K-12 Computer Science Standards

Nevada Cybersecurity 1

109 Standards

1

1.1.1

Demonstrate the proper use of safety devices

2

1.1.2

Research the environmental impact of production

3

1.1.3

Research local, state, and federal regulations related to material handling

4

1.1.4

Demonstrate secure disposal of technology materials

5

1.1.5

Describe Material Safety Data Sheets (MSDS)

6

1.1.6

Explain the relationship between organization and safety

7

1.1.7

Demonstrate an organized work environment

8

1.1.8

Demonstrate electrical safety (e.g., grounding, ESD (static), etc.)

9

1.1.9

Apply installation safety (e.g., lifting, overhead movements, etc.)

10

1.1.10

Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems)

11

1.2.1

Explain common tools used in computer repair

12

1.2.2

Demonstrate the use of common networking and repair tools

13

1.2.3

Select the proper tool for diagnostic and troubleshooting procedures

14

1.2.4

Compare and contrast fire suppression systems in IT environments

15

1.2.5

Describe the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems for IT systems

16

2.1.1

Analyze legal issues in technology

17

2.1.2

Evaluate intellectual property laws

18

2.1.3

Explain differences between licensing, copyright, and infringement

19

2.1.4

Explain the differences between restricted content, prohibited or illegal content

20

2.1.5

Examine state, federal, and international regulations related to technology (e.g.; legal holds, disposal methods, data retention, discoverability, data protection, etc.)

21

2.2.1

Analyze acceptable use policies

22

2.2.2

Explain the difference between technology policies, privacy standards, and best practices

23

2.2.3

Explain data and privacy encryption issues related to using technology

24

2.2.4

Evaluate appropriate consent policies to monitoring various stakeholders

25

2.2.5

Explain appropriate data classification

26

2.3.1

Communicate with customers to ensure understanding of customer requirements, scope, and concerns

27

2.3.2

Utilize appropriate documentation systems

28

2.3.3

Explain the purpose of business agreements (i.e., memos of understanding, service level agreement, statement of work, master services agreement)

29

3.1.1

Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, CPU features, memory module attributes, and expansion business types)

30

3.1.2

Use industry standard vocabulary to identify components

31

3.2.1

Select and install appropriate system unit components to meet customer specifications

32

3.2.2

Interpret BIOS/UEFI settings for basic hardware components

33

3.2.3

Configure the settings of basic hardware components

34

3.2.4

Troubleshoot basic hardware components and resolve issues

35

3.3.1

Categorize audio and video device components, connectors, and cables

36

3.3.2

Install appropriate sound and video cards to match specifications and end-user requirements

37

3.3.3

Configure display and video settings

38

3.3.4

Manage sound card and audio device settings

39

3.4.1

Identify external device components, connectors, and cables

40

3.4.2

Connect external devices using the appropriate connectors and cables

41

3.4.3

Manage device driver updates and roll back drivers

42

3.4.4

Enable or disable devices

43

3.4.5

Install drivers for external devices

44

3.4.6

Prepare devices for safe removal

45

3.4.7

Manipulate system utilities to configure storage and external devices

46

3.5.1

Install SOHO multifunction device / printers and configure appropriate settings

47

3.5.2

Compare and contrast differences between the various print technologies and the associated imaging process

48

3.5.3

Perform appropriate printer maintenance

49

4.1.1

Use industry standard vocabulary in relation to operating systems (OS)

50

4.1.2

Compare and contrast Microsoft Windows Operating Systems

51

4.1.3

Install and secure operating systems

52

4.1.4

Install and configure Windows networking

53

4.2.1

Explain various features and tools of operating systems

54

4.2.2

Apply appropriate command line tools

55

4.2.3

Select appropriate operating system features and tools based on customer requirements

56

4.2.4

Configure Windows Update Settings

57

4.2.5

Configure local users and groups for a Windows networking system

58

4.2.6

Configure User Access Control (UAC)

59

4.2.7

Use Windows Control Panel utilities

60

4.2.8

Perform common preventive maintenance procedures using the appropriate Windows OS tools

61

4.2.9

Troubleshoot common PC security issues using best practices

62

4.3.1

Explain key terms and acronyms used in diagnostic testing and troubleshooting

63

4.3.2

Identify common symptoms for a given discrepancy

64

4.3.3

Develop a solution for a given discrepancy

65

4.3.4

Document the solution

66

4.4.1

Identify common features and functionality of the Mac OS and Linux operating systems

67

4.4.2

Set up and use client-side virtualization

68

4.4.3

Identify basic cloud concepts

69

4.4.4

Summarize the properties and purpose of services provided by networked hosts

70

4.4.5

Identify basic features of mobile operating systems

71

4.4.6

Install and configure basic mobile device network connectivity and email

72

4.4.7

Summarize methods and data related to mobile device synchronization

73

4.4.8

Compare and contrast methods to secure mobile devices

74

4.4.9

Explain the characteristics of various types of other mobile devices

75

4.4.10

Compare and contrast accessories, features, and ports of mobile and IoT devices

76

4.4.11

Troubleshoot common mobile OS and tablet software/hardware issues

77

4.5.1

Compare and contrast laptops, tablets, and computer form factors

78

4.5.2

Explain current trends in laptops and tablet applications

79

4.5.3

Compare laptop and tablet operating systems

80

4.5.4

Explain the function of components within the display of a laptop and tablet

81

4.5.5

Compare and contrast accessories, features, and ports of laptops and tablets

82

5.1.1

Describe the OSI model and relate to hardware in a network

83

5.1.2

Implement the appropriate industry policy and procedures

84

5.1.3

Compare and contrast the ports and protocols (HTTP, NetBIOS, SMTP, TCP, UDP, etc.)

85

5.1.4

Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.)

86

5.1.5

Utilize appropriate wired connections

87

5.1.6

Utilize appropriate wireless connections

88

5.2.1

Describe encapsulation/de-encapsulation

89

5.2.2

Explain modulation techniques

90

5.2.3

Apply numbering systems (e.g., binary, octal, hexadecimal)

91

5.2.4

Demonstrate addressing and subnetting techniques

92

5.2.5

Compare broadband/baseband

93

5.2.6

Compare and contrast bit rates vs. baud rates

94

5.2.7

Describe CDMA

95

5.2.8

Explain the difference between CSMA/CD-CSMA/CA

96

5.2.9

Describe wavelength

97

5.2.10

Apply TCP/IP suite (TCP, UDP, ICMP)

98

5.3.1

Compare Main (MDF) and intermediate distribution frame (IDF)

99

5.3.2

Implement a cable management solution

100

5.3.3

Analyze and create a power management plan (i.e., power converters, circuits, UPS {Power redundancy}, inverters, load capacity, etc.)

101

5.3.4

Determine proper airflow for optimal performance

102

5.3.5

Utilize correct rack systems for location and operation

103

5.3.6

Employ consistent labeling methodologies (port, system, circuit, patch panel)

104

5.3.7

Develop a plan to monitor rack security and environmental conditions

105

6.3.3

Troubleshoot and resolve common wireless issues

106

6.3.4

Troubleshoot and resolve common copper and fiber cable issues

107

6.3.5

Troubleshoot and resolve common network issues

108

6.3.6

Troubleshoot and resolve common security issues

109

6.3.7

Troubleshoot and resolve common WAN issues

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program