K-12 Computer Science Standards

Arizona Network Security

89 Standards

1

1.1

Explain network security (e.g., the protection of data that is stored on the network or which is in transit across, into, and out of the network)

2

1.2

Describe the responsibilities of a network security technician (i.e., ensure the network works securely, test and configure software, provide IT support, troubleshoot the network or server, resolve infrastructure issues, etc.)

3

1.3

Identify skills and ethical characteristics needed to be a successful network security technician (i.e., critical thinking, problem solving, prioritizing, reading, and interpreting network diagrams and technical schematics, preparing and presenting technical information verbally and in writing to different audiences, keeping up to date on network security, etc.)

4

1.4

Describe education and training opportunities including industry certifications and licensures (i.e., CompTIA, CISCO, CISSP, CEH, etc.)

5

1.5

Identify career opportunities in network security

6

2.1

Identify hazards and unsafe practices that can lead to serious accidents or injuries (i.e., electrostatic discharge hazards, poor ergonomic practices, etc.)

7

2.2

Describe OSHA and other state and national regulations designed to reduce safety risks and workplace injuries

8

2.3

Explain environmental considerations when disposing of computer/network components (i.e., disposing of batteries, devices with lithium batteries, etc.)

9

2.4

Use techniques to manage power consumption in the networked environment (i.e., test wattage usage, power control, explore green methods such as climate batteries and energy efficiency methods, cloud-based software, etc.)

10

2.5

Identify energy efficiencies and suggest ways to improve consumption (i.e., office environment AC units, thermostats, computer power settings, etc.)

11

2.6

Use, maintain, and store tools and equipment according to manufacturer’s standards

12

3.1

Define the number base systems in mathematics related to network technology

13

3.2

Perform decimal to binary and binary to decimal conversions (e.g., dotted decimal IPv4)

14

3.3

Perform decimal to hexadecimal and hexadecimal to decimal conversions

15

3.4

Perform hexadecimal to binary and binary to hexadecimal conversions

16

3.5

Determine the appropriate method to perform conversions (e.g., paper-pencil and electronic resources)

17

3.6

Use basic Boolean logic for actions such as Google searches and scripting (e.g., and, not, and or)

18

4.1

Define a computer and describe its components and their basic functions (i.e., OSI Model and TCP/IP Model; Input Unit, Output Unit, and Central Processing Unit; displaying data, coding, transferring and processing data; programming programs; etc.)

19

4.2

Discuss the evolution of computers and future trends in computer networking (i.e., ARPANET, Internet of Things (IoT), privacy, etc.) and societal impacts

20

4.3

Discuss issues and controversies pertaining to the evolution of mobile computing and the dissemination and centralization of data and its societal impacts (i.e., IoT, Microsoft, Google, anticompetitive practices, privacy, etc.)

21

4.4

Explain an information system’s structure and components (e.g., applications, media, network devices, operating systems, and servers)

22

4.5

Discuss recent advancements in cybersecurity technologies, threats, and the basics of artificial intelligence (AI) concerning network security

23

4.6

Discuss emerging problem-solving methodologies such as Zero Trust principles and AI-driven threat detection

24

5.1

Explain the risk management process (i.e., define risk, determine risk level, identify methods to address risk, identify inventory assets that may be compromised, identify functionalities, etc.)

25

5.2

Define network threats to data availability, confidentiality, and integrity

26

5.3

Discuss and give examples of the severity of data loss to an individual and to an organization

27

5.4

Identify security threats related to computer data, hardware, and software (e.g., denial of service, eavesdropping, intrusion, unauthorized access, spoofing, tampering, etc.)

28

5.5

Explain the importance of physical security of computer and network hardware following best practices (e.g., cameras, locks, USB port blocking, encryption, bit-locker for Windows, and LBM for Linux)

29

5.6

Describe network threats (e.g., denial of service, email spoofing, hacking/cracking, intrusion, malware, phishing, social engineering, spamming, etc.)

30

5.7

Describe best practices to protect against network threats of data at rest, data in transit, and data during processing (e.g., access control, antivirus software, awareness and training, encryption, firewalls, intrusion detection/prevention, network segmentation, port/service blocking, software updates, etc.)

31

5.8

Describe password best practices (e.g., authentication, authorization, accountability, passphrases, physical keys, password managers, complexity, etc.)

32

5.9

Analyze authentication methods used to secure access to the network (e.g., biometrics, key cards, multi-factor authentication (MFA), single sign-on (SSO), two-factor authentication (2FA), etc.)

33

5.10

Identify best practices for access control (e.g., changing default passwords, disabling unused accounts, least privileges, role-based access control, etc.)

34

6.1

Explain the purpose of and types of network media (e.g., fiber optic cable, coaxial cable, ethernet, etc.)

35

6.2

Explain the purpose and types of topologies (e.g., bus, ring, tree, star, mesh, etc.)

36

6.3

Compare proper physical network topology

37

6.4

Identify appropriate connectors, media types, and uses for various networks

38

6.5

Compare physical and virtual networks (e.g., SD-WAN, VLAN, etc.)

39

6.6

Specify the characteristics of physical network technologies including cable types, length, speed, and topology

40

6.7

Specify the characteristics of wireless network technologies including frequency, speed, topology, and transmission (e.g., 5G, Bluetooth, IoT, etc.)

41

6.8

Describe the structure of the internet (network of networks)

42

6.9

Identify the features, functions, and purpose of commonly used network components (e.g., routers, modems, switches, NIC, etc.)

43

7.1

Define a network protocol and explain how it works (e.g., routing protocols)

44

7.2

Describe the characteristics and use of the four-layer TCP/IP model (e.g., Media Access Control (MAC))

45

7.3

Describe the characteristics and use of the seven layers of the OSI model

46

7.4

Explain the concept of ports and identify the port ranges used in networking services and protocols (e.g., dynamic/private, system, user)

47

7.5

Explain the purpose of dynamic and static routing protocols

48

7.6

Describe standard network ports and protocols (e.g., DNS, DHCP, FTP, HTTP, POP, SMTP, HTTPS, SFTP, VPN, SSH, ICMP/ARP, etc.)

49

7.7

Describe the applications and characteristics of TCP and UDP

50

7.8

Differentiate IPv4/IPv6 addresses and their corresponding subnet masks (e.g., classful networks, CIDR, private vs. public IP)

51

7.9

Summarize the basic characteristics and protocols of MAN, SD-WAN, and WAN technologies (e.g., frame relay, etc.)

52

7.10

Describe remote access protocols and services (e.g., RDP, terminal emulator, etc.)

53

7.11

Describe the function and purpose of security protocols (e.g., HTTPS, SFTP, VPN, PPTP, etc.)

54

7.12

Explain the importance of proper documentation according to industry standards

55

7.13

Discuss where RFCs (standards) are developed (e.g., IETF, IEEE, 3GPP, etc.)

56

7.14

Describe methods to determine priorities in establishing and maintaining a computer network

57

8.1

Design a network map with virtual and physical segments (e.g., logical network map)

58

8.2

Construct dynamic and static routes

59

8.3

Explain labeling according to industry standards (e.g., cable, device, rack, wall plates, etc.)

60

8.4

Describe the components needed and purpose to build fault tolerance into a network

61

8.5

Describe the purpose of a disaster recovery plan for a network

62

8.6

Install and configure a physical and/or virtual networking system (e.g., Linux/UNIX, Windows)

63

8.7

Configure network cards, network settings, and an operating system that provides common services for computer programs

64

8.8

Configure and connect devices to the network (e.g., computers, printers, routers, switches, etc.)

65

8.9

Identify and use tools for diagnostic tasks or network repair (e.g., Traceroute, ipconfig, Ping, etc.)

66

9.1

Explain how to harden the network against unauthorized access and abuse

67

9.2

Explain the difference among hardening, patching, and types of vulnerabilities (e.g., social, cognitive, environmental, etc.)

68

9.3

Identify common network threats (e.g., denial of service, eavesdropping, intrusion, etc.)

69

9.4

Identify physical network threats (e.g., disrupting media, environmental/power disruption, etc.)

70

9.5

Describe the benefits and purpose of segmenting networks (e.g., VLAN, DMZ, etc.)

71

9.6

Describe the benefits of enabling and disabling ports and network services

72

9.7

Describe techniques to secure a Wi-Fi network (e.g., WPA, WPA3, etc.)

73

9.8

Explain the principles of firewall rules and their importance in network hardening

74

9.9

Describe the benefits, disadvantages, and purposes of using a proxy service

75

9.10

Describe the benefits, disadvantages, and purposes of using network intrusion detection/prevention systems (e.g., IDS/IPS, SIEM, etc.)

76

10.1

Explain the troubleshooting process (e.g., define problem, identify probable cause, test hypothesis, create action, implement action plan, verify solution, and document)

77

10.2

Prepare a work/maintenance plan and prioritize and schedule network security tasks (e.g., Cron Jobs)

78

10.3

Describe the purpose and benefits of network utilities (e.g., netstat, nslookup, Ping, Traceroute, etc.)

79

10.4

Demonstrate the use of visual indicators and diagnostic utilities (e.g., Wireshark) to interpret problems

80

10.5

Identify connectivity issues in various node environments (e.g., smartphones, switches, tablets, Linux/UNIX, Windows, etc.)

81

10.6

Identify and resolve network issues (e.g., cable failure, connection failure, environmental, misconfigurations, power failure, user error, etc.)

82

10.7

Identify common tools and methods for monitoring a network (e.g., automation, scripting, AI tools, etc.)

83

10.8

Describe AI and Machine Learning-based tools for network maintenance and issue resolution

84

11.1

Research issues regarding intellectual property rights including software licensing and software duplication (e.g., Business Software Alliance, Creative Commons, Digital Right Management, EFF, and Intellectual Property Watch)

85

11.2

Differentiate among freeware, open source, proprietary, and shareware software relative to legal and ethical issues

86

11.3

Identify issues, laws, and trends affecting data and privacy (e.g., CNP, GDPR, HIPAA, PCI-DSS, SOX, FCC, FERPA)

87

11.4

Describe acceptable use of industry-related data, private and public networks, and social networking

88

11.5

Research how data privacy laws and regulations influence network security business practices

89

11.6

Discuss the responsibilities of network security professionals (e.g., protecting organizational assets, and maintaining consistent and equitable cyber practices) and explore consequences of unethical behavior to include personal legal liability

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program