K-12 Computer Science Standards

Nevada Cybersecurity 3

66 Standards

1

6.1.1

Categorize Ethernet wired network adapter components, features, and connectors

2

6.1.2

Categorize Ethernet wireless access point components, features, connectors, and cables

3

6.1.3

Describe common network connectivity devices and their roles

4

6.1.4

Analyze properties of basic network protocols

5

6.1.5

Apply appropriate networking utilities to view, test, and troubleshoot basic network configuration, topology, communicant, and connectivity problems

6

6.2.1

Deploy best practices to secure any device accessing a network

7

6.2.2

Compare and contrast physical security controls

8

6.2.3

Compare and contrast risk related concepts

9

6.2.4

Implement network hardening techniques

10

6.2.5

Configure a basic firewall

11

6.2.6

Explain the purpose of various network access control models

12

6.2.7

Secure SOHO wired and wireless networks

13

6.2.8

Identify common network vulnerabilities, threats, and risks

14

6.2.9

Analyze and implement security settings on figure BIOS/UEFI security settings

15

6.3.1

Implement various networking troubleshooting methodology

16

6.3.2

Analyze and interpret the output of troubleshooting tools

17

6.3.3

Troubleshoot and resolve common wireless issues

18

6.3.4

Troubleshoot and resolve common copper and fiber cable issues

19

6.3.5

Troubleshoot and resolve common network issues

20

6.3.6

Troubleshoot and resolve common security issues

21

6.3.7

Troubleshoot and resolve common WAN issues

22

6.4.1

Explain the functions and application of various network devices

23

6.4.2

Compare the use of networking services and applications

24

6.4.3

Install and configure networking services and applications

25

6.4.4

Explain the characteristics and benefits of various WAN technologies

26

6.4.5

Install and terminate various cable types and connectors using appropriate tools

27

6.4.6

Differentiate between network infrastructure implementations

28

6.4.7

Implement and configure the appropriate addressing schema

29

6.4.8

Explain the basics of routing

30

6.4.9

Describe the elements of unified communications technologies

31

7.1.1

Describe use of packet tracing tools and network analyzing tools

32

7.1.2

Demonstrate use of network monitoring tools

33

7.1.3

Demonstrate use of port and vulnerability scanning tools

34

7.1.4

Describe the use of SMTP monitoring software

35

7.1.5

Demonstrate understanding of security information and event management (SIEM) tools

36

7.1.6

Demonstrate use of environmental monitoring tools

37

7.1.7

Operate power monitoring tools

38

7.1.8

Demonstrate use of wireless survey tools

39

7.2.1

Analyze SYSLOG data

40

7.2.2

Demonstrate use of log management

41

7.2.3

Apply interface monitoring tools

42

7.2.4

Evaluate system performance metrics against baseline data

43

7.2.5

Evaluate system metrics and logs for resource depletion

44

7.2.6

Evaluate system metrics and logs for network connectivity

45

7.3.1

Prepare archives/backups

46

7.3.2

Build system baseline based on normal operations

47

7.3.3

Describe provisioning and de-provisioning of mobile devices (enterprise, BYOD)

48

7.3.4

Illustrate network access control (NAC)

49

7.3.5

Document a configuration management strategy

50

7.4.1

Compare and contrast protecting SCADA systems and industrial control systems (ICS)

51

7.4.2

Determine a plan to protect legacy systems

52

7.4.3

Explain how to separate private/public networks

53

7.4.4

Describe theft detection technologies (honeypot/honeynet)

54

7.4.5

Research the need for a testing lab (development ops/DevOps)

55

7.4.6

Determine a plan for load balancing the network

56

7.4.7

Creating a plan for performance optimization (tuning)

57

7.5.1

Install software and hardware patches and updates (OS, critical, non-critical, etc.)

58

7.5.2

Compare and contrast firmware and driver updates

59

7.5.3

Recognize the difference between feature releases/security updates

60

7.5.4

Develop rollout/rollback procedures

61

7.6.1

Setup, configure, and secure a VLAN

62

7.6.2

Configure a Spanning Tree Protocol (STP) (IEEE 802.1D) ensuring you do not create any loops

63

7.6.3

Setup an Ethernet Interface via the interface configuration file including demonstrating how to give your network card an IP address (DHCP), set up routing information, configure IP masquerading, and set default routes

64

7.6.4

Setup and configure a default gateway defining where to send packets for IP addresses for which they can determine no specific route

65

7.6.5

Describe and demonstrate several common techniques for transmitting power over Ethernet cabling (PoE and PoE+ 802.3af, 802.3at)

66

7.6.6

Compare and contrast managed vs. unmanaged switches

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program