Information Technology - Transfer Metrics

CSP-E01 [Essential] Evaluate the purpose and function of cybersecurity technology, identifying the tools and systems that reduce the risk of data breaches while enabling vital organization practices. [Evaluating]

Emerging Standard
Analyze the purpose and function of cybersecurity technology, identifying the tools and systems that reduce the risk of data breaches while enabling vital organization practices. (Cybersecurity functions) [Analyzing]
Developed Standard
Evaluate the purpose and function of cybersecurity technology, identifying the tools and systems that reduce the risk of data breaches while enabling vital organization practices. (Cybersecurity functions) [Evaluating]
Highly Developed Standard
Design a cybersecurity system using the tools and systems that reduce the risk of data breaches while enabling vital organization practices. (Cybersecurity functions) [Creating]

CSP-E02 [Essential] Apply appropriate tools and concepts to minimize the risk to an organization's cyberspace to address cybersecurity threats. [Applying]

Emerging Standard
Describe systems, tools, and concepts to minimize the risk to an organization's cyberspace to address cybersecurity threats. (Tools and threats) [Understanding]
Developed Standard
Apply appropriate tools and concepts to minimize the risk to an organization's cyberspace to address cybersecurity threats. (Tools and threats) [Applying]
Highly Developed Standard
Integrate systems and tools to minimize the risk to an organization's cyberspace to address cybersecurity threats. (Tools and threats) [Analyzing]

CSP-S01 [Supplemental] Implement a risk management approach for responding to and recovering from a cyber-attack on a system which contains high-value information and assets, such as an email system. [Applying]

Emerging Standard
Explain a risk management approach for responding to and recovering from a cyber-attack on a system which contains high-value information and assets, such as an email system. (Response and risks) [Understanding]
Developed Standard
Implement a risk management approach for responding to and recovering from a cyber-attack on a system which contains high-value information and assets, such as an email system. (Response and risks) [Applying]
Highly Developed Standard
Distinguish risk management approaches for responding to and recovering from a cyber-attack on a system which contains high-value information and assets, such as an email system, that optimize preserving forensic evidence. (Response and risks) [Analyzing]

GPP-E01 [Essential] Use effective communication skills and cultural awareness in a team setting to help advance organizational goals in a global environment. [Applying]

Emerging Standard
Describe effective communication skills in a team setting to help advance organizational goals in a global environment. (Communication and teamwork) [Understanding]
Developed Standard
Use effective communication skills and cultural awareness in a team setting to help advance organizational goals in a global environment. (Communication and teamwork) [Applying]
Highly Developed Standard
Integrate effective communication skills and cultural awareness in a team setting to help advance organizational goals in a global environment. (Communication and teamwork) [Analyzing]

GPP-E02 [Essential] Evaluate the specific skills necessary for maintaining continued employment in an IT career. [Evaluating]

Emerging Standard
Explain the specific skills necessary for maintaining continued employment in an IT career. (Employability) [Understanding]
Developed Standard
Evaluate the specific skills necessary for maintaining continued employment in an IT career. (Employability) [Evaluating]
Highly Developed Standard
Evaluate the specific skills necessary for advancing professionally in an IT career. (Employability) [Evaluating]

GPP-E03 [Essential] Carry out IT policies within an organization that include privacy, legal, and ethical considerations. [Applying]

Emerging Standard
Discuss IT policies within an organization that include privacy, legal, and ethical considerations. (Legal and ethical) [Understanding]
Developed Standard
Carry out IT policies within an organization that include privacy, legal, and ethical considerations. (Legal and ethical) [Applying]
Highly Developed Standard
Analyze an organization’s IT policies with regard to privacy, legal, and ethical considerations. (Legal and ethical) [Analyzing]

GPP-S01 [Supplemental] Produce a project plan for an IT project, including a cost/benefit analysis, risk considerations, and related issues. [Applying]

Emerging Standard
Interpret a project plan for an IT project, including a cost/benefit analysis, risk considerations, and related issues. (Project management) [Understanding]
Developed Standard
Produce a project plan for an IT project, including a cost/benefit analysis, risk considerations, and related issues. (Project management) [Applying]
Highly Developed Standard
Analyze a project plan for an IT project, including a cost/benefit analysis, risk considerations, and related issues. (Project management) [Analyzing]

GPP-S02 [Supplemental] Discuss current practices used to optimize the systems development life cycle, such as DevOps and agile approaches. [Understanding]

Emerging Standard
Define current practices used to optimize the systems development life cycle, such as DevOps and agile approaches. (Current industry practices) [Remembering]
Developed Standard
Discuss current practices used to optimize the systems development life cycle, such as DevOps and agile approaches. (Current industry practices) [Understanding]
Highly Developed Standard
Implement current practices used to optimize the systems development life cycle, such as DevOps and agile approaches. (Current industry practices) [Applying]

IMA-E01 [Essential] Create simple and intermediate queries to construct and modify objects that store, manipulate, and analyze data. [Creating]

Emerging Standard
Evaluate working SQL statements for simple and intermediate queries to create and modify data and database objects to store, manipulate and analyze enterprise data. (Testing and performance) [Evaluating]
Developed Standard
Create simple and intermediate queries to construct and modify objects that store, manipulate, and analyze data. (Testing and performance) [Creating]
Highly Developed Standard
Create working SQL statements for advanced queries to create and modify data and database objects to store, manipulate and analyze enterprise data. (Testing and performance) [Creating]

IMA-S01 [Supplemental] Design and implement a physical model based on appropriate organization rules for a given scenario including the impact of normalization and indexes. [Applying]

Emerging Standard
Explain a physical database model based on appropriate organization rules for a given scenario including the impact of normalization and indexes. (Requirements and development) [Understanding]
Developed Standard
Design and implement a physical model based on appropriate organization rules for a given scenario including the impact of normalization and indexes. (Requirements and development) [Applying]
Highly Developed Standard
Analyze a physical database model based on appropriate organization rules for a given scenario including the impact of normalization and indexes. (Requirements and development) [Analyzing]

IMA-S02 [Supplemental] Perform major database administration tasks such as create and manage database users, roles and privileges, backup, and restore database objects to ensure organizational efficiency, continuity, and information security. [Applying]

Emerging Standard
Summarize major database administration tasks such as create and manage database users, roles and privileges, backup, and restore database objects to ensure organizational efficiency, continuity, and information security. (Testing and performance) [Understanding]
Developed Standard
Perform major database administration tasks such as create and manage database users, roles and privileges, backup, and restore database objects to ensure organizational efficiency, continuity, and information security. (Testing and performance) [Applying]
Highly Developed Standard
Examine major database administration tasks such as create and manage database users, roles and privileges, backup, and restore database objects to ensure organizational efficiency, continuity, and information security. (Testing and performance) [Analyzing]

IST-E01 [Essential] Design, including debugging and testing, a script that includes sequence, selection, repetition, and parameter passing. [Creating]

Emerging Standard
Write a script that includes selection, repetition, and parameter passing. (Integrative programming and scripting) [Applying]
Developed Standard
Design, including debugging and testing, a script that includes sequence, selection, repetition, and parameter passing. (Integrative programming and scripting) [Creating]
Highly Developed Standard
Design, debug, and test a secure script that includes selection, repetition, and parameter passing. (Integrative programming and scripting) [Creating]

IST-E02 [Essential] Implement secure coding techniques, such as input validation, wrapper code, securing method access, and buffer overflow prevention. [Applying]

Emerging Standard
Summarize appropriate techniques for secure coding, including wrapper code, code, securing method access, and preventing buffer overflow. (Defensible integration) [Understanding]
Developed Standard
Implement secure coding techniques, such as input validation, wrapper code, securing method access, and buffer overflow prevention. (Defensible integration) [Applying]
Highly Developed Standard
Integrate appropriate techniques for secure coding, including wrapper code, code, securing method access, and preventing buffer overflow. (Defensible integration) [Analyzing]

IST-S01 [Supplemental] Describe how to code and store characters, images, and other forms of data in computers, and why data conversion is often a necessity when merging disparate computing systems. [Understanding]

Emerging Standard
Describe how to code and store characters, images, and other forms of data in computers. (Data mapping and exchange) [Understanding]
Developed Standard
Describe how to code and store characters, images, and other forms of data in computers, and why data conversion is often a necessity when merging disparate computing systems. (Data mapping and exchange) [Understanding]
Highly Developed Standard
Examine how to code and store characters, images, and other forms of data in computers, and why data conversion is often a necessity when merging disparate computing systems. (Data mapping and exchange) [Analyzing]

IST-S02 [Supplemental] Describe how a commonly used intersystem communication protocol works, including its advantages and disadvantages. [Understanding]

Emerging Standard
Describe how a commonly used intersystem communication protocol works. (Intersystem communication protocols) [Understanding]
Developed Standard
Describe how a commonly used intersystem communication protocol works, including its advantages and disadvantages. (Intersystem communication protocols) [Understanding]
Highly Developed Standard
Investigate how a commonly used intersystem communication protocol works, including its advantages and disadvantages. (Intersystem communication protocols) [Applying]

NET-E01 [Essential] Compare the characteristics of various communication protocols and how they support application requirements within a telecommunication system. [Analyzing]

Emerging Standard
Explain the characteristics of various communication protocols and how they support application requirements within a telecommunication system. (Requirements and Technologies) [Understanding]
Developed Standard
Compare the characteristics of various communication protocols and how they support application requirements within a telecommunication system. (Requirements and Technologies) [Analyzing]
Highly Developed Standard
Evaluate the characteristics of various communication protocols and how they support application requirements within a telecommunication system. (Requirements and Technologies) [Evaluating]

NET-E02 [Essential] Describe different network standards, components, and requirements of network protocols within a distributed computing setting. [Understanding]

Emerging Standard
Describe different network standards, components, and requirements of network protocols. (Network protocol technologies) [Understanding]
Developed Standard
Describe different network standards, components, and requirements of network protocols within a distributed computing setting. (Network protocol technologies) [Understanding]
Highly Developed Standard
Implement different network standards, components, and requirements of network protocols within a distributed computing setting. (Network protocol technologies) [Applying]

NET-E03 [Essential] Explain different main issues related to network management. [Understanding]

Emerging Standard
List different main issues related to network management. (Network Management) [Remembering]
Developed Standard
Explain different main issues related to network management. (Network Management) [Understanding]
Highly Developed Standard
Investigate different main issues related to network management. (Network Management) [Applying]

NET-S01 [Supplemental] Contrast various networking topologies in terms of robustness, expandability, and throughput used within a cloud enterprise. [Analyzing]

Emerging Standard
Summarize various networking topologies in terms of robustness, expandability, and throughput used within a cloud enterprise. (Technologies) [Understanding]
Developed Standard
Contrast various networking topologies in terms of robustness, expandability, and throughput used within a cloud enterprise. (Technologies) [Analyzing]
Highly Developed Standard
Evaluate various networking topologies in terms of robustness, expandability, and throughput used within a cloud enterprise. (Technologies) [Evaluating]

PFT-E01 [Essential] Describe how the historical development of hardware and operating system computing platforms produced the computing systems we have today. [Understanding]

Emerging Standard
List important historical events related to hardware and operating system computing platforms. (Computing systems) [Understanding]
Developed Standard
Describe how the historical development of hardware and operating system computing platforms produced the computing systems we have today. (Computing systems) [Understanding]
Highly Developed Standard
Analyze how the historical development of hardware and operating system computing platforms produced the computing systems we have today. (Computing systems) [Analyzing]

PFT-E02 [Essential] Choose the most effective operating system based on a computer’s intended use. [Evaluating]

Emerging Standard
Contrast possible operating systems based on a computer’s intended use. (Operating systems) [Analyzing]
Developed Standard
Choose the most effective operating system based on a computer’s intended use. (Operating systems) [Evaluating]
Highly Developed Standard
Choose the most effective operating system based on a computer’s intended use in a hybrid cloud environment. (Operating systems) [Evaluating]

PFT-E03 [Essential] Diagram the main parts of a computer, including interconnections. [Applying]

Emerging Standard
Explain the main parts of a computer, including interconnections. (Architecture and organization) [Understanding]
Developed Standard
Diagram the main parts of a computer, including interconnections. (Architecture and organization) [Applying]
Highly Developed Standard
Categorize the main parts of a computer, including interconnections. (Architecture and organization) [Analyzing]

PFT-S01 [Supplemental] Perform at least one operating system installation on a computer. [Applying]

Emerging Standard
Describe how to install at least one operating system on a computer. (Operating systems) [Understanding]
Developed Standard
Perform at least one operating system installation on a computer. (Operating systems) [Applying]
Highly Developed Standard
Contrast various client and server operating system installations on desktop, server, and mobile computers. (Operating systems) [Analyzing]

PFT-S02 [Supplemental] Illustrate how to store and retrieve data using a computer. [Applying]

Emerging Standard
Explain how to store and retrieve data using a computer. (Architecture and organization) [Understanding]
Developed Standard
Illustrate how to store and retrieve data using a computer. (Architecture and organization) [Applying]
Highly Developed Standard
Distinguish between various data storage and retrieval methods using a computer. (Architecture and organization) [Analyzing]

SPA-E01 [Essential] Implement appropriate procedures and technologies to enforce administrative policies within a corporate environment. [Applying]

Emerging Standard
Explain appropriate procedures and technologies to enforce administrative policies within a corporate environment. (Operational activities) [Understanding]
Developed Standard
Implement appropriate procedures and technologies to enforce administrative policies within a corporate environment. (Operational activities) [Applying]
Highly Developed Standard
Integrate appropriate procedures and technologies to enforce administrative policies within a corporate environment. (Operational activities) [Analyzing]

SPA-E02 [Essential] Use appropriate and emerging technologies to improve the performance of computer systems. [Applying]

Emerging Standard
Explain appropriate and emerging technologies to improve the performance of computer systems. (Performance analysis) [Understanding]
Developed Standard
Use appropriate and emerging technologies to improve the performance of computer systems. (Performance analysis) [Applying]
Highly Developed Standard
Choose appropriate and emerging technologies to improve the performance of computer systems. (Performance analysis) [Evaluating]

SPA-S01 [Supplemental] Implement effective and appropriate system administration policies with sensitivity to the goals and constraints of an organization. [Applying]

Emerging Standard
Discuss effective and appropriate system administration policies with sensitivity to the goals and constraints of an organization. (System governance) [Understanding]
Developed Standard
Implement effective and appropriate system administration policies with sensitivity to the goals and constraints of an organization. (System governance) [Applying]
Highly Developed Standard
Examine effective and appropriate system administration policies with sensitivity to the goals and constraints of an organization. (System governance) [Analyzing]

SWF-E01 [Essential] Produce a program that implements an appropriate style, intended input behavior, correct program components, and includes descriptions of program functionality. [Applying]

Emerging Standard
Describe a program that implements an appropriate style, intended input behavior, correct program components, and includes descriptions of program functionality. (App development practices) [Understanding]
Developed Standard
Produce a program that implements an appropriate style, intended input behavior, correct program components, and includes descriptions of program functionality. (App development practices) [Applying]
Highly Developed Standard
Examine how a program implements an appropriate style, intended input behavior, correct program components, and includes descriptions of program functionality. (App development practices) [Analyzing]

SWF-E02 [Essential] Develop algorithms to solve a computational problem. [Creating]

Emerging Standard
Assess algorithms to solve a computational problem. (Algorithm development) [Evaluating]
Developed Standard
Develop algorithms to solve a computational problem. (Algorithm development) [Creating]
Highly Developed Standard
Develop complex algorithms to solve a computational problem. (Algorithm development) [Creating]

SWF-S01 [Supplemental] Explain how programs implement algorithms in terms of instruction processing, program execution, and running processes. [Understanding]

Emerging Standard
Recognize how programs implement algorithms in terms of instruction processing, program execution, and running processes. (Algorithm development) [Remembering]
Developed Standard
Explain how programs implement algorithms in terms of instruction processing, program execution, and running processes. (Algorithm development) [Understanding]
Highly Developed Standard
Illustrate how programs implement algorithms in terms of instruction processing, program execution, and running processes. (Algorithm development) [Applying]

SWF-S02 [Supplemental] Implement appropriate data structures, while using multiple levels of abstraction, to create a new program that requires teamwork and is socially relevant. [Applying]

Emerging Standard
Describe appropriate data structures, while using multiple levels of abstraction, to create a new program that requires teamwork and is socially relevant. (Program development) [Understanding]
Developed Standard
Implement appropriate data structures, while using multiple levels of abstraction, to create a new program that requires teamwork and is socially relevant. (Program development) [Applying]
Highly Developed Standard
Compare appropriate data structures, while using multiple levels of abstraction, to create a new program that requires teamwork and is socially relevant. (Program development) [Analyzing]

SWF-S03 [Supplemental] Implement a mobile or web app with appropriate user experience design, functionality, and security analysis while using standard libraries, unit testing tools, and version control in a team environment. [Applying]

Emerging Standard
Implement a mobile or web app with appropriate functionality while using standard libraries and version control in a team environment. (App development practices) [Applying]
Developed Standard
Implement a mobile or web app with appropriate user experience design, functionality, and security analysis while using standard libraries, unit testing tools, and version control in a team environment. (App development practices) [Applying]
Highly Developed Standard
Examine a mobile or web app for appropriate user experience design, functionality, and security while using standard libraries, unit testing tools, and version control in a team environment. (App development practices) [Analyzing]

UXD-E01 [Essential] Develop a simple application that maximizes usability by using relevant tools and techniques, such as prototyping. [Creating]

Emerging Standard
Implement a simple application according to basic usability standards by using relevant tools and techniques, such as prototyping. (Design tools and techniques) [Applying]
Developed Standard
Develop a simple application that maximizes usability by using relevant tools and techniques, such as prototyping. (Design tools and techniques) [Creating]
Highly Developed Standard
Develop a complex application that maximizes usability by using relevant tools and techniques, such as prototyping. (Design tools and techniques) [Creating]

UXD-S01 [Supplemental] Develop an interactive application that optimizes usability while applying a user-centered design cycle with related tools and techniques. [Creating]

Emerging Standard
Implement an interactive application that optimizes usability while applying a user-centered design cycle with related tools and techniques. (Design tools and techniques) [Applying]
Developed Standard
Develop an interactive application that optimizes usability while applying a user-centered design cycle with related tools and techniques. (Design tools and techniques) [Creating]
Highly Developed Standard
Develop an interactive application that optimizes usability while applying a user-centered design cycle with related tools and techniques in a team environment. (Design tools and techniques) [Creating]

WMS-E01 [Essential] Describe the major components of a web system and how they function together, including the web server, database, analytics, and front end. [Understanding]

Emerging Standard
List the major components of a web system, including the web server, database, analytics, and front end. (Web system infrastructure) [Remembering]
Developed Standard
Describe the major components of a web system and how they function together, including the web server, database, analytics, and front end. (Web system infrastructure) [Understanding]
Highly Developed Standard
Diagram the major components of a web system and how they function together, including the web server, database, analytics, and front end. (Web system infrastructure) [Applying]

WMS-S01 [Supplemental] Analyze how a responsive web application utilizes a web framework and presentation technologies in support of a diverse online community. [Analyzing]

Emerging Standard
Implement a responsive web application utilizing a web framework and presentation technologies in support of a diverse online community. (Web application development) [Applying]
Developed Standard
Analyze how a responsive web application utilizes a web framework and presentation technologies in support of a diverse online community. (Web application development) [Analyzing]
Highly Developed Standard
Evaluate how a responsive web application utilizes a web framework and presentation technologies in support of a diverse online community. (Web application development) [Evaluating]

WMS-S02 [Supplemental] Develop a mobile app that is usable, efficient, and secure on more than one device. [Creating]

Emerging Standard
Develop a mobile app that is usable and secure. (Mobile app development) [Creating]
Developed Standard
Develop a mobile app that is usable, efficient, and secure on more than one device. (Mobile app development) [Creating]
Highly Developed Standard
Develop a mobile app that is usable, efficient, secure, and optimized for multiple devices. (Mobile app development) [Creating]

WMS-S03 [Supplemental] Analyze a web or mobile system and correct security vulnerabilities. [Analyzing]

Emerging Standard
Modify a web or mobile system to correct security vulnerabilities. (Web and mobile security) [Applying]
Developed Standard
Analyze a web or mobile system and correct security vulnerabilities. (Web and mobile security) [Analyzing]
Highly Developed Standard
Evaluate a web or mobile system for security vulnerabilities and correct them. (Web and mobile security) [Evaluating]

WMS-S04 [Supplemental] Implement storage, transfer, and retrieval of digital media with appropriate file, database, or streaming formats. [Applying]

Emerging Standard
Explain storage, transfer, and retrieval of digital media with appropriate file, database, or streaming formats. (Digital media storage and transfer) [Understanding]
Developed Standard
Implement storage, transfer, and retrieval of digital media with appropriate file, database, or streaming formats. (Digital media storage and transfer) [Applying]
Highly Developed Standard
Compare storage, transfer, and retrieval options for digital media with appropriate file, database, or streaming formats. (Digital media storage and transfer) [Evaluating]

ANE-S01 [Supplemental] Investigate security and performance issues related to wireless networks. [Applying]

Emerging Standard
Explain security and performance issues related to wireless networks. (Security and performance) [Understanding]
Developed Standard
Investigate security and performance issues related to wireless networks. (Security and performance) [Applying]
Highly Developed Standard
Analyze security and performance issues related to wireless networks. (Security and performance) [Analyzing]

CCO-E01 [Essential] Discuss various concepts and technologies related to cloud computing. [Analyzing]

Emerging Standard
Explain the concept of cloud computing. (Technologies) [Understanding]
Developed Standard
Discuss various concepts and technologies related to cloud computing. (Technologies) [Analyzing]
Highly Developed Standard
Choose appropriate cloud service categories for a given scenario. (Technologies) [Evaluating]

CCO-S01 [Supplemental] Distinguish cloud service categories, including public, private, and hybrid clouds, and be aware of privacy regulation impact on cloud application requirements. [Analyzing]

Emerging Standard
Explain cloud service categories, including public, private, and hybrid clouds, and be aware of privacy regulation impact on cloud application requirements. (Legal and Design) [Understanding]
Developed Standard
Distinguish cloud service categories, including public, private, and hybrid clouds, and be aware of privacy regulation impact on cloud application requirements. (Legal and Design) [Analyzing]
Highly Developed Standard
Assess cloud service categories, including public, private, and hybrid clouds, and be aware of privacy regulation impact on cloud application requirements. (Legal and Design) [Evaluating]

CCO-S02 [Supplemental] Discuss various factors, including basic architecture, that affect the performance of cloud applications. [Understanding]

Emerging Standard
Identify various factors, including basic architecture, that affect the performance of cloud applications. (Technology) [Remembering]
Developed Standard
Discuss various factors, including basic architecture, that affect the performance of cloud applications. (Technology) [Understanding]
Highly Developed Standard
Investigate various factors, including basic architecture, that affect the performance of cloud applications. (Technology) [Applying]

CEC-E01 [Essential] Implement common standards, procedures, and applications used to protect the confidentiality, integrity, and availability of data and information systems. [Applying]

Emerging Standard
Interpret common standards, procedures, and applications used to protect the confidentiality, integrity and availability of information and information systems. (System integrity) [Understanding]
Developed Standard
Implement common standards, procedures, and applications used to protect the confidentiality, integrity, and availability of data and information systems. (System integrity) [Applying]
Highly Developed Standard
Contrast common standards, procedures, and applications used to protect the confidentiality, integrity and availability of information and information systems. (System integrity) [Analyzing]

CEC-E02 [Essential] Analyze human facets that enable the exploitation of computing-based systems. [Analyzing]

Emerging Standard
Discuss human facets that enable the exploitation of computing-based systems. (Human dynamics) [Understanding]
Developed Standard
Analyze human facets that enable the exploitation of computing-based systems. (Human dynamics) [Analyzing]
Highly Developed Standard
Assess human facets that enable the exploitation of computing-based systems. (Human dynamics) [Evaluating]

CEC-S01 [Supplemental] Perform common malware analysis procedures on mobile and desktop computer systems. [Applying]

Emerging Standard
Differentiate common malware analysis procedures on mobile and desktop computer systems. (Malware and forensic analysis) [Understanding]
Developed Standard
Perform common malware analysis procedures on mobile and desktop computer systems. (Malware and forensic analysis) [Applying]
Highly Developed Standard
Examine common malware analysis procedures on mobile and desktop computer systems. (Malware and forensic analysis) [Analyzing]

DSA-S01 [Supplemental] Use appropriate data analysis methods to solve real-world problems. [Applying]

Emerging Standard
Describe appropriate data analysis methods to solve real-world problems. (Requirements and development) [Understanding]
Developed Standard
Use appropriate data analysis methods to solve real-world problems. (Requirements and development) [Applying]
Highly Developed Standard
Compare appropriate data analysis methods to solve real-world problems. (Requirements and development) [Analyzing]

DAT-LO-S06 [Supplemental] Apply symmetric and asymmetric cryptography, such as DES, Twofish, AES, RSA, ECC, and DSA for a given scenario. [Applying]

Emerging Standard
Developed Standard
Highly Developed Standard

IOT-S01 [Supplemental] Use wireless sensors within an ad-hoc network architecture to capture data within a multimedia system. [Applying]

Emerging Standard
Explain how wireless sensors are used within an ad-hoc network architecture to capture data within a multimedia system. (Wireless data acquisition) [Understanding]
Developed Standard
Use wireless sensors within an ad-hoc network architecture to capture data within a multimedia system. (Wireless data acquisition) [Applying]
Highly Developed Standard
Examine how wireless sensors are used within an ad-hoc network architecture to capture data within a multimedia system. (Wireless data acquisition) [Analyzing]

MAP-S01 [Supplemental] Discuss various implementation strategies for web applications, including an application programming interface (API) and a platform-independent interpreted code.[Understanding]

Emerging Standard
List various implementation strategies for web applications, including an application programming interface (API) and a platform-independent interpreted code. (Technologies) [Remembering]
Developed Standard
Discuss various implementation strategies for web applications, including an application programming interface (API) and a platform-independent interpreted code. (Technologies) [Understanding]
Highly Developed Standard
Compare various implementation strategies for web applications, including an application programming interface (API) and a platform-independent interpreted code. (Technologies) [Analyzing]

MAP-S02 [Supplemental] Produce a functional server-side application using several techniques for server-side programming. [Applying]

Emerging Standard
Produce a functional server-side application using at least one technique for server-side programming. (Design and Development) [Applying]
Developed Standard
Produce a functional server-side application using several techniques for server-side programming. (Design and Development) [Applying]
Highly Developed Standard
Integrate several techniques for server-side programming to produce a functional server-side application. (Design and Development) [Analyzing]

SDM-S01 [Supplemental] Use tools and services to develop computing systems that consider platform constraints, support version control, track requirements and bugs, and automate building. [Applying]

Emerging Standard
Explain tools and services to develop computing systems that consider platform constraints, supports version control, tracks requirements and bugs, and automates building. (Development) [Understanding]
Developed Standard
Use tools and services to develop computing systems that consider platform constraints, support version control, track requirements and bugs, and automate building. (Development) [Applying]
Highly Developed Standard
Compare tools and services to develop computing systems that consider platform constraints, supports version control, tracks requirements and bugs, and automates building. (Development) [Analyzing]

SRE-E01 [Essential] Discuss the roles that teamwork, ethics, and legal considerations play in an IT organization. [Understanding]

Emerging Standard
Define the roles that teamwork, ethics, and legal considerations play in an IT organization. (Teamwork, legal and ethical considerations) [Remembering]
Developed Standard
Discuss the roles that teamwork, ethics, and legal considerations play in an IT organization. (Teamwork, legal and ethical considerations) [Understanding]
Highly Developed Standard
Contrast the roles that teamwork, ethics, and legal considerations play in an IT organization. (Teamwork, legal and ethical considerations) [Analyzing]

SRE-E02 [Essential] Summarize how governmental and environmental regulations affect an organization's environment. [Understanding]

Emerging Standard
Recognize how governmental and environmental regulations affect an organization's environment. (Government and environment) [Remembering]
Developed Standard
Summarize how governmental and environmental regulations affect an organization's environment. (Government and environment) [Understanding]
Highly Developed Standard
Examine how governmental and environmental regulations affect an organization's environment. (Government and environment) [Analyzing]

SRE-S01 [Supplemental] Evaluate various security breaches and their effect on business operations. [Evaluating]

Emerging Standard
Analyze various security breaches and their effect on business operations. (Risk management) [Analyzing]
Developed Standard
Evaluate various security breaches and their effect on business operations. (Risk management) [Evaluating]
Highly Developed Standard
Develop countermeasures against various security breaches to minimize their effect on business operations. (Risk management) [Creating]

VSS-E01 [Essential] Contrast virtualized and non-virtualized platforms. [Analyzing]

Emerging Standard
Explain virtualized and non-virtualized platforms. (Technologies) [Understanding]
Developed Standard
Contrast virtualized and non-virtualized platforms. (Technologies) [Analyzing]
Highly Developed Standard
Choose the most appropriate virtualized and non-virtualized platform for various business requirements. (Technologies) [Evaluating]

VSS-E02 [Essential] Implement virtualization for desktops and servers. [Applying]

Emerging Standard
Explain virtualization for desktops and servers. (Install technologies) [Understanding]
Developed Standard
Implement virtualization for desktops and servers. (Install technologies) [Applying]
Highly Developed Standard
Compare virtualization for desktops and servers. (Install technologies) [Analyzing]

VSS-S01 [Supplemental] Implement a storage environment including appropriate performance measurement tools. [Applying]

Emerging Standard
Describe a storage environment including appropriate performance measurement tools. (Technologies and performance) [Understanding]
Developed Standard
Implement a storage environment including appropriate performance measurement tools. (Technologies and performance) [Applying]
Highly Developed Standard
Assess a storage environment including appropriate performance measurement tools. (Technologies and performance) [Evaluating]

VSS-S02 [Supplemental] Explain virtualization for applications and network platforms. [Understanding]

Emerging Standard
Explain virtualization for network platforms. (Install technologies) [Understanding]
Developed Standard
Explain virtualization for applications and network platforms. (Install technologies) [Understanding]
Highly Developed Standard
Implement virtualization for applications and network platforms. (Install technologies) [Applying]