Competency Framework |
Statement |
Information Technology Competency Model |
4.1 Principles of Information Technology: 4.1.1 Fundamental IT Concepts: 4.1.1.5 Understand concepts of server, desktop, application, and virtualization |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.9 Understand purpose and process of coding and tagging information |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.10 Demonstrate ability to find and select the information, appropriate tools, and processing techniques needed for a task |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.11 Understand logical and physical components of an information storage infrastructure |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.12 Explain the role and relationships of data, information, and databases in organizations, specifically their role in in business intelligence |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.13 Describe mechanisms for data collection and management, e.g., automated data collection, input forms, source documents, external devices, interfaces, relational characteristics, and dependencies |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.14 Assess the quality, accuracy, and timeliness of given data |
Information Technology Competency Model |
4.2 Databases and Applications: 4.2.18 Understand how other applications interact with databases to create and retrieve data |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.1 Identify and describe differences between Local Area Networks (LAN), Wide Area Networks (WAN), Virtual Private Networks (VPN), Internet, intranets, extranets, telephony, Voice over IP (VoIP), and other networks |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.5 Explain the purpose and properties of routing and switching |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.11 Describe the purpose of network configuration documentation |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.13 Explain the functionality, integrity, accessibility, and security of internet services |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.14 Explain different server roles, their purpose, and how they interact in a network context |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.15 Differentiate between Cloud-based applications, local server-based applications, and applications installed on a local computer, and know when to choose between them |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.1 Fundamentals of networking and telecommunication: 4.3.1.17 Identify common network infrastructure troubleshooting techniques |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.1 Recognize and describe threats to networked computer systems, including malware (viruses, spyware, adware) |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.2 Understand the purpose and basic features of a firewall, Intrusion Detection System (IDS), and Intrusion Protection System (IPS) |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.3 Recognize methods of network access security |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.3 Network Security: 4.3.3.4 Explain the importance of user authentication and recognize examples |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.1 Understand virtualization concepts, features, benefits, and considerations |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.2 Differentiate types of “cloud services”, including Infrastructure as a service (IaaS); Platform as a service (PaaS); and Software as a service (SaaS) |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.3 Differentiate between public, hybrid, and private clouds |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.4 Understand the following characteristics of clouds and clouds services from a business perspective: Distribution over the Internet |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.4 Virtualization and cloud computing: 4.3.4.6 Describe the impact of cloud computing on application architecture and the application-development process |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.2 Understand the rapid expansion of data and the challenge that places on IT systems |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.3 Explain the concepts of data backup, disaster recovery, data mirroring, and off-site storage |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.4 Describe different types of data storage solutions (e.g., RAID) |
Information Technology Competency Model |
4.3 Networks, Telecommunication, Wireless, and Mobility: 4.3.5 Data storage systems: 4.3.5.5 Describe common data backup and storage networking solutions (e.g., SAN, NAS, iSCSI) |
Information Technology Competency Model |
4.4 Software Development and Management: 4.4.3 Software acquisition, management, and maintenance: 4.4.3.5 Understand differences between enterprise hosted and outsourced software solutions, e.g., cloud |
Information Technology Competency Model |
4.4 Software Development and Management: 4.4.3 Software acquisition, management, and maintenance: 4.4.3.8 Be able to interact with software vendors and manage vendor relationships |
Information Technology Competency Model |
4.4 Software Development and Management: 4.4.3 Software acquisition, management, and maintenance: 4.4.3.10 Understand common business processes for installing, managing and maintaining enterprise software |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.1 Describe the importance of understanding different user groups and their perspectives, concerns, and technology uses |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.2 Demonstrate ability to communicate with users/customers for the purpose of assessing their needs and helping them solve problems |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.9 Demonstrate ability to troubleshoot problems in person or remotely |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.9 Demonstrate ability to troubleshoot problems in person or remotely |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.10 Analyze symptoms to identify broad area of user error or technical failure |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.11 Identify measurement techniques for increased productivity due to information support implementation |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.12 Identify and describe quality assurance concepts |
Information Technology Competency Model |
4.5 User and Customer Support: 4.5.13 Implements and provides guidance for the evolution of an IT solution (upgrades) |
Information Technology Competency Model |
4.7 Compliance: 4.7.3 Follow governance, risk management, and compliance procedures |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.2.6 Understand the importance of protecting data and information systems from accidental disclosure or destruction, unauthorized access or modification, and inappropriate use or malicious compromise |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.2.9 Explain importance of configuration management to security operations |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.2.11 Understand the need for controls and privileges based on an individual’s job duties |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.1 Describe major access control systems and their function |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.9 Demonstrate knowledge of system protection services like intrusion detection/prevention, communications filtering, firewall management, malware detection |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.11 Demonstrate knowledge of methods to protect web services |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.12 Demonstrate knowledge of security concepts for cloud services |
Information Technology Competency Model |
4.8 Risk Management, Security, and Information Assurance: 4.8.3 Security operations: 4.8.3.13 Explain use of encryption technology, e.g., PKI, hard drive encryption, data encryption, encryption-at-rest, and secure communications protocols |