Share this page with family, friends, and colleagues.
Featured Post : Zinc Learning Labs Resources Now on HigherEd.org + Discounted Subscriptions for HigherEd.org Users

  Back to Career Pathways

Information Technology (IT) Competency Framework

Read more about IT Career Pathway

The number of available resources are displayed in parentheses. Click on a competency to search for related learning resources then choose from the results. You may not need to learn every resource associated with a competency to achieve the competency.

Software Design

  • Demonstrate the techniques of defensive programming and secure coding. (15)
  • Use a programming or a scripting language to solve a problem. (22)
  • Use communication, negotiation, and collaboration skills as a member of a diverse team. (15)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (14)
  • Network Concepts

  • Carry out basic computer network troubleshooting techniques. (46)
  • Carry out trouble-shooting strategies for resolving an identified end-user IT problem. (31)
  • Demonstrate the techniques of defensive programming and secure coding. (17)
  • Describe the attitudes, knowledge and abilities associated with quality customer service. (17)
  • Describe the layers, protocols, and components of the OSI model. (21)
  • Diagram the components of an integrated IT system. (17)
  • Differentiate among data types, data transfer protocols and file characteristics specified to the targeted use. (20)
  • Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level. (6)
  • Differentiate among various computer networking models. (54)
  • Differentiate among various techniques for making a computer network secure. (86)
  • Discuss significant trends and emerging technologies and their impact on our global society. (12)
  • Explain the process of authentication and authorization between end-user devices and computing network resources. (38)
  • Identify a variety of enterprise-level digital storage technologies. (9)
  • Implement a hardware and software configuration responsive to an identified scenario. (34)
  • Summarize the flow of data through a computer network scenario. (46)
  • Summarize the implications of various cloud computing models. (13)
  • Summarize the security implications and risk for distributed IT systems. (21)
  • Summarize the tenets of ethics and professional behavior promoted by international computing societies. (11)
  • Use a variety of practices for making end-user systems secure. (78)
  • Microcomputer OS

  • Carry out trouble-shooting strategies for resolving an identified end-user IT problem. (53)
  • Describe the attitudes, knowledge and abilities associated with quality customer service. (14)
  • Differentiate among various operating systems. (43)
  • Explain the process of authentication and authorization between end-user devices and computing network resources. (26)
  • Implement an application of virtualization. (18)
  • Summarize the tenets of ethics and professional behavior promoted by international computing societies. (9)
  • Use a variety of practices for making end-user systems secure. (77)
  • Use communication, negotiation, and collaboration skills as a member of a diverse team. (11)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (21)
  • PCs & Troubleshooting

  • Carry out trouble-shooting strategies for resolving an identified end-user IT problem. (90)
  • Describe the attitudes, knowledge and abilities associated with quality customer service. (14)
  • Identify basic components of an end-user IT system. (40)
  • Summarize the tenets of ethics and professional behavior promoted by international computing societies. (9)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (68)
  • Web Page Design

  • Create a web site that incorporates the following as a minimum: HTML5, Proper heading information, Proper CSS code in line, embedded and external files (CSS 3 as a minimum), Unordered, ordered, description lists, images, tables, forms, internal and external web page links. (16)
  • Demonstrate best practices for designing end-user computing interfaces. (10)
  • Document the web site specifications. (6)
  • Use the FTP client to transfer files. (6)
  • Use the W3C Validator. (4)
  • Principles of IS

  • Demonstrate professional behavior in response to an ethically-challenging scenario in computing. (12)
  • Describe IT procurement processes for goods and services. (3)
  • Diagram the components of an integrated IT system. (5)
  • Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use. (7)
  • Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level. (6)
  • Differentiate among various operating systems. (28)
  • Differentiate between public and private data. (10)
  • Discuss issues relevant to dealing with very large data sets, both structured and unstructured. (5)
  • Discuss significant trends and emerging technologies and their impact on our global society. (6)
  • Discuss software development methodologies. (6)
  • Explain the process of authentication and authorization between end-user devices and computing network resources. (22)
  • Identify a variety of assistive or adaptive technologies and universal design considerations. (6)
  • Identify a variety of enterprise-level digital storage technologies. (5)
  • Identify basic components of an end-user IT system. (14)
  • Summarize life-cycle strategies for replacement, reuse, recycling IT technology and resources. (3)
  • Summarize strategies to support or train users with their IT resources. (5)
  • Summarize the differences among various programming languages. (11)
  • Summarize the implications of various cloud computing models. (10)
  • Summarize the role of IT in supporting the mission and goals of an organization. (4)
  • Summarize the security implications and risks for distributed IT systems. (11)
  • Use a variety of practices for making end-user systems secure. (52)
  • Use data analytics to support decision making for a given scenario. (4)
  • Network Adminstration

  • Differentiate among various operating systems. (47)
  • Differentiate among various techniques for making a computer network secure. (107)
  • Identify a variety of enterprise-level digital storage technologies. (27)
  • Database Fundamentals

  • Identify database administration tasks. (24)
  • Describe the data management activities associated with the data lifecycle. (25)
  • Diagram a database design based on an identified scenario. (20)
  • Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use. (15)
  • Discuss applications of data analytics. (13)
  • Discuss data governance and its implications for users as well as IT professionals. (6)
  • Discuss issues relevant to dealing with very large data sets, both structured and unstructured. (18)
  • Produce simple database queries. (24)
  • System Analysis

  • Carry out trouble-shooting strategies for resolving an identified end-user IT problem. (30)
  • Demonstrate best practices for designing end-user computing interfaces. (5)
  • Demonstrate professional behavior in response to an ethically-challenging scenario in computing. (12)
  • Describe IT procurement processes for goods and services. (4)
  • Describe the attitudes, knowledge and abilities associated with quality customer service. (15)
  • Describe the data management activities associated with the data lifecycle. (9)
  • Diagram a database design based on an identified scenario. (9)
  • Diagram the components of an integrated IT system. (8)
  • Diagram the phases of the 'Secure Software Development Lifecycle.' (8)
  • Differentiate among various techniques for making a computer network secure. (68)
  • Discuss software development methodologies. (8)
  • Identify a variety of assistive or adaptive technologies and universal design considerations. (7)
  • Identify a variety of enterprise-level digital storage technologies. (4)
  • Identify basic components of an end-user IT system. (24)
  • Identify database administration tasks. (6)
  • Implement a hardware and software configuration responsive to an identified scenario. (30)
  • Modify a system to improve data confidentiality or regulatory compliance. (23)
  • Produce technical documentation responsive to an identified computing scenario. (6)
  • Summarize life-cycle strategies for replacement, reuse, recycling IT technology and resources. (4)
  • Summarize strategies to support or train users with their IT resources. (9)
  • Summarize the implications of various cloud computing models. (9)
  • Summarize the role of IT in supporting the mission and goals of an organization. (5)
  • Use a programming or a scripting language to share data across an integrated IT system. (9)
  • Use a programming or a scripting language to solve a problem. (16)
  • Use communication, negotiation, and collaboration skills as a member of a diverse team. (14)
  • Use data analytics to support decision making for a given scenario. (6)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (27)
  • Network Security Basics

  • Carry out basic computer network troubleshooting techniques on a security related issue. (34)
  • Describe the data management activities associated with the data lifecycle from a security perspective. (14)
  • Diagram the components of an integrated IT system used to exercise good security. (25)
  • Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use. (In this case secured transfers.) (7)
  • Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level. (12)
  • Differentiate among various techniques for making a computer network secure. (105)
  • Differentiate between public and private data. (20)
  • Explain the process of authentication and authorization between end-user devices and computing network resources. (38)
  • Implement a hardware and software configuration responsive to an identified scenario. (44)
  • Modify a system to improve data confidentiality or regulatory compliance. (44)
  • Summarize the security implications and risks for distributed IT systems. (31)
  • Summarize the tenets of ethics and professional behavior promoted by international computing societies. (11)
  • Use a variety of practices for making end-user systems secure. (101)
  • Attacks & Crimes

  • Demonstrate professional behavior in response to an ethically challenging scenario in computing. (17)
  • Describe the layers, protocols and components of the OSI model. (14)
  • Summarize the flow of data through a computer network scenario. (18)
  • Summarize the security implications and risks for distributed IT systems. (16)
  • Summarize the tenets of ethics and professional behavior promoted by international computing societies. (8)
  • Use a programming or a scripting language to share data across an integrated IT system. (11)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (8)
  • Access & Authentication

  • Differentiate between public and private data. (12)
  • Explain the process of authentication and authorization between end user devices and computing network resources. (49)
  • Modify a system to improve data confidentiality or regulatory compliance. (39)
  • Summarize the flow of data through a computer network scenario. (29)
  • Use a variety of practices for making end user systems secure. (56)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (8)
  • Firewalls & E-Commerce

  • Differentiate among various techniques for making a computer network secure. (57)
  • Modify a system to improve data confidentiality or regulatory compliance. (39)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (21)
  • Network Security Layers

  • Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level. (6)
  • Differentiate among various techniques for making a computer network secure. (86)
  • Implement a hardware and software configuration responsive to an identified scenario. (30)
  • Modify a system to improve data confidentiality or regulatory compliance. (31)
  • Summarize the security implications and risks for distributed IT systems. (15)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (10)
  • Legal Topics

  • Demonstrate professional behavior in response to an ethically challenging scenario in computing. (13)
  • Modify a system to improve data confidentiality or regulatory compliance. (17)
  • Summarize the security implications and risks for distributed IT systems. (15)
  • Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. (6)
  • Linux OS

  • Demonstrate the techniques of defensive programming and secure coding. (82)
  • Implement an application of virtualization. (81)