Standard set
Computer Hardware 145025
Standards
Showing 89 of 89 standards.
IT Fundamentals
Infrastructure Systems
STR2
Learners apply fundamental principles of IT, including the history of IT and its impact on society, common industry terms, systems theory, information storage and retrieval, database management, and computer hardware, software, and peripheral device configuration and installation. This base of knowledge and skills may be applied across the career field
STR4
Learners apply principles of networking and infrastructure related to the installation, administration, and maintenance of computer networks and components. Knowledge and skills may be applied to network connectivity, cabling, protocols, architecture, classification, topologies, operating systems, Open Systems Interconnection (OSI) standards, data encoding, Quality of Service (QoS), Internet Protocol (IP) addressing, and wide area network (WAN) design.
OUT2.1
Security, Risks, and Safeguards: Describe the need for security and explain security risks and security safeguards.
OUT2.2
Networking Fundamentals: Apply networking fundamentals to infrastructure systems.
OUT2.4
Emerging Technologies: Identify trending technologies, their fundamental architecture, and their value in the marketplace.
OUT2.6
Installation and Configuration: Install and configure hardware and software.
OUT2.10
Equipment: Select, operate, and maintain equipment.
OUT2.11
Troubleshooting: Select and apply troubleshooting methodologies for problem solving.
OUT2.12
Performance Tests and Acceptance Plans: Develop performance tests and acceptance plans.
OUT2.13
Rollout and Handoff Plan: Rollout and facilitate handoff to customer
OUT4.3
Network Media: Select, assemble, terminate, and test media.
OUT4.13
Disaster Recovery: Recommend disaster recovery and business continuity plans.
COMP2.1
Explain the need for confidentiality, integrity, and availability (CIA) of information.
COMP2.1
Describe authentication, authorization, and auditing.
COMP2.1
Describe multilevel security.
COMP2.1
Identify security risks and describe associated safeguards and methodologies (e.g., auditing).
COMP2.1
Describe major threats to computer systems (e.g., insider threats, viruses, worms, spyware, ransomware, spoofing, hacking, social engineering, phishing).
COMP2.1
Describe the components of the physical environment (e.g., wiring closets, server rooms) and physical security systems.
COMP2.1
Describe the need for security in networking (e.g., firewall, access controls, encryption, demilitarized zone).
COMP2.1
Describe the need for security in application development.
COMP2.1
Track and catalogue physical assets.
COMP2.1
Describe computer forensics, its importance in information security and cybersecurity, and its relevance to law enforcement.
COMP2.1
Identify the need for personal security in digital information and describe how personal information can be safeguarded.
COMP2.1
Practice information security per job requirements.
COMP2.1
Describe privacy security compliance on systems (e.g., Health Insurance Portability and Accountability Act [HIPAA], Payment Card Industry [PCI], Sarbanes Oxley Act [SOX], Americans with Disabilities Act [ADA], General Data Protection Regulation [GDPR], European Union Data Protection Regulation [EUDPR]).
COMP2.2
Differentiate between Local Area Networks (LANs), Wide Area Networks (WANs), Wireless Local Area Networks (WLANs), and Near Field Communication (NFC).
COMP2.2
Select the basic point-to-point (PTP) and point-to-multipoint (PTMP) network topologies (e.g., star, ring, tree, network, mesh, irregular) and broadband and baseband transmission methods.
COMP2.2
Select network storage techniques (e.g., fiber channel, Internet Small Computer System Interface [iSCSI], Fiber Channel over Ethernet [FCoE], Serial Attached SCSI [SAS], Network File Systems [NFS], Network Attached Storage/Server Message Blocks [NAS/SMB])
COMP2.2
Differentiate between the Internet, intranets, and extranets.
COMP2.2
Identify and apply Transmission Control Protocol and Internet Protocol (TCP/IP), Internet Protocol Version 4 (IPv4), Internet Protocol Version 6 (IPv6) applications and services (e.g., rlogin, Simple Mail Transfer Protocol [SMTP], Telecommunications Network [Telnet], File Transfer Protocol [FTP], Domain Name System [DNS], Network File System [NFS], Voice over Internet Protocol [VoIP], Internet Control Message Protocol [ICMP]).
COMP2.2
Differentiate between cable types (e.g., fiber optic, twisted pair, coaxial) and interfaces.
COMP2.2
Identify the top-level domains (e.g., .gov, .com, .edu).
COMP2.2
Describe the characteristics and uses of networks, network devices, and components (e.g., hubs, switches, routers, firewalls).
COMP2.4
Investigate the scope and the impact of mobile computing environments on society.
COMP2.4
Describe the differences, advantages, and limitations of cloud computing (e.g., public cloud, private cloud, hybrid cloud) and on‐premises computing.
COMP2.4
Utilize cloud computing applications (e.g., services, applications, virtual environments).
COMP2.4
Describe emerging technologies (e.g., Bring your Own Device [BYOD], Services Virtualization, Augmented Reality [AR], SMART Devices, Additive Manufacturing [3D Printing]).
COMP2.6
Comply with license agreements for software and hardware and describe the consequences of noncompliance
COMP2.6
Identify hardware requirements for software applications.
COMP2.6
Verify software compatibility and troubleshoot any software incompatibility.
COMP2.6
Install and test new software and software upgrades on stand-alone, mobile, and networked systems.
COMP2.6
Preserve, convert, or migrate existing data files to a new format.
COMP2.6
Determine compatibility of software and hardware and resolve any conflicts
COMP2.6
Install and test hardware peripherals.
COMP2.6
Document installation, configuration, and compatibility of hardware and software.
COMP2.10
Identify hardware platforms, configurations, and support models.
COMP2.10
Identify processor, memory, storage, power and environmental requirements.
COMP2.10
Identify architecture requirements.
COMP2.10
Identify architecture requirements.
COMP2.10
Prepare and operate equipment per project design specifications.
COMP2.10
Monitor equipment operation and troubleshoot issues and problems.
COMP2.10
Backup, restore, test, archive, and manage data.
COMP2.10
Backup, restore, test, archive, and manage data.
COMP2.10
Backup, restore, test, archive, and manage data.
COMP2.11
Identify the problem.
COMP2.11
Select troubleshooting methodology (e.g., top down, bottom up, follow the path, spot the differences).
COMP2.11
Investigate symptoms based on the selected methodology.
COMP2.11
Gather and analyze data about the problem.
COMP2.11
Design a solution.
COMP2.11
Test a solution.
COMP2.11
Implement a solution.
COMP2.11
Document the problem and the verified solution.
COMP2.12
Create a written procedure agreed by the stakeholders and project team for determining the acceptability of the project deliverables.
COMP2.12
Develop a test system that accurately mimics external interfaces.
COMP2.12
Develop test cases that are realistic, compare with expected performance, and include targeted platforms and device types.
COMP2.12
Develop, perform, and document usability and testing integration.
COMP2.12
Make corrections indicated by test results.
COMP2.12
Seek stakeholder acceptance upon successful completion of the test plan.
COMP2.13
Include overall project goals and timelines in the rollout plan.
COMP2.13
Communicate rollout plans to key stakeholders in a timely manner.
COMP2.13
Conduct final review and approvals according to company standards.
COMP2.13
Identify support staff, training needs, and contingency plans in the rollout plan.
COMP2.13
Test delivered application to assure that it is fully functional for the customer or user and meets all requirements.
COMP2.13
Deliver support and training materials.
COMP4.3
Identify the criteria used in selecting media (e.g., physical properties, transmission technologies, transmission span, bandwidth, topology, security, noise immunity, installation considerations, cost).
COMP4.3
Differentiate between media types (e.g., coaxial, twisted pair, fiber optic) and interfaces.
COMP4.3
Compare media categories (e.g., single mode, multimode, CAT5, CAT5E, CAT6+).
COMP4.3
Describe types of media connectors (e.g., Bayonet Neill-Concelman [BNC], Registered Jack [RJ]-45, LC, ST) and grounding techniques.
COMP4.3
Identify media standards (e.g., American National Standards Institute [ANSI], Electronic Industries Alliance/Telecommunications Industry Association [EIA/TIA]-568, EIA/TIA-568A and 568B).
COMP4.3
Identify the advantages and disadvantages of cabling systems.
COMP4.3
Describe typical problems associated with cable installation.
COMP4.3
Assemble and test Ethernet cable (e.g., straight-through, crossover, loopback).
COMP4.13
Differentiate between disaster recovery and business continuity.
COMP4.13
Identify common backup devices.
COMP4.13
Identify the criteria for selecting a backup system.
COMP4.13
Establish a process for archiving files.
COMP4.13
Develop a disaster recovery plan.
Framework metadata
- License
- CC BY 4.0 US