Pages From IT Curricula 2017
Pages From IT Curricula 2017
Pages From IT Curricula 2017
Appendix B: Performances
Page 89 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
h. Recognize vulnerabilities, threats and risks that are distinct to network infrastructure, cloud computing servers, desktop computers, and
mobile devices.
i. Use a buffer-overflow attack against a server that reads an unbounded data into a fixed-size data structure.
j. Use a cross-site scripting attack against a server that does not properly sanitize user input prior to displaying the results in a browser.
Page 90 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
Page 91 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
Page 92 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
ITE-NET Networking
ITE-NET-01 Perspectives and impact
a. Describe networking and the research scope of networking study.
b. Identify some components of a network.
c. Name several network devices and describe their purpose.
d. Describe ways information technology uses or benefits from networks.
e. Illustrate the role of networks in information technology.
f. Identify people who influenced or contributed to the area of networks.
g. Identify several contributors to networks and relate their achievements to the area.
Page 93 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
Page 94 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
ITE-SPA-02 Requirements
a. Compare the various requirements modeling techniques.
b. Contrast between non-functional and functional requirements.
c. Demonstrate the structure of a detailed use case.
d. Express a use case based on relating functional requirements.
e. Illustrate the types of event flows in a use case and under which conditions they occur.
f. Describe how requirements gathering complements a system development lifecycle.
g. Describe how use cases drive testing throughout a system lifecycle.
Page 95 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
e. Describe how modeling tools support the description and management of architectural views with examples.
Page 96 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
Page 97 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
g. Demonstrate the advantages of user interface modalities other than windows, icons, menus and pointers in some situations.
ITE-WMS-02 Technologies
a. Describe the role of HTTP and HTTPS in the context of web applications.
b. Build a simple web site that
• organizes information effectively,
• uses valid HTML and CSS, and
• applies appropriate web standards from standards bodies such as W3C.
c. Develop a web or mobile application that
• uses industry-standard technologies,
• integrates serialized data in a structured format such as XML or JSON both synchronously and asynchronously,
• validates data inputs on the client- and server-side as appropriate,
• uses cookies,
• reads or modifies data in a server-side database, and
• uses JavaScript.
d. Express the constraints involved in state management (cookies, query strings, sessions) in the web and mobile context.
e. Contrast client-side with server-side security issues.
Page 98 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
ITE-WMS-06 Vulnerabilities
a. Illustrate browser security models including same-origin policy and thread models in web security.
b. Describe how authentication, secure certificates, and secure communication can be used in web sessions.
c. Instruct others on common types of vulnerabilities and attacks in web and mobile applications, such as
• using web page graphics as web beacons,
• using cookies to compromise privacy,
• denial of service attacks,
• cross-site scripting attacks, and
• SQL injection attacks.
d. Secure a web or mobile application and defend against common attacks using techniques such as
• client-side security capabilities,
• public key encryption,
• security certificates, and
• safely persisting user logins (such as “remember me” functionality).
e. Use accepted standards to ensure that user input on web pages does not affect server-side processes.
Page 99 of 163
Information Technology 2017 Final Curriculum Report
IT2017 2017 December 10
e. Describe storage advantages of internet small computer systems interface (iSCSI) over small computer systems interface (SCSI).
ITS-CCO-05 Architecture
a. Be aware of architecture principles of cloud computing service delivery.
b. Contrast cloud architectures to outsourcing (i.e., hosted) and shared services models.
c. Critique common change control guidelines and standards as they relate to cloud services.
d. Propose several ways of measuring cloud service performance and the importance of service level agreements.
e. Recognize the challenges of ‘big data’ analytics in the cloud.
f. Contrast single cloud vs. multiple cloud deployment models.
ITS-DSA-06 Application
a. Define an organizational problem as an analytics problem.
b. Describe how to best apply large-scale analytics methods and techniques in addressing strategic organizational problems.
c. Apply a data analytics lifecycle to a case study scenario.
d. Implement data-intensive computations on cluster and cloud infrastructures
e. Examine the impact of large-scale data analytics on organizational performance using case studies.
ITS-MAP-02 Architectures
a. Describe the global scope of architectures for different mobile systems.
b. Recognize the UI elements and the concepts glossary for mobile phones.
c. Illustrate each element of the mobile architecture framework.
ITS-SDM-04 Management
a. Argue for the importance of project management as it relates to software development.
b. Engage in team building and team management in a software development project.
c. Plan, monitor, and track progresses for a project activity using project management tools.
d. Assess, mitigate, and manage risks that affect decisions in the software development process.
e. Assess development effort and participate in process improvement by tracking commitments and managing project quality.
f. Use project metrics to monitor a project’s progress.
c. Analyze and describe steps to assess risks associated with security specified by accepted security standards.
d. Describe the costs associated with actions that can be taken to mitigate security risks.
ITS-VSS-08 Storage
a. Contrast the different storage environments and describe how they function.
b. Contrast the operational advantages and disadvantages of the storage alternatives.
c. Install and configure a storage environment and file system.
d. Evaluate the performance of storage and file systems against industry benchmarks.
e. Illustrate a tiered storage environment.