# CTE Resource Center - Verso - Cybersecurity Network Systems Task/Competency List

CTE Resource Center - Verso

Virginia’s CTE Resource Center

The 2019 edition of this course is still available. Click here.

2020/2021 Competency-Based Task/Competency List for Cybersecurity Network Systems (8630/36 weeks)

Tasks/competencies bordered in blue are considered optional when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.

Expand all

Ajax loader

Demonstrating Personal Qualities and Abilities

  1. Demonstrate creativity and innovation.
  2. Demonstrate critical thinking and problem solving.
  3. Demonstrate initiative and self-direction.
  4. Demonstrate integrity.
  5. Demonstrate work ethic.

Demonstrating Interpersonal Skills

  1. Demonstrate conflict-resolution skills.
  2. Demonstrate listening and speaking skills.
  3. Demonstrate respect for diversity.
  4. Demonstrate customer service skills.
  5. Collaborate with team members.

Demonstrating Professional Competencies

  1. Demonstrate big-picture thinking.
  2. Demonstrate career- and life-management skills.
  3. Demonstrate continuous learning and adaptability.
  4. Manage time and resources.
  5. Demonstrate information-literacy skills.
  6. Demonstrate an understanding of information security.
  7. Maintain working knowledge of current information-technology (IT) systems.
  8. Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
  9. Apply mathematical skills to job-specific tasks.
  10. Demonstrate professionalism.
  11. Demonstrate reading and writing skills.
  12. Demonstrate workplace safety.

Examining All Aspects of an Industry

  1. Examine aspects of planning within an industry/organization.
  2. Examine aspects of management within an industry/organization.
  3. Examine aspects of financial responsibility within an industry/organization.
  4. Examine technical and production skills required of workers within an industry/organization.
  5. Examine principles of technology that underlie an industry/organization.
  6. Examine labor issues related to an industry/organization.
  7. Examine community issues related to an industry/organization.
  8. Examine health, safety, and environmental issues related to an industry/organization.

Addressing Elements of Student Life

  1. Identify the purposes and goals of the student organization.
  2. Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
  3. Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
  4. Identify Internet safety issues and procedures for complying with acceptable use standards.

Exploring Work-Based Learning

  1. Identify the types of work-based learning (WBL) opportunities.
  2. Reflect on lessons learned during the WBL experience.
  3. Explore career opportunities related to the WBL experience.
  4. Participate in a WBL experience, when appropriate.

Understanding Threats, Attacks, and Vulnerabilities

  1. Compare types of attacks.
  2. Explain threat actor types and attributes.
  3. Explain vulnerability scanning concepts.
  4. Research ethical and legal issues related to penetration testing.
  5. Explain penetration (pen) testing concepts.
  6. Analyze indicators of compromise for the purpose of determining the type of malware in a given scenario.

Exploring Technologies and Tools

  1. Explore network infrastructure hardware and software-based components that support organizational security.
  2. Explore host hardware- and software-based components that support organizational security.
  3. Assess the network security posture of an organization in a given scenario.
  4. Assess the host security posture of an organization in a given scenario.
  5. Assess the data security posture of an organization in a given scenario.
  6. Troubleshoot common security issues in a given scenario.
  7. Evaluate the output from security technologies.
  8. Describe mobile connection methods and deployment models.
  9. Discuss device management and enforcement concepts.
  10. Explain secure protocols and their use cases.

Examining Architecture and Design

  1. Describe frameworks, best practices, and secure configuration guides and their purposes.
  2. Implement secure network architecture concepts.
  3. Implement secure systems design.
  4. Explain the importance of secure staging deployment concepts.
  5. Explain the security implications of embedded systems.
  6. Summarize secure application development and deployment concepts.
  7. Examine cloud computing concepts.
  8. Outline virtualization concepts.
  9. Explain how resiliency and automation strategies reduce risk.
  10. Explain the importance of physical security controls.

Analyzing Identity and Access Management

  1. Compare identity and access management concepts.
  2. Install identity and access services.
  3. Implement identity and access management controls.
  4. Differentiate common account management practices.

Demonstrating Risk Management

  1. Explain the importance of policies, plans, and procedures related to organizational security.
  2. Summarize business impact analysis concepts.
  3. Explain risk management processes and concepts.
  4. Describe appropriate incident response procedures.
  5. Summarize basic concepts of forensics.
  6. Explain disaster recovery and continuity of operation concepts.
  7. Compare various types of controls.
  8. Execute data security and privacy practices.

Examining Cryptography and Public Key Infrastructure (PKI)

  1. Identify the states of the data that needs to be secured.
  2. Explain the three main forms of cryptography.
  3. Identify basic concepts of cryptography.
  4. Explain common use cases for cryptography.
  5. Explain algorithms and their basic characteristics in cryptography.
  6. Configure wireless security settings in a given scenario.
  7. Implement public key infrastructure in a given scenario.
  8. Research legal issues in the use of cryptography.

Understanding Ethical and Legal Considerations in Cybersecurity

  1. Summarize the code of ethics by various standards for cybersecurity/computing professionals.
  2. Identify laws related to intellectual property.
  3. Summarize the acceptable use policy (AUP) for your school.
  4. Differentiate between ethics and laws.
  5. Distinguish among types of ethical concerns.
  6. Identify laws applicable to cybersecurity.