Apprentices progress at their own pace – they demonstrate
competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
Cyber Arts and Media Technician
Anonymous
Colorado (OA)
Work Process Content
On the Job Training
Anonymous
66
Skills
Safety Guidelines and Ethical Moral Protocols
4
Safety Guidelines and Ethical Moral Protocols
4
- Identify hazards associated with the workplace and record and report in accordance with organizational procedure.
- Understand all workplace safety requirements at all times.
- Understand and maintain all organizational security arrangements and approved procedures.
- Understand and comply with all emergency procedures in accordance with organizational policy.
Cyber Security Principles, Cyber Threats & Countermeasures
8
Cyber Security Principles, Cyber Threats & Countermeasures
8
- Analyze potential Intrusions; Denial of Service attacks; Apprentice(s) will demonstrate level of efficiencies utilizing open source cyber security software Forensic Toolkit (FTK) approved by Department of Defense (DoD) ; National Initiative Cybersecurity Education (NICE) ;National Institute Standards and Technology NIST
- Understand Basics of Phishing Attacks in Media, communicate level of knowledge in written project.
- Understand Preventing unauthorized access network infrastructure within Arts Venues Organizations. Knowledge communicated in written form.
- Uses principles of Avoiding suspicious and malicious sites in arts/film/media; written communication
- Displays awareness and understanding Risk Analysis in Arts Infrastructures; proficiencies assessed by knowledge, skills and ability (KSA) in FTK
- Observes proper mobile device operation for arts media content creation and access and communicates knowledge in written form
- Identifies and understands computer network defense (CND) utilizing open source vulnerability assessment tools and their capabilities. Assessed by KSA and operation in FTK
- Demonstrates skills in identifying measures of indicators of system network performance in arts venue infrastructures utilizing software application(s) in Forensic Tool Kit (FTK)
AP Computer Science Principles/Cybersecurity
5
AP Computer Science Principles/Cybersecurity
5
- Demonstrates knowledge of current industry methods for evaluating, analysis, and reporting outcomes for cybersecurity solutions. Written communication.
- Understands art venue/media outlet enterprise information technology (IT) goals and objectives. Observed in written communication.
- Shows knowledge of new and emerging information technology and information security principles. Utilizes FTK.
- Understands how cybersecurity is critical in venues/events environment and media content; displayed by policy observations and written communication.
- Shows knowledge of structured analysis principles and methods by observing and utilizing the appropriate principles and methods on the job.
Information Security and Secure Networking in Media
5
Information Security and Secure Networking in Media
5
- Shows knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Criminal Law Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), U.S. Statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed in written communication.
- Shows knowledge of information technology (IT) supply chain security/risk management policies, requirements, and procedures utilizing KSA in FTK software application.
- Demonstrates knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability in written communication.
- Demonstrates knowledge of relevant laws, policies, procedures, or governance as they relate to work that may Criminal Law impact critical infrastructure in written communication
- Shows knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth) in use of FTK software application.
Steganography and Applied Cryptography in Arts & Media
5
Steganography and Applied Cryptography in Arts & Media
5
- Demonstrates knowledge of secure coding techniques in use of open source software cybersecurity applications FTK; Linux; WireShark .
- Shows KSA in integrating black box security testing tools into quality assurance process of software releases in written communication.
- Shows KSA in using code analysis tools to eradicate bugs utilizing FTK open source software application.
- Shows knowledge, skills, abilities of root cause analysis for incidents in open source software application FTK.
- Shows knowledge of software-related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization) utilizing FTK.
Data Structures
6
Data Structures
6
- Shows KSA of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth) in both FTK open source software application and written communication.
- Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability shown in written communication.
- Knowledge of information technology (IT) supply chain security/risk management policies, requirements, and procedures in written communication.
- Knowledge of secure software deployment methodologies, tools, and practices in written communication.
- Analyze user needs and requirements to plan system architecture in written form.
- Develop information assurance (IA) designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data (e.g., UNCLASSIFIED, SECRET, and TOP SECRET) in written communication.
Symmetric & Public Key Encryption
5
Symmetric & Public Key Encryption
5
- Knowledge, Skills and Abilities (KSA) of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange[IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]), Utilize FTK; SANS Investigative Forensic Toolkit (SIFT); Sleuth Forensic Open Source applications.
- Displays KSA of cryptology in FTK; SIFT software applications
- Shows Knowledge of the Security Assessment and Authorization (SA&A) process in FTK; Sleuth
- Shows Knowledge of industry-standard and organizationally accepted analysis principles and methods utilizing FTK; Sleuth; SIFT software applications.
- Knowledge of organization's enterprise information security architecture system in written communication.
Risk Analysis & Management; Intrusion Detection
5
Risk Analysis & Management; Intrusion Detection
5
- Shows KSA of risk management processes, including steps and methods for assessing risk in FTK.
- Demonstrates knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools in use of FTK; Sleuth; SIFT Tools and software applications.
- Demonstrate Knowledge of information technology (IT) supply chain security/risk management policies, requirements, and procedures in written communication.
- Demonstrate Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools in written communication.
- Understand continuous analysis to identify network and system vulnerabilities utilizing scenarios and project based modules for arts organizations and media in open source applications FTK and Sleuth tool kits.
Cyber Ethics
5
Cyber Ethics
5
- Knowledge of relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure in written communication
- Displays knowledge of operations security in written communication
- Shows knowledge of information assurance (IA) principles used to manage risks related to the use, processing, storage, and transmission of information or data in both written communication and project-based formats utilizing FTK and SANS (SIFT).
- Utilizes knowledge of Privacy Impact Assessments (PIA) in written communication
- KSA of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS]) in FTK; SIFT; Sleuth toolkits.
Critical Media Production Infrastructure
6
Critical Media Production Infrastructure
6
- Explain knowledge of Global Systems for Mobile Communications (GSM) architecture in written communication
- Explain knowledge of how system components are installed, integrated, and optimized in written communication
- Explain knowledge of human-computer interaction principles in written communication
- Explain knowledge of information security systems engineering principles in written communication
- Display knowledge of local area network (LAN) and wide area network (WAN) principles and concepts, including bandwidth management
- Explain knowledge of organization's evaluation and validation requirements in written communication
Cybersecurity Reporting, Collection of Evidence and Chain of Custody
7
Cybersecurity Reporting, Collection of Evidence and Chain of Custody
7
- Displays knowledge, skills and ability in using information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, and encryption) shown in use of FTK and SIFT software application performance.
- Shows knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design in software Canvas by creation of chart design.
- Shows skill in designing security controls based on information assurance (IA) principles and tenets using FTK software.
- Knowledge of digital rights management in project based content creation utilizing open source software Audacity
- Shows knowledge, skills and abilities of the characteristics of physical and virtual data storage media utilizing FTK
- Shows knowledge, skills and abilities (KSA) of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools in FTK software application
- Shows KSA of digital media sources, characteristics, and uses of the organization’s data in production using FTK
Digital Archival Structures, Naming Conventions, Forensics for Arts Media, and Arts Venues
5
Digital Archival Structures, Naming Conventions, Forensics for Arts Media, and Arts Venues
5
- Understand and be able to perform indexing/cataloguing, storage, and access of organizational documents and historical materials in open source software application ArchiveSpace.
- Shows KSA of the capabilities and functionality associated with various content creation technologies (e.g., wikis, social networking, blogs) in written communication
- Use principal methods, procedures, and techniques of gathering information and producing, reporting, and storing digital archives for arts venues in ArchiveSpace open source software application
- Use knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption) in ArchiveSpace; FTK
- Display knowledge of embedded systems for digital archival purposes in use of ArchiveSpace; FTK, SIFT open source software application(s).
Related Instruction Content
Training Provider(s):
Cleo Parker Robinson Dance
510
RI hours
Apprenticeship Orientation
16
Apprenticeship Orientation
16
Including Workplace Safety and Anti-Harassment Training
CEH-Lab Work Basics
31
CEH-Lab Work Basics
31
Linux Basics
40
Linux Basics
40
UNIX Basics
35
UNIX Basics
35
PEN Basics
40
PEN Basics
40
Digital Forensics Advanced (Arts/Media/Entertainment)
150
Digital Forensics Advanced (Arts/Media/Entertainment)
150
Network Server Configuration
55
Network Server Configuration
55
Risk Analysis
30
Risk Analysis
30
Risk Management/Reporting
30
Risk Management/Reporting
30
E-Discovery/Litigation
85
E-Discovery/Litigation
85