examples: cloud versus on-premises, asset management, segmentation, network architecture, change management, virtualization, containerization, identity and access management, honeypot, certificate management, monitoring and logging, active best practices defense, encryption

Course: Cybersecurity III

CTE22.IT.C3.23

Research and detail the use of current cybersecurity frameworks, policies, procedures, and controls.

COS Examples

Examples: code of conduct, acceptable use policy, password policy, data ownership and retention, account management, continuous monitoring, work product retention, control types

Course: Cybersecurity III

CTE22.IT.C3.24

Apply security concepts that mitigate organization-specific risk and explain their effectiveness.

COS Examples

Examples: business impact analysis, risk identification process, risk calculation, communication of risk factors, risk prioritization, systems assessment, documented compensating controls, training and exercises, supply chain assessment

Course: Cybersecurity III

CTE22.IT.C3.25

Compare and contrast hardware and software quality assurance practices and determine their effectiveness in a given scenario.

COS Examples

Examples: software development life cycle, DevSecOps, software assessment methods (user acceptance testing, stress test application, security regression testing, code review), secure coding best practices, static and dynamic analysis tools, hardware root of trust, trusted firmware updates

Course: Cybersecurity III

CTE22.IT.C3.26

Analyze data as part of security monitoring activities.

COS Examples

Examples: heuristics, trend analysis, endpoint, network, log review, impact analysis, security information and event management (SIEM) review, query writing, e-mail analysis, Sender Policy Framework, digital signature, embedded links

Course: Cybersecurity III

CTE22.IT.C3.28

Compare and contrast automation concepts and technologies.

COS Examples

Examples: workflow orchestration, scripting, application programming interface integration, automated signature creation, data enrichment, threat feed combination, machine learning and artificial intelligence, automation protocols and standards, continuous integration

Course: Cybersecurity III

CTE22.IT.C3.29

Justify the importance of data privacy and protection in the context of privacy versus security, non-technical controls, and technical controls in a given scenario.

COS Examples

Examples: classification, ownership, retention, data types, retention standards, confidentiality, legal requirements, data sovereignty, data minimization, purpose limitation, non-disclosure agreement, encryption, data loss prevention, data masking, de-identification, tokenization, watermarking and digital rights management, geographic access requirements, access controls

Course: Cybersecurity III

CTE22.IT.C3.31

Perform passive and active reconnaissance and analyze the results.

COS Examples

Examples: DNS lookups, identify technical and administrator contacts, cloud versus self-hosted, social media scraping, cryptographic flaws, company reputation and security posture, enumeration, website reconnaissance, packet crafting, defense detection, tokens, wardriving, network traffic, cloud asset discovery, detection avoidance, third-party hosted services

Course: Cybersecurity III

CTE22.IT.C3.31a

Use empirical data and evidence strategically to perform vulnerability scanning, social engineering and physical attacks, and post-exploitation techniques.

COS Examples

Examples: considerations and limitations of vulnerability scanning, scan identified targets for vulnerabilities, set scan settings to avoid detection, multiple scanning methods, Nmap, pretexting for social engineering or physical attacks, impersonation techniques, social engineering tools, methods of influence, post-exploitation tools, Pass the Hash, network segmentation testing, horizontal and vertical privilege escalation

Course: Cybersecurity III

CTE22.IT.C3.32

Outline the key components of written reports regarding the procedures and results of penetration testing, and explain the importance of maintaining transparent communication during the entire penetration testing process.

COS Examples

Examples: report audience, report contents, length of storage time for report, secure distribution, note-taking and ongoing documentation during testing including screenshots, common themes, root causes, communication path and associated triggers, reasons for communication, goal reprioritization, presentation of findings

Refine Your Results

  • 11645 results found

CTE Course(s)

ALSDE LOGO