CTE22.IT.LF.16
Improve Linux system processes based on analysis of problems within the system.
Improve Linux system processes based on analysis of problems within the system.
Improve Linux system processes based on analysis of problems within the system.
Troubleshoot user issues in a Linux operating system.
Examples: permissions, access, authentication, environment, shell issues
Evaluate and troubleshoot Linux application issues in given scenarios.
Example: SELinux context violations storage
Evaluate and troubleshoot Linux hardware issues in given scenarios.
Examples: memory, communications ports, storage
Create and apply suitable access, ownership, and authentication techniques for Linux systems in given scenarios.
Examples: privilege escalations, file, directory, and context-based permissions; pluggable authentication module (PAM), Secure Shell (SSH), teletypes (TTYs), pseudo terminal (PTYs), public-key infrastructure (PKI)
Configure logging services for a Linux environment in given scenarios.
Configure and apply Linux firewalls.
Examples: access control lists, IP forwarding, application firewall configurations
Compress, back up, and restore files in a Linux operating system.
Examples: archiving and restoring utilities, backup types, integrity checks
Evaluate and implement security best practices in a Linux environment.
Examples: boot security, password-less login, disabling and uninstalling services and features
Implement primary Bash scripts in a Linux environment.
Examples: looping constructs, conditional statements, shell expansions, exit codes
Use Git execute version control in given scenarios in a Linux environment.
Explain the concepts and processes related to orchestration in Linux.
Examples: agent vs. agentless, infrastructure automation, automated configuration management
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
Compare and contrast the functions and applications of common physical and logical network topologies.
Examples: mesh, bus, ring, star, hybrid
Differentiate among common network infrastructures.
Examples: LAN, WAN, WLAN, PAN, MAN, CAN, SAN, SDWAN
Identify and formulate binary, decimal, and hexadecimal numbers.
Compare and contrast the layers of the Open Systems Interconnect (OSI) model and the Transport Control Protocol/Internet Protocol (TCP/IP) model.
Illustrate encapsulation and decapsulation within layers of a standard network model.
Examples: Ethernet header, Internet protocol (IP) header, transmission control protocol (TCP) header, user datagram protocol (UDP) header, maximum transmission unit (MTU)
Compare and contrast the services and applications used to perform basic network operations.
Differentiate among network categories, technologies, and topologies.
Explain the purpose of routing and switching and their associated technologies and protocols.
Examples: dynamic routing, bandwidth management, virtual local area network (VLAN), spanning tree protocol
Summarize the purpose of common TCP/IP protocols.
Differentiate between public and private IP addressing schemes.
Compare and contrast IPv4 and IPv6 addressing features, methods, and characteristics.
Examples: APIPA, EUI-64, multicast, unicast, anycast, broadcast, link local, loopback, default gateway
Categorize classful addresses according to specific network use.
Interpret classless inter-domain routing (CIDR) notation (subnetting).
Explain the functions and applications of common networking devices.
Examples: router, bridge, switch, hub, firewall, access point, content filter, modem
Compare and contrast common local area network (LAN) and wide area network (WAN) connection types.
Examples: copper twisted pair, coaxial, fiber-optic, wireless, synchronous optical network (SONET)
Identify common network connectors.
Examples: RJ-45, LC, SC, ST, MT-RJ, F-type