K-12 Computer Science Standards

Nevada Cybersecurity

230 Standards

1

1.1.1

Demonstrate the proper use of safety devices

2

1.1.2

Research the environmental impact of production

3

1.1.3

Research local, state, and federal regulations related to material handling

4

1.1.4

Demonstrate secure disposal of technology materials

5

1.1.5

Describe Material Safety Data Sheets (MSDS)

6

1.1.6

Explain the relationship between organization and safety

7

1.1.7

Demonstrate an organized work environment

8

1.1.8

Demonstrate electrical safety (e.g., grounding, ESD (static), etc.)

9

1.1.9

Apply installation safety (e.g., lifting, overhead movements, etc.)

10

1.1.10

Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems)

11

1.2.1

Explain common tools used in computer repair

12

1.2.2

Demonstrate the use of common networking and repair tools

13

1.2.3

Select the proper tool for diagnostic and troubleshooting procedures

14

1.2.4

Compare and contrast fire suppression systems in IT environments

15

1.2.5

Describe the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems for IT systems

16

2.1.1

Analyze legal issues in technology

17

2.1.2

Evaluate intellectual property laws

18

2.1.3

Explain differences between licensing, copyright, and infringement

19

2.1.4

Explain the differences between restricted content, prohibited or illegal content

20

2.1.5

Examine state, federal, and international regulations related to technology (e.g.; legal holds, disposal methods, data retention, discoverability, data protection, etc.)

21

2.2.1

Analyze acceptable use policies

22

2.2.2

Explain the difference between technology policies, privacy standards, and best practices

23

2.2.3

Explain data and privacy encryption issues related to using technology

24

2.2.4

Evaluate appropriate consent policies to monitoring various stakeholders

25

2.2.5

Explain appropriate data classification

26

2.3.1

Communicate with customers to ensure understanding of customer requirements, scope, and concerns

27

2.3.2

Utilize appropriate documentation systems

28

2.3.3

Explain the purpose of business agreements (i.e., memos of understanding, service level agreement, statement of work, master services agreement)

29

3.1.1

Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, CPU features, memory module attributes, and expansion business types)

30

3.1.2

Use industry standard vocabulary to identify components

31

3.2.1

Select and install appropriate system unit components to meet customer specifications

32

3.2.2

Interpret BIOS/UEFI settings for basic hardware components

33

3.2.3

Configure the settings of basic hardware components

34

3.2.4

Troubleshoot basic hardware components and resolve issues

35

3.3.1

Categorize audio and video device components, connectors, and cables

36

3.3.2

Install appropriate sound and video cards to match specifications and end-user requirements

37

3.3.3

Configure display and video settings

38

3.3.4

Manage sound card and audio device settings

39

3.4.1

Identify external device components, connectors, and cables

40

3.4.2

Connect external devices using the appropriate connectors and cables

41

3.4.3

Manage device driver updates and roll back drivers

42

3.4.4

Enable or disable devices

43

3.4.5

Install drivers for external devices

44

3.4.6

Prepare devices for safe removal

45

3.4.7

Manipulate system utilities to configure storage and external devices

46

3.5.1

Install SOHO multifunction device / printers and configure appropriate settings

47

3.5.2

Compare and contrast differences between the various print technologies and the associated imaging process

48

3.5.3

Perform appropriate printer maintenance

49

4.1.1

Use industry standard vocabulary in relation to operating systems (OS)

50

4.1.2

Compare and contrast Microsoft Windows Operating Systems

51

4.1.3

Install and secure operating systems

52

4.1.4

Install and configure Windows networking

53

4.2.1

Explain various features and tools of operating systems

54

4.2.2

Apply appropriate command line tools

55

4.2.3

Select appropriate operating system features and tools based on customer requirements

56

4.2.4

Configure Windows Update Settings

57

4.2.5

Configure local users and groups for a Windows networking system

58

4.2.6

Configure User Access Control (UAC)

59

4.2.7

Use Windows Control Panel utilities

60

4.2.8

Perform common preventive maintenance procedures using the appropriate Windows OS tools

61

4.2.9

Troubleshoot common PC security issues using best practices

62

4.3.1

Explain key terms and acronyms used in diagnostic testing and troubleshooting

63

4.3.2

Identify common symptoms for a given discrepancy

64

4.3.3

Develop a solution for a given discrepancy

65

4.3.4

Document the solution

66

4.4.1

Identify common features and functionality of the Mac OS and Linux operating systems

67

4.4.2

Set up and use client-side virtualization

68

4.4.3

Identify basic cloud concepts

69

4.4.4

Summarize the properties and purpose of services provided by networked hosts

70

4.4.5

Identify basic features of mobile operating systems

71

4.4.6

Install and configure basic mobile device network connectivity and email

72

4.4.7

Summarize methods and data related to mobile device synchronization

73

4.4.8

Compare and contrast methods to secure mobile devices

74

4.4.9

Explain the characteristics of various types of other mobile devices

75

4.4.10

Compare and contrast accessories, features, and ports of mobile and IoT devices

76

4.4.11

Troubleshoot common mobile OS and tablet software/hardware issues

77

4.5.1

Compare and contrast laptops, tablets, and computer form factors

78

4.5.2

Explain current trends in laptops and tablet applications

79

4.5.3

Compare laptop and tablet operating systems

80

4.5.4

Explain the function of components within the display of a laptop and tablet

81

4.5.5

Compare and contrast accessories, features, and ports of laptops and tablets

82

5.1.1

Describe the OSI model and relate to hardware in a network

83

5.1.2

Implement the appropriate industry policy and procedures

84

5.1.3

Compare and contrast the ports and protocols (HTTP, NetBIOS, SMTP, TCP, UDP, etc.)

85

5.1.4

Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.)

86

5.1.5

Utilize appropriate wired connections

87

5.1.6

Utilize appropriate wireless connections

88

5.2.1

Describe encapsulation/de-encapsulation

89

5.2.2

Explain modulation techniques

90

5.2.3

Apply numbering systems (e.g., binary, octal, hexadecimal)

91

5.2.4

Demonstrate addressing and subnetting techniques

92

5.2.5

Compare broadband/baseband

93

5.2.6

Compare and contrast bit rates vs. baud rates

94

5.2.7

Describe CDMA

95

5.2.8

Explain the difference between CSMA/CD-CSMA/CA

96

5.2.9

Describe wavelength

97

5.2.10

Apply TCP/IP suite (TCP, UDP, ICMP)

98

5.3.1

Compare Main (MDF) and intermediate distribution frame (IDF)

99

5.3.2

Implement a cable management solution

100

5.3.3

Analyze and create a power management plan (i.e., power converters, circuits, UPS {Power redundancy}, inverters, load capacity, etc.)

101

5.3.4

Determine proper airflow for optimal performance

102

5.3.5

Utilize correct rack systems for location and operation

103

5.3.6

Employ consistent labeling methodologies (port, system, circuit, patch panel)

104

5.3.7

Develop a plan to monitor rack security and environmental conditions

105

6.1.1

Categorize Ethernet wired network adapter components, features, and connectors

106

6.1.2

Categorize Ethernet wireless access point components, features, connectors, and cables

107

6.1.3

Describe common network connectivity devices and their roles

108

6.1.4

Analyze properties of basic network protocols

109

6.1.5

Apply appropriate networking utilities to view, test, and troubleshoot basic network configuration, topology, communicant, and connectivity problems

110

6.2.1

Deploy best practices to secure any device accessing a network

111

6.2.2

Compare and contrast physical security controls

112

6.2.3

Compare and contrast risk related concepts

113

6.2.4

Implement network hardening techniques

114

6.2.5

Configure a basic firewall

115

6.2.6

Explain the purpose of various network access control models

116

6.2.7

Secure SOHO wired and wireless networks

117

6.2.8

Identify common network vulnerabilities, threats, and risks

118

6.2.9

Analyze and implement security settings on figure BIOS/UEFI security settings

119

6.3.1

Implement various networking troubleshooting methodology

120

6.3.2

Analyze and interpret the output of troubleshooting tools

121

6.3.3

Troubleshoot and resolve common wireless issues

122

6.3.4

Troubleshoot and resolve common copper and fiber cable issues

123

6.3.5

Troubleshoot and resolve common network issues

124

6.3.6

Troubleshoot and resolve common security issues

125

6.3.7

Troubleshoot and resolve common WAN issues

126

6.4.1

Explain the functions and application of various network devices

127

6.4.2

Compare the use of networking services and applications

128

6.4.3

Install and configure networking services and applications

129

6.4.4

Explain the characteristics and benefits of various WAN technologies

130

6.4.5

Install and terminate various cable types and connectors using appropriate tools

131

6.4.6

Differentiate between network infrastructure implementations

132

6.4.7

Implement and configure the appropriate addressing schema

133

6.4.8

Explain the basics of routing

134

6.4.9

Describe the elements of unified communications technologies

135

7.1.1

Describe use of packet tracing tools and network analyzing tools

136

7.1.2

Demonstrate use of network monitoring tools

137

7.1.3

Demonstrate use of port and vulnerability scanning tools

138

7.1.4

Describe the use of SMTP monitoring software

139

7.1.5

Demonstrate understanding of security information and event management (SIEM) tools

140

7.1.6

Demonstrate use of environmental monitoring tools

141

7.1.7

Operate power monitoring tools

142

7.1.8

Demonstrate use of wireless survey tools

143

7.2.1

Analyze SYSLOG data

144

7.2.2

Demonstrate use of log management

145

7.2.3

Apply interface monitoring tools

146

7.2.4

Evaluate system performance metrics against baseline data

147

7.2.5

Evaluate system metrics and logs for resource depletion

148

7.2.6

Evaluate system metrics and logs for network connectivity

149

7.3.1

Prepare archives/backups

150

7.3.2

Build system baseline based on normal operations

151

7.3.3

Describe provisioning and de-provisioning of mobile devices (enterprise, BYOD)

152

7.3.4

Illustrate network access control (NAC)

153

7.3.5

Document a configuration management strategy

154

7.4.1

Compare and contrast protecting SCADA systems and industrial control systems (ICS)

155

7.4.2

Determine a plan to protect legacy systems

156

7.4.3

Explain how to separate private/public networks

157

7.4.4

Describe theft detection technologies (honeypot/honeynet)

158

7.4.5

Research the need for a testing lab (development ops/DevOps)

159

7.4.6

Determine a plan for load balancing the network

160

7.4.7

Creating a plan for performance optimization (tuning)

161

7.5.1

Install software and hardware patches and updates (OS, critical, non-critical, etc.)

162

7.5.2

Compare and contrast firmware and driver updates

163

7.5.3

Recognize the difference between feature releases/security updates

164

7.5.4

Develop rollout/rollback procedures

165

7.6.1

Setup, configure, and secure a VLAN

166

7.6.2

Configure a Spanning Tree Protocol (STP) (IEEE 802.1D) ensuring you do not create any loops

167

7.6.3

Setup an Ethernet Interface via the interface configuration file including demonstrating how to give your network card an IP address (DHCP), set up routing information, configure IP masquerading, and set default routes

168

7.6.4

Setup and configure a default gateway defining where to send packets for IP addresses for which they can determine no specific route

169

7.6.5

Describe and demonstrate several common techniques for transmitting power over Ethernet cabling (PoE and PoE+ 802.3af, 802.3at)

170

7.6.6

Compare and contrast managed vs. unmanaged switches

171

8.1.1

Describe the steps of the cybersecurity lifecycle (e.g., people, process and tools)

172

8.1.2

Write a set of principles, rules, and practices to provide guidance and direction

173

8.1.3

Follow appropriate decision-making model to determine correct response procedures

174

8.2.1

Plan, prepare, and develop scope for a Cyber Incident Response Plan

175

8.2.2

Determine correct detection, mitigation, and reporting processes

176

8.2.3

Evaluate assessment and decision-making steps when handling an incident or event

177

8.2.4

Determine correct investigative procedures

178

8.2.5

Gather intelligence from a variety of sources including open source and others

179

8.2.6

Document intelligence gathering efforts including who, what, when, where, why, and how

180

8.2.7

Determine extent of event or incident scope including severity

181

8.2.8

Determine correct containment steps based on the type of incident or event encountered

182

8.2.9

Implement the correct eradication response and processes

183

8.2.10

Determine next steps post investigation (post breach) from legal, HR, news media response

184

8.3.1

Determine the appropriate security control, technique or process based on the property, system or data you are protecting

185

8.3.2

Explain the importance of security controls, techniques, and threat risk assessments

186

8.3.3

Select the appropriate solution to eliminate vulnerabilities and establish a security baseline

187

8.3.4

Develop plans to protect a variety of property, systems, or data

188

8.3.5

Implement the appropriate controls to ensure security of property, systems, or data

189

8.3.6

Compare and contrast alternative methods to mitigate security risks for data in transit and data at rest

190

8.4.1

Describe the digital chain of custody process for tracking data and equipment (legal evidence)

191

8.4.2

Describe all steps to capture and maintain evidence

192

8.4.3

Follow chain of custody procedures

193

8.4.4

Maintain detailed records (e.g., chain of custody forms, evidence collection forms, etc.)

194

8.4.5

Track digital evidence (e.g., how it has been gathered, tracked, and protected)

195

8.4.6

Describe a chain of custody

196

8.4.7

Develop a plan for data transport, encryption to avoid alteration of data and legal holds

197

8.4.8

Develop a plan for recovery, disposal of evidence, and follow up

198

8.4.9

Write a forensics summary report

199

9.1.1

Summarize basic forensic concepts and practices including eDiscovery, documentation, chain of custody, and data transport

200

9.1.2

Determine a first responder’s logical approach during an investigation with objective, evidence-based research

201

9.1.3

Review the First Responder steps and processes for proper documentation

202

9.1.4

Explain what eDiscovery is including the contextual process for electronic evidence collection (Electronically Stored Information ESI)

203

9.1.5

Observe and discuss legal restrictions, stipulations, regulatory compliance, and confidentiality when gathering evidence

204

9.1.6

Summarize Chain of Custody processes during investigations

205

9.2.1

Explain the proper use of penetration testing versus vulnerability scanning

206

9.2.2

Explain the many types of vulnerabilities, exploits, and cyber threats a First Responder encounters

207

9.2.3

Discover the common types of cyber threat actors including Cybercriminals, Attention-Seekers, Hacktivists, Jihadi Hackers, and Nation States

208

9.2.4

Explain and summarize the common cybersecurity attacks including the preferred tactics, techniques, and procedures (TTPS) of threat actors

209

9.2.5

Examine and summarize the targets of cyber threat actors including governments, military agencies, non-profits, and businesses across sectors including retail, legal, energy, healthcare, technology, entertainment, and telecommunications

210

9.2.6

Review and examine geopolitical flashpoints (e.g., U.S.-China Relations, Iranian Nuclear Accord, Economic Sanctions on Russia, Syrian Conflict, ISIS-related Activity, North Korean Policy, StateSponsored Cyber Activity, Cybersecurity Regulations)

211

9.3.1

Describe and demonstrate various methods and tools for threat detection and eDiscovery

212

9.3.2

Describe and demonstrate vulnerability management methods, practices, and scanning tools

213

9.3.3

Describe and demonstrate various practices, methods, and tools for penetration testing

214

9.3.4

Identify encryption methods and demonstrate tools to decipher encrypted data

215

9.3.5

Review basic cryptography concepts, methods, and its relationship to forensics

216

9.3.6

Identify Web application exploits, vulnerabilities

217

9.3.7

Describe and demonstrate Web Application Security and Scanning methods and tools

218

9.3.8

Identify methods or tools to eliminate cloud exploits and vulnerabilities

219

9.3.9

Describe and demonstrate a working knowledge of phishing attacks and mitigation steps

220

9.4.1

Explain what malware is including its history

221

9.4.2

Review and define the most common malware terminologies

222

9.4.3

Describe the ways and methods malware is spread

223

9.4.4

Review the types of malware specifically examining viruses, worms, trojan horses, rootkits ransomware, keyloggers, and grayware attack

224

9.4.5

Choose one malware scenario and select the appropriate type of mitigation and deterrent techniques

225

9.4.6

Use appropriate tools and techniques to eliminate malware from spreading

226

10.1.1

Explain Artificial Intelligence (AI), potential applications, concerns, and opportunities in relation to security issues

227

10.1.2

Describe machine learning and potential applications, concerns, and opportunities

228

10.1.3

Explain the role of ethics as it relates to security and emerging technologies

229

10.2.1

Describe job skills needed for potential careers in new and emerging technologies

230

10.2.2

Explore potential uses for and industries that may use emerging technologies

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program