|
K0018
|
Knowledge of encryption algorithms |
10 |
|
K0055
|
Knowledge of microprocessors |
3 |
|
K0064
|
Knowledge of performance tuning tools and techniques |
1 |
|
K0068
|
Knowledge of programming language structures and logic |
7 |
|
K0092
|
Knowledge of technology integration processes |
2 |
|
K0159
|
Knowledge of Voice over IP (VoIP) |
1 |
|
K0176
|
Knowledge of eXtensible Markup Language (XML) schemas |
1 |
|
K0375
|
Knowledge of wireless applications vulnerabilities |
0 |
|
K0470
|
Knowledge of Internet and routing protocols |
0 |
|
K0476
|
Knowledge of language processing tools and techniques |
1 |
|
K0480
|
Knowledge of malware |
1 |
|
K0498
|
Knowledge of operational planning processes |
6 |
|
K0635
|
Knowledge of decryption |
2 |
|
K0636
|
Knowledge of decryption tools and techniques |
3 |
|
K0637
|
Knowledge of data repositories |
2 |
|
K0638
|
Knowledge of security awareness programs |
1 |
|
K0639
|
Knowledge of code tailoring tools and techniques |
1 |
|
K0640
|
Knowledge of the organizational cybersecurity workforce |
2 |
|
K0641
|
Knowledge of market research tools and techniques |
1 |
|
K0642
|
Knowledge of pricing structures |
1 |
|
K0643
|
Knowledge of virtual learning environments |
2 |
|
K0644
|
Knowledge of cybersecurity operation policies and procedures |
5 |
|
K0645
|
Knowledge of standard operating procedures (SOPs) |
3 |
|
K0646
|
Knowledge of system optimization techniques |
2 |
|
K0647
|
Knowledge of data visualization tools and techniques |
1 |
|
K0648
|
Knowledge of career paths |
1 |
|
K0649
|
Knowledge of organizational career progressions |
1 |
|
K0650
|
Knowledge of supplier assessment criteria |
3 |
|
K0651
|
Knowledge of trustworthiness principles |
3 |
|
K0652
|
Knowledge of workforce trends |
1 |
|
K0653
|
Knowledge of cybersecurity practices in the acquisition process |
6 |
|
K0654
|
Knowledge of target audience requirements |
2 |
|
K0655
|
Knowledge of intelligence fusion |
2 |
|
K0656
|
Knowledge of network collection tools and techniques |
1 |
|
K0657
|
Knowledge of network collection policies and procedures |
1 |
|
K0658
|
Knowledge of cognitive biases |
2 |
|
K0659
|
Knowledge of information privacy technologies |
4 |
|
K0660
|
Knowledge of appropriate use policies and procedures |
0 |
|
K0661
|
Knowledge of reauthorization processes |
0 |
|
K0662
|
Knowledge of systems security engineering |
0 |
|
K0663
|
Knowledge of industry standards and best practices |
1 |
|
K0664
|
Knowledge of stakeholder management |
0 |
|
K0666
|
Knowledge of system security plans |
0 |
|
K0667
|
Knowledge of contracts |
0 |
|
K0668
|
Knowledge of contract management |
0 |
|
K0669
|
Knowledge of contractor management |
0 |
|
K0670
|
Knowledge of life cycle development milestones |
0 |
|
K0671
|
Knowledge of Communications Security (COMSEC) policies and procedures |
1 |
|
K0672
|
Knowledge of the Communications Security (COMSEC) Material Control System (CMCS) |
1 |
|
K0673
|
Knowledge of types of Communications Security (COMSEC) incidents |
1 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0685
|
Knowledge of access control principles and practices |
21 |
|
K0686
|
Knowledge of authentication and authorization tools and techniques |
21 |
|
K0687
|
Knowledge of business operations standards and best practices |
5 |
|
K0688
|
Knowledge of common application vulnerabilities |
5 |
|
K0689
|
Knowledge of network infrastructure principles and practices |
9 |
|
K0690
|
Knowledge of requirements analysis principles and practices |
6 |
|
K0691
|
Knowledge of cyber defense tools and techniques |
7 |
|
K0692
|
Knowledge of vulnerability assessment tools and techniques |
7 |
|
K0693
|
Knowledge of complex data structure capabilities and applications |
3 |
|
K0694
|
Knowledge of computer algorithm capabilities and applications |
5 |
|
K0695
|
Knowledge of programming principles and practices |
3 |
|
K0696
|
Knowledge of digital forensic data principles and practices |
4 |
|
K0697
|
Knowledge of encryption algorithm capabilities and applications |
3 |
|
K0698
|
Knowledge of cryptographic key management principles and practices |
10 |
|
K0699
|
Knowledge of data administration policies and procedures |
2 |
|
K0700
|
Knowledge of data standardization policies and procedures |
2 |
|
K0701
|
Knowledge of data backup and recovery policies and procedures |
8 |
|
K0702
|
Knowledge of data warehousing principles and practices |
3 |
|
K0703
|
Knowledge of data mining principles and practices |
4 |
|
K0704
|
Knowledge of database management system (DBMS) principles and practices |
2 |
|
K0705
|
Knowledge of database query language capabilities and applications |
2 |
|
K0706
|
Knowledge of database schema capabilities and applications |
2 |
|
K0707
|
Knowledge of database systems and software |
9 |
|
K0708
|
Knowledge of digital rights management (DRM) tools and techniques |
2 |
|
K0709
|
Knowledge of business continuity and disaster recovery (BCDR) policies and procedures |
5 |
|
K0710
|
Knowledge of enterprise cybersecurity architecture principles and practices |
20 |
|
K0711
|
Knowledge of evaluation and validation principles and practices |
7 |
|
K0712
|
Knowledge of Local Area Networks (LAN) |
6 |
|
K0713
|
Knowledge of Wide Area Networks (WAN) |
6 |
|
K0714
|
Knowledge of electrical engineering principles and practices |
3 |
|
K0715
|
Knowledge of resiliency and redundancy principles and practices |
2 |
|
K0716
|
Knowledge of host access control (HAC) systems and software |
10 |
|
K0717
|
Knowledge of network access control (NAC) systems and software |
10 |
|
K0718
|
Knowledge of network communications principles and practices |
10 |
|
K0719
|
Knowledge of human-computer interaction (HCI) principles and practices |
4 |
|
K0720
|
Knowledge of Assessment and Authorization (A&A) processes |
5 |
|
K0721
|
Knowledge of risk management principles and practices |
19 |
|
K0722
|
Knowledge of software development principles and practices |
3 |
|
K0723
|
Knowledge of vulnerability data sources |
5 |
|
K0724
|
Knowledge of incident response principles and practices |
8 |
|
K0725
|
Knowledge of incident response tools and techniques |
8 |
|
K0726
|
Knowledge of incident handling tools and techniques |
8 |
|
K0727
|
Knowledge of analysis standards and best practices |
7 |
|
K0728
|
Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices |
20 |
|
K0729
|
Knowledge of non-repudiation principles and practices |
20 |
|
K0730
|
Knowledge of cyber safety principles and practices |
20 |
|
K0731
|
Knowledge of systems security engineering (SSE) principles and practices |
13 |
|
K0732
|
Knowledge of intrusion detection tools and techniques |
4 |
|
K0733
|
Knowledge of information technology (IT) architecture models and frameworks |
4 |
|
K0734
|
Knowledge of Risk Management Framework (RMF) requirements |
14 |
|
K0735
|
Knowledge of risk management models and frameworks |
13 |
|
K0736
|
Knowledge of information technology (IT) security principles and practices |
18 |
|
K0737
|
Knowledge of bandwidth management tools and techniques |
5 |
|
K0738
|
Knowledge of low-level programming languages |
3 |
|
K0739
|
Knowledge of mathematics principles and practices |
7 |
|
K0740
|
Knowledge of system performance indicators |
4 |
|
K0741
|
Knowledge of system availability measures |
4 |
|
K0742
|
Knowledge of identity and access management (IAM) principles and practices |
10 |
|
K0743
|
Knowledge of new and emerging technologies |
15 |
|
K0744
|
Knowledge of operating system (OS) systems and software |
16 |
|
K0745
|
Knowledge of parallel and distributed computing principles and practices |
5 |
|
K0746
|
Knowledge of policy-based access controls |
15 |
|
K0747
|
Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC) |
15 |
|
K0748
|
Knowledge of Privacy Impact Assessment (PIA) principles and practices |
5 |
|
K0749
|
Knowledge of process engineering principles and practices |
13 |
|
K0750
|
Knowledge of query languages |
2 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0753
|
Knowledge of remote access principles and practices |
2 |
|
K0754
|
Knowledge of resource management principles and practices |
7 |
|
K0755
|
Knowledge of configuration management (CM) tools and techniques |
4 |
|
K0756
|
Knowledge of security management principles and practices |
6 |
|
K0757
|
Knowledge of system design tools and techniques |
8 |
|
K0758
|
Knowledge of server administration principles and practices |
13 |
|
K0759
|
Knowledge of client and server architecture |
16 |
|
K0760
|
Knowledge of server diagnostic tools and techniques |
6 |
|
K0761
|
Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques |
5 |
|
K0762
|
Knowledge of software debugging principles and practices |
3 |
|
K0763
|
Knowledge of software design tools and techniques |
2 |
|
K0764
|
Knowledge of software development models and frameworks |
3 |
|
K0765
|
Knowledge of software engineering principles and practices |
15 |
|
K0766
|
Knowledge of data asset management principles and practices |
5 |
|
K1167
|
Knowledge of data sanitization methods |
0 |
|
K0767
|
Knowledge of structured analysis principles and practices |
5 |
|
K0768
|
Knowledge of automated systems analysis tools and techniques |
5 |
|
K0769
|
Knowledge of system design standards and best practices |
4 |
|
K0770
|
Knowledge of system administration principles and practices |
14 |
|
K0771
|
Knowledge of system life cycle management principles and practices |
9 |
|
K0772
|
Knowledge of systems testing and evaluation tools and techniques |
7 |
|
K0773
|
Knowledge of telecommunications principles and practices |
14 |
|
K0774
|
Knowledge of content creation tools and techniques |
1 |
|
K0775
|
Knowledge of information management tools and techniques |
2 |
|
K0776
|
Knowledge of collaboration tools and techniques |
2 |
|
K0777
|
Knowledge of data storage media characteristics |
1 |
|
K0778
|
Knowledge of enterprise information technology (IT) architecture principles and practices |
20 |
|
K0779
|
Knowledge of systems engineering processes |
14 |
|
K0780
|
Knowledge of hardware maintenance policies and procedures |
2 |
|
K0781
|
Knowledge of virtual private network (VPN) systems and software |
4 |
|
K0782
|
Knowledge of web service protocols |
2 |
|
K0783
|
Knowledge of network attack characteristics |
7 |
|
K0784
|
Knowledge of insider threat laws and regulations |
7 |
|
K0785
|
Knowledge of insider threat tools and techniques |
7 |
|
K0786
|
Knowledge of physical computer components |
4 |
|
K0787
|
Knowledge of computer peripherals |
4 |
|
K0788
|
Knowledge of adversarial tactics principles and practices |
3 |
|
K0789
|
Knowledge of adversarial tactics tools and techniques |
3 |
|
K0790
|
Knowledge of adversarial tactics policies and procedures |
3 |
|
K0791
|
Knowledge of defense-in-depth principles and practices |
19 |
|
K0792
|
Knowledge of network configurations |
9 |
|
K0793
|
Knowledge of file extensions |
4 |
|
K0794
|
Knowledge of file system implementation principles and practices |
3 |
|
K0795
|
Knowledge of digital evidence seizure policies and procedures |
3 |
|
K0796
|
Knowledge of digital evidence preservation policies and procedures |
3 |
|
K0797
|
Knowledge of ethical hacking tools and techniques |
4 |
|
K0798
|
Knowledge of program management principles and practices |
2 |
|
K0799
|
Knowledge of project management principles and practices |
2 |
|
K0800
|
Knowledge of evidence admissibility laws and regulations |
7 |
|
K0801
|
Knowledge of cognitive domain models and frameworks |
2 |
|
K0802
|
Knowledge of chain of custody policies and procedures |
4 |
|
K0803
|
Knowledge of supply chain risk management principles and practices |
17 |
|
K0804
|
Knowledge of persistent data principles and practices |
3 |
|
K0805
|
Knowledge of command-line tools and techniques |
6 |
|
K0806
|
Knowledge of machine virtualization tools and techniques |
6 |
|
K0807
|
Knowledge of web mail tools and techniques |
1 |
|
K0808
|
Knowledge of system file characteristics |
2 |
|
K0809
|
Knowledge of digital forensics data characteristics |
3 |
|
K0810
|
Knowledge of deployable forensics principles and practices |
3 |
|
K0811
|
Knowledge of web filtering systems and software |
2 |
|
K0812
|
Knowledge of digital communication systems and software |
9 |
|
K0813
|
Knowledge of interpreted and compiled programming language characteristics |
7 |
|
K0814
|
Knowledge of secure coding tools and techniques |
6 |
|
K0815
|
Knowledge of intelligence collection management processes |
1 |
|
K0816
|
Knowledge of front-end intelligence collection systems and software |
1 |
|
K0817
|
Knowledge of event correlation tools and techniques |
1 |
|
K0818
|
Knowledge of new and emerging cybersecurity risks |
6 |
|
K0819
|
Knowledge of import and export control laws and regulations |
8 |
|
K0820
|
Knowledge of supply chain risks |
18 |
|
K0821
|
Knowledge of federal agency roles and responsibilities |
9 |
|
K0822
|
Knowledge of risk tolerance principles and practices |
2 |
|
K0823
|
Knowledge of incident response policies and procedures |
2 |
|
K0824
|
Knowledge of incident response roles and responsibilities |
2 |
|
K0825
|
Knowledge of threat vector characteristics |
6 |
|
K0826
|
Knowledge of software security principles and practices |
2 |
|
K0827
|
Knowledge of software quality assurance (SQA) principles and practices |
3 |
|
K0828
|
Knowledge of supply chain risk management standards and best practices |
16 |
|
K0829
|
Knowledge of account creation policies and procedures |
6 |
|
K0830
|
Knowledge of password policies and procedures |
6 |
|
K0831
|
Knowledge of network attack vectors |
8 |
|
K0832
|
Knowledge of cyberattack characteristics |
3 |
|
K0833
|
Knowledge of cyberattack actor characteristics |
4 |
|
K0834
|
Knowledge of technology procurement principles and practices |
11 |
|
K0835
|
Knowledge of risk assessment principles and practices |
8 |
|
K0836
|
Knowledge of threat assessment principles and practices |
7 |
|
K0837
|
Knowledge of hardening tools and techniques |
14 |
|
K0838
|
Knowledge of supply chain risk management policies and procedures |
13 |
|
K0839
|
Knowledge of critical infrastructure systems and software |
13 |
|
K0840
|
Knowledge of hardware reverse engineering tools and techniques |
15 |
|
K0841
|
Knowledge of middleware software capabilities and applications |
1 |
|
K0842
|
Knowledge of software reverse engineering tools and techniques |
15 |
|
K0844
|
Knowledge of cyberattack stages |
4 |
|
K0845
|
Knowledge of cyber intrusion activity phases |
4 |
|
K0846
|
Knowledge of secure software deployment principles and practices |
3 |
|
K0847
|
Knowledge of secure software deployment tools and techniques |
3 |
|
K0848
|
Knowledge of network systems management principles and practices |
8 |
|
K0849
|
Knowledge of network systems management tools and techniques |
8 |
|
K0850
|
Knowledge of data carving tools and techniques |
2 |
|
K0851
|
Knowledge of reverse engineering principles and practices |
15 |
|
K0852
|
Knowledge of anti-forensics tools and techniques |
2 |
|
K0853
|
Knowledge of forensics lab design principles and practices |
2 |
|
K0854
|
Knowledge of forensics lab design systems and software |
2 |
|
K0855
|
Knowledge of debugging tools and techniques |
2 |
|
K0856
|
Knowledge of filename extension abuse |
2 |
|
K0857
|
Knowledge of malware analysis tools and techniques |
4 |
|
K0858
|
Knowledge of virtual machine detection tools and techniques |
6 |
|
K0859
|
Knowledge of encryption tools and techniques |
13 |
|
K0860
|
Knowledge of malware signature principles and practices |
1 |
|
K0861
|
Knowledge of network port capabilities and applications |
1 |
|
K0862
|
Knowledge of data remediation tools and techniques |
3 |
|
K0863
|
Knowledge of cloud computing principles and practices |
6 |
|
K0864
|
Knowledge of knowledge management principles and practices |
6 |
|
K0865
|
Knowledge of data classification standards and best practices |
18 |
|
K0866
|
Knowledge of data classification tools and techniques |
18 |
|
K0867
|
Knowledge of database application programming interfaces (APIs) |
2 |
|
K0868
|
Knowledge of process improvement principles and practices |
6 |
|
K0869
|
Knowledge of process maturity models and frameworks |
6 |
|
K0870
|
Knowledge of enterprise architecture (EA) reference models and frameworks |
20 |
|
K0871
|
Knowledge of enterprise architecture (EA) principles and practices |
20 |
|
K0872
|
Knowledge of service management principles and practices |
11 |
|
K0873
|
Knowledge of service management standards and best practices |
11 |
|
K0874
|
Knowledge of key management service (KMS) principles and practices |
3 |
|
K0875
|
Knowledge of symmetric encryption principles and practices |
3 |
|
K0876
|
Knowledge of key management service (KMS) key rotation policies and procedures |
3 |
|
K0877
|
Knowledge of application firewall principles and practices |
12 |
|
K0878
|
Knowledge of network firewall principles and practices |
12 |
|
K0879
|
Knowledge of industry cybersecurity models and frameworks |
9 |
|
K0880
|
Knowledge of access control models and frameworks |
9 |
|
K0881
|
Knowledge of learning assessment tools and techniques |
7 |
|
K0882
|
Knowledge of ethical hacking principles and practices |
2 |
|
K0883
|
Knowledge of circuit analysis tools and techniques |
1 |
|
K0884
|
Knowledge of covert communication tools and techniques |
2 |
|
K0885
|
Knowledge of instructional design principles and practices |
4 |
|
K0886
|
Knowledge of instructional design models and frameworks |
4 |
|
K0887
|
Knowledge of training policies and procedures |
3 |
|
K0888
|
Knowledge of Bloom's Taxonomy learning levels |
2 |
|
K0889
|
Knowledge of learning management system (LMS) systems and software |
2 |
|
K0890
|
Knowledge of learning modes |
2 |
|
K0891
|
Knowledge of the Open Systems Interconnect (OSI) reference model |
13 |
|
K0892
|
Knowledge of cyber defense laws and regulations |
13 |
|
K0893
|
Knowledge of training systems and software |
3 |
|
K0894
|
Knowledge of computer architecture principles and practices |
4 |
|
K0895
|
Knowledge of taxonomy models and frameworks |
1 |
|
K0896
|
Knowledge of semantic ontology models and frameworks |
1 |
|
K0897
|
Knowledge of logging tools and technologies |
1 |
|
K0898
|
Knowledge of cloud service models and frameworks |
2 |
|
K0899
|
Knowledge of crisis management protocols |
1 |
|
K0900
|
Knowledge of crisis management processes |
1 |
|
K0901
|
Knowledge of crisis management tools and techniques |
1 |
|
K0902
|
Knowledge of the NIST Workforce Framework for Cybersecurity (NICE Framework) |
1 |
|
K0903
|
Knowledge of service desk principles and practices |
1 |
|
K0904
|
Knowledge of machine learning principles and practices |
1 |
|
K0905
|
Knowledge of media production tool and techniques |
2 |
|
K0906
|
Knowledge of multi-level security (MLS) systems and software |
2 |
|
K0907
|
Knowledge of cross-domain solutions |
2 |
|
K0908
|
Knowledge of human resources policies and procedures |
1 |
|
K0909
|
Knowledge of abnormal physical and physiological behaviors |
2 |
|
K0910
|
Knowledge of needs assessment principles and practices |
2 |
|
K0911
|
Knowledge of remote access tools and techniques |
2 |
|
K0912
|
Knowledge of sustainment principles and practices |
1 |
|
K0913
|
Knowledge of sustainment processes |
1 |
|
K0914
|
Knowledge of binary analysis tools and techniques |
3 |
|
K0915
|
Knowledge of network architecture principles and practices |
21 |
|
K0916
|
Knowledge of malware analysis principles and practices |
4 |
|
K0917
|
Knowledge of Personally Identifiable Information (PII) data security standards and best practices |
15 |
|
K0918
|
Knowledge of Payment Card Industry (PCI) data security standards and best practices |
16 |
|
K0919
|
Knowledge of Personal Health Information (PHI) data security standards and best practices |
16 |
|
K0920
|
Knowledge of risk management policies and procedures |
7 |
|
K0921
|
Knowledge of program protection plan (PPP) principles and practices |
2 |
|
K0922
|
Knowledge of the acquisition life cycle models and frameworks |
7 |
|
K0923
|
Knowledge of operating system structures and internals |
7 |
|
K0924
|
Knowledge of network analysis tools and techniques |
7 |
|
K0925
|
Knowledge of wireless communication tools and techniques |
6 |
|
K0926
|
Knowledge of signal jamming tools and techniques |
6 |
|
K0927
|
Knowledge of configuration management tools and techniques |
3 |
|
K0928
|
Knowledge of systems engineering principles and practices |
13 |
|
K0929
|
Knowledge of content synchronization tools and techniques |
1 |
|
K0930
|
Knowledge of credential management systems and software |
1 |
|
K0931
|
Knowledge of data-at-rest encryption (DAR) standards and best practices |
2 |
|
K0932
|
Knowledge of cryptographic key storage systems and software |
2 |
|
K0933
|
Knowledge of N-tier architecture principles and practices |
2 |
|
K0934
|
Knowledge of data classification policies and procedures |
18 |
|
K0935
|
Knowledge of incident, event, and problem management policies and procedures |
2 |
|
K0936
|
Knowledge of network hardware threats and vulnerabilities |
3 |
|
K0937
|
Knowledge of countermeasure design principles and practices |
3 |
|
K0938
|
Knowledge of network mapping principles and practices |
1 |
|
K0939
|
Knowledge of packet-level analysis tools and techniques |
3 |
|
K0940
|
Knowledge of subnet tools and techniques |
1 |
|
K0941
|
Knowledge of data concealment tools and techniques |
1 |
|
K0942
|
Knowledge of cryptology principles and practices |
10 |
|
K0943
|
Knowledge of industry indicators |
2 |
|
K0944
|
Knowledge of intelligence data gathering principles and practices |
1 |
|
K0945
|
Knowledge of intelligence data gathering policies and procedures |
1 |
|
K0946
|
Knowledge of incident reporting policies and procedures |
2 |
|
K0947
|
Knowledge of computer engineering principles and practices |
14 |
|
K0948
|
Knowledge of embedded systems and software |
9 |
|
K0949
|
Knowledge of fault tolerance tools and techniques |
2 |
|
K0950
|
Knowledge of Intrusion Detection System (IDS) tools and techniques |
2 |
|
K0951
|
Knowledge of Intrusion Prevention System (IPS) tools and techniques |
2 |
|
K0952
|
Knowledge of information theory principles and practices |
5 |
|
K0953
|
Knowledge of data mining tools and techniques |
3 |
|
K0954
|
Knowledge of foreign disclosure policies and procedures |
1 |
|
K0955
|
Knowledge of penetration testing principles and practices |
8 |
|
K0956
|
Knowledge of penetration testing tools and techniques |
8 |
|
K0957
|
Knowledge of root cause analysis tools and techniques |
2 |
|
K0958
|
Knowledge of system integration principles and practices |
1 |
|
K0959
|
Knowledge of operational design principles and practices |
1 |
|
K0960
|
Knowledge of content management system (CMS) capabilities and applications |
1 |
|
K0961
|
Knowledge of planning systems and software |
0 |
|
K0962
|
Knowledge of targeting laws and regulations |
11 |
|
K0963
|
Knowledge of exploitation laws and regulations |
11 |
|
K0965
|
Knowledge of language analysis tools and techniques |
1 |
|
K0966
|
Knowledge of voice analysis tools and techniques |
1 |
|
K0967
|
Knowledge of graphic materials analysis tools and techniques |
1 |
|
K0968
|
Knowledge of analytic standards and frameworks |
0 |
|
K0969
|
Knowledge of cyber-attack tools and techniques |
7 |
|
K0970
|
Knowledge of auditing policies and procedures |
0 |
|
K0971
|
Knowledge of logging policies and procedures |
0 |
|
K0973
|
Knowledge of system persistence tools and techniques |
1 |
|
K0977
|
Knowledge of intelligence collection management tools and techniques |
1 |
|
K0979
|
Knowledge of information searching tools and techniques |
2 |
|
K0980
|
Knowledge of intelligence collection sources |
1 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K0984
|
Knowledge of web security principles and practices |
1 |
|
K0986
|
Knowledge of target selection criticality factors |
1 |
|
K0987
|
Knowledge of target selection vulnerability factors |
1 |
|
K0988
|
Knowledge of active defense tools and techniques |
0 |
|
K0989
|
Knowledge of intelligence information repositories |
1 |
|
K0990
|
Knowledge of cyber operations principles and practices |
8 |
|
K0991
|
Knowledge of database administration principles and practices |
3 |
|
K0992
|
Knowledge of database maintenance principles and practices |
3 |
|
K0993
|
Knowledge of deconfliction processes |
0 |
|
K0994
|
Knowledge of denial and deception tools and techniques |
1 |
|
K0998
|
Knowledge of Wireless Local Area Network (WLAN) tools and techniques |
0 |
|
K0999
|
Knowledge of information management principles and practices |
0 |
|
K1000
|
Knowledge of evasion principles and practices |
0 |
|
K1001
|
Knowledge of evasion tools and techniques |
0 |
|
K1002
|
Knowledge of supervisory control and data acquisition (SCADA) systems and software |
1 |
|
K1004
|
Knowledge of reporting policies and procedures |
2 |
|
K1005
|
Knowledge of intelligence collection capabilities and applications |
1 |
|
K1007
|
Knowledge of intelligence requirements tasking systems and software |
1 |
|
K1008
|
Knowledge of intelligence support activities |
1 |
|
K1009
|
Knowledge of threat intelligence principles and practices |
1 |
|
K1010
|
Knowledge of intelligence policies and procedures |
1 |
|
K1011
|
Knowledge of network addressing principles and practices |
1 |
|
K1012
|
Knowledge of malware characteristics |
0 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1015
|
Knowledge of network topology principles and practices |
0 |
|
K1016
|
Knowledge of code obfuscation tools and techniques |
2 |
|
K1017
|
Knowledge of operational effectiveness assessment principles and practices |
0 |
|
K1019
|
Knowledge of operations security (OPSEC) principles and practices |
2 |
|
K1020
|
Knowledge of organization decision support tools and techniques |
0 |
|
K1021
|
Knowledge of resource and asset readiness reporting policies and procedures |
0 |
|
K1023
|
Knowledge of network exploitation tools and techniques |
3 |
|
K1024
|
Knowledge of partnership policies and procedures |
0 |
|
K1025
|
Knowledge of decision-making policies and procedures |
2 |
|
K1026
|
Knowledge of requirements submission processes |
0 |
|
K1027
|
Knowledge of post implementation review (PIR) processes |
0 |
|
K1028
|
Knowledge of target development principles and practices |
1 |
|
K1030
|
Knowledge of operational planning tools and techniques |
1 |
|
K1031
|
Knowledge of risk mitigation tools and techniques |
1 |
|
K1032
|
Knowledge of satellite-based communication systems and software |
3 |
|
K1033
|
Knowledge of scripting principles and practices |
0 |
|
K1034
|
Knowledge of target language |
1 |
|
K1035
|
Knowledge of target research tools and techniques |
1 |
|
K1045
|
Knowledge of tasking processes |
0 |
|
K1049
|
Knowledge of routing protocols |
3 |
|
K1050
|
Knowledge of critical information requirements |
8 |
|
K1051
|
Knowledge of collection data flow from origin into repositories and tools |
1 |
|
K1054
|
Knowledge of red team functions and capabilities |
0 |
|
K1055
|
Knowledge of digital forensics principles and practices |
3 |
|
K1056
|
Knowledge of language analysis principles and practices |
0 |
|
K1059
|
Knowledge of request for information processes |
1 |
|
K1063
|
Knowledge of operation assessment processes |
2 |
|
K1064
|
Knowledge of Request For Information (RFI) processes |
0 |
|
K1065
|
Knowledge of network operations principles and practices |
0 |
|
K1066
|
Knowledge of threat behaviors |
1 |
|
K1067
|
Knowledge of target behaviors |
1 |
|
K1068
|
Knowledge of threat systems and software |
1 |
|
K1069
|
Knowledge of virtual machine tools and technologies |
6 |
|
K1070
|
Knowledge of privacy disclosure statement laws and regulations |
2 |
|
K1071
|
Knowledge of continuous monitoring processes |
0 |
|
K1072
|
Knowledge of automated security control testing tools and techniques |
1 |
|
K1073
|
Knowledge of hardware asset management principles and practices |
1 |
|
K1074
|
Knowledge of software asset management principles and practices |
0 |
|
K1076
|
Knowledge of risk scoring principles and practices |
3 |
|
K1077
|
Knowledge of data security controls |
6 |
|
K1078
|
Knowledge of risk assessment tools and techniques |
0 |
|
K1079
|
Knowledge of web application security risks |
13 |
|
K1080
|
Knowledge of secure software update principles and practices |
2 |
|
K1081
|
Knowledge of secure firmware update principles and practices |
2 |
|
K1082
|
Knowledge of ingress filtering tools and techniques |
0 |
|
K1083
|
Knowledge of cybersecurity competitions |
3 |
|
K1084
|
Knowledge of data privacy controls |
6 |
|
K1085
|
Knowledge of exploitation tools and techniques |
1 |
|
K1086
|
Knowledge of design modeling |
3 |
|
K1087
|
Knowledge of social engineering tools and techniques |
2 |
|
K1088
|
Knowledge of knowledge management tools and techniques |
6 |
|
K1089
|
Knowledge of protocol analyzer tools and techniques |
2 |
|
K1090
|
Knowledge of software, hardware, and peripheral equipment repair tools and techniques |
1 |
|
K1091
|
Knowledge of media forensics |
2 |
|
K1092
|
Knowledge of digital forensics tools and techniques |
2 |
|
K1093
|
Knowledge of black-box software testing |
2 |
|
K1094
|
Knowledge of hexadecimal data |
1 |
|
K1095
|
Knowledge of design methods |
2 |
|
K1096
|
Knowledge of data analysis tools and techniques |
3 |
|
K1097
|
Knowledge of data mapping tools and techniques |
1 |
|
K1098
|
Knowledge of personnel systems and software |
2 |
|
K1099
|
Knowledge of code analysis tools and techniques |
4 |
|
K1100
|
Knowledge of analytical tools and techniques |
4 |
|
K1101
|
Knowledge of analytics |
3 |
|
K1102
|
Knowledge of remote command line tools and techniques |
0 |
|
K1103
|
Knowledge of Graphical User Interface (GUI) tools and techniques |
0 |
|
K1104
|
Knowledge of geospatial data analysis tools and techniques |
0 |
|
K1105
|
Knowledge of non-attributable networks |
0 |
|
K1108
|
Knowledge of traceroute tools and techniques |
3 |
|
K1109
|
Knowledge of virtual collaborative workspace tools and techniques |
2 |
|
K1110
|
Knowledge of acquisition cybersecurity requirements |
2 |
|
K1111
|
Knowledge of application security design principles and practices |
4 |
|
K1112
|
Knowledge of asset management policies and procedures |
1 |
|
K1113
|
Knowledge of blue force tracking |
1 |
|
K1114
|
Knowledge of capacity management |
1 |
|
K1115
|
Knowledge of Chain of Custody (CoC) processes and procedures |
2 |
|
K1116
|
Knowledge of classification guidelines |
0 |
|
K1117
|
Knowledge of coding and testing standards |
2 |
|
K1118
|
Knowledge of completion criteria |
2 |
|
K1119
|
Knowledge of component and interface specifications |
1 |
|
K1120
|
Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices |
5 |
|
K1121
|
Knowledge of configuration management |
1 |
|
K1122
|
Knowledge of configuration management principles and practices |
2 |
|
K1123
|
Knowledge of continuous monitoring principles and practices |
0 |
|
K1124
|
Knowledge of continuous monitoring scoring and grading metrics |
0 |
|
K1125
|
Knowledge of continuous monitoring tools and techniques |
0 |
|
K1126
|
Knowledge of cost constraints |
2 |
|
K1127
|
Knowledge of customer experience principles and practices |
1 |
|
K1128
|
Knowledge of customer requirements |
2 |
|
K1129
|
Knowledge of cyber defense auditing laws and regulations |
1 |
|
K1130
|
Knowledge of cyber defense auditing policies and practices |
1 |
|
K1131
|
Knowledge of cyber defense monitoring tools |
1 |
|
K1132
|
Knowledge of cyber defense system analysis tools |
1 |
|
K1133
|
Knowledge of cybersecurity engineering |
1 |
|
K1135
|
Knowledge of cybersecurity objectives |
0 |
|
K1137
|
Knowledge of cybersecurity requirements |
11 |
|
K1138
|
Knowledge of cybersecurity standards and best practices |
3 |
|
K1140
|
Knowledge of cybersecurity workforce policies and procedures |
1 |
|
K1143
|
Knowledge of data classification levels |
1 |
|
K1144
|
Knowledge of data correlation tools and techniques |
1 |
|
K1145
|
Knowledge of data encryption practices and principles |
1 |
|
K1146
|
Knowledge of data gathering tools and techniques |
1 |
|
K1147
|
Knowledge of data integrity principles and practices |
3 |
|
K1148
|
Knowledge of data manipulation principles and practices |
3 |
|
K1149
|
Knowledge of data retrieval principles and practices |
3 |
|
K1150
|
Knowledge of data storage principles and practices |
3 |
|
K1151
|
Knowledge of digital evidence cataloging tools and techniques |
4 |
|
K1152
|
Knowledge of digital evidence extraction tools and techniques |
4 |
|
K1153
|
Knowledge of digital evidence handling principles and practices |
3 |
|
K1154
|
Knowledge of digital evidence packaging tools and techniques |
4 |
|
K1155
|
Knowledge of digital evidence preservation tools and techniques |
4 |
|
K1156
|
Knowledge of enterprise cybersecurity architecture |
0 |
|
K1157
|
Knowledge of enterprise-wide version control systems |
3 |
|
K1158
|
Knowledge of evaluation and validation requirements |
1 |
|
K1159
|
Knowledge of fail-over or alternate site requirements |
2 |
|
K1160
|
Knowledge of federal and state accreditation standards |
1 |
|
K1161
|
Knowledge of financial management |
1 |
|
K1163
|
Knowledge of forensic image processing tools and techniques |
2 |
|
K1164
|
Knowledge of hardware design principles and practices |
1 |
|
K1165
|
Knowledge of independent testing methods |
2 |
|
K1166
|
Knowledge of information architecture principles and practices |
0 |
|
K1168
|
Knowledge of intrusion set tools and techniques |
1 |
|
K1169
|
Knowledge of material supportability requirements |
2 |
|
K1170
|
Knowledge of mathematical models |
1 |
|
K1171
|
Knowledge of mission assurance practices and principles |
3 |
|
K1172
|
Knowledge of mission requirements |
1 |
|
K1173
|
Knowledge of multilevel security requirements |
1 |
|
K1174
|
Knowledge of network components |
0 |
|
K1175
|
Knowledge of network monitoring tools and techniques |
2 |
|
K1176
|
Knowledge of network topologies |
1 |
|
K1178
|
Knowledge of operational environment risks |
0 |
|
K1179
|
Knowledge of organization's security strategy |
2 |
|
K1180
|
Knowledge of organizational cybersecurity goals and objectives |
11 |
|
K1181
|
Knowledge of organizational cybersecurity incident response plans |
1 |
|
K1182
|
Knowledge of organizational cybersecurity policies and configurations |
3 |
|
K1183
|
Knowledge of organizational cybersecurity policies and procedures |
6 |
|
K1184
|
Knowledge of organizational cybersecurity workforce requirements |
1 |
|
K1185
|
Knowledge of organizational evaluation and validation requirements |
0 |
|
K1186
|
Knowledge of organizational human resource (HR) policies and procedures |
2 |
|
K1187
|
Knowledge of organizational objectives |
0 |
|
K1188
|
Knowledge of organizational policies and procedures |
4 |
|
K1189
|
Knowledge of organizational policy and procedures |
1 |
|
K1190
|
Knowledge of organizational risk levels |
0 |
|
K1191
|
Knowledge of organizational security posture |
2 |
|
K1192
|
Knowledge of organizational privacy policies and procedures |
1 |
|
K1193
|
Knowledge of packet analysis tools and techniques |
2 |
|
K1194
|
Knowledge of Personally Identifiable Information (PII) attributes |
4 |
|
K1195
|
Knowledge of priority information requirements |
0 |
|
K1197
|
Knowledge of priority intelligence requirements |
2 |
|
K1198
|
Knowledge of privacy and data security regulators |
1 |
|
K1200
|
Knowledge of privacy technologies |
1 |
|
K1201
|
Knowledge of programming languages |
0 |
|
K1202
|
Knowledge of project plans and schedules |
0 |
|
K1203
|
Knowledge of Public Key Infrastructure (PKI) libraries |
1 |
|
K1205
|
Knowledge of required reporting formats |
3 |
|
K1206
|
Knowledge of research and design processes and procedures |
7 |
|
K1207
|
Knowledge of reverse engineering tools and techniques |
1 |
|
K1208
|
Knowledge of risk acceptance and documentation |
2 |
|
K1209
|
Knowledge of risk mitigation principles and practices |
4 |
|
K1210
|
Knowledge of secure programming tools and techniques |
1 |
|
K1211
|
Knowledge of security assessment authorization requirements |
1 |
|
K1212
|
Knowledge of security controls |
4 |
|
K1213
|
Knowledge of security requirements |
1 |
|
K1214
|
Knowledge of security restrictions |
2 |
|
K1215
|
Knowledge of security testing tools and techniques |
2 |
|
K1216
|
Knowledge of service-oriented security architecture practices and principles |
3 |
|
K1217
|
Knowledge of software and systems engineering life cycle standards |
1 |
|
K1218
|
Knowledge of software application, system, and network requirements |
0 |
|
K1219
|
Knowledge of statistical processes |
1 |
|
K1220
|
Knowledge of steganography practices and principles |
1 |
|
K1222
|
Knowledge of system availability requirements |
1 |
|
K1223
|
Knowledge of system backup requirements |
2 |
|
K1224
|
Knowledge of system characteristics |
0 |
|
K1225
|
Knowledge of system life cycles |
2 |
|
K1226
|
Knowledge of systems administration standard operating policies and procedures |
1 |
|
K1227
|
Knowledge of systems architecture |
1 |
|
K1228
|
Knowledge of systems development |
1 |
|
K1233
|
Knowledge of UNIX scripts |
1 |
|
K1234
|
Knowledge of user interfaces |
0 |
|
K1235
|
Knowledge of user needs and requirements |
1 |
|
K1236
|
Knowledge of user requirements |
3 |
|
K1238
|
Knowledge of Windows scripts |
1 |
|
K1239
|
Knowledge of certificate management principles and practices |
1 |
|
K1241
|
Knowledge of cultural, political, and organizational assets |
1 |
|
K1242
|
Knowledge of cybersecurity review processes and procedures |
1 |
|
K1243
|
Knowledge of cybersecurity threat remediation principles and practices |
1 |
|
K1244
|
Knowledge of cybersecurity tools and techniques |
1 |
|
K1245
|
Knowledge of data exfiltration tools and techniques |
1 |
|
K1246
|
Knowledge of data handling tools and techniques |
1 |
|
K1247
|
Knowledge of data monitoring tools and techniques |
1 |
|
K1248
|
Knowledge of digital and physical security vulnerabilities |
1 |
|
K1249
|
Knowledge of digital and physical security vulnerability remediation principles and practices |
1 |
|
K1250
|
Knowledge of external organization roles and responsibilities |
1 |
|
K1251
|
Knowledge of external referrals policies and procedures |
1 |
|
K1252
|
Knowledge of high value asset characteristics |
1 |
|
K1253
|
Knowledge of information collection tools and techniques |
0 |
|
K1254
|
Knowledge of insider threat hub policies and procedures |
1 |
|
K1255
|
Knowledge of insider threat hub operations |
1 |
|
K1256
|
Knowledge of insider threat operational indicators |
1 |
|
K1257
|
Knowledge of insider threat policies and procedures |
1 |
|
K1258
|
Knowledge of insider threat tactics |
1 |
|
K1259
|
Knowledge of insider threat targets |
1 |
|
K1260
|
Knowledge of intelligence laws and regulations |
1 |
|
K1261
|
Knowledge of known insider attacks |
1 |
|
K1262
|
Knowledge of network endpoints |
1 |
|
K1263
|
Knowledge of notification policies and procedures |
1 |
|
K1265
|
Knowledge of organizational objectives, resources, and capabilities |
1 |
|
K1267
|
Knowledge of previously referred potential insider threats |
1 |
|
K1268
|
Knowledge of risk reduction metrics |
1 |
|
K1269
|
Knowledge of security information and event management (SIEM) tools and techniques |
1 |
|
K1270
|
Knowledge of suspicious activity response processes |
1 |
|
K1271
|
Knowledge of system alert policies and procedures |
1 |
|
K1272
|
Knowledge of system components |
1 |
|
K1273
|
Knowledge of threat investigation policies and procedures |
1 |
|
K1274
|
Knowledge of threat modeling tools and techniques |
1 |
|
K1275
|
Knowledge of User Activity Monitoring (UAM) tools and techniques |
1 |
|
K1276
|
Knowledge of advanced persistent threats (APTs) |
0 |
|
K1277
|
Knowledge of cyber resiliency goals and objectives |
0 |
|
K1278
|
Knowledge of data vaulting principles and practices |
0 |
|
K1279
|
Knowledge of threat-informed defense |
0 |
|
K1280
|
Knowledge of approved data processing tools and techniques |
1 |
|
K1281
|
Knowledge of data types and characteristics |
1 |
|
K1282
|
Knowledge of predication requirements |
1 |
|
K1283
|
Knowledge of court exhibit processes |
1 |
|
K1284
|
Knowledge of testing and calibration in laboratory environment |
1 |
|
K1285
|
Knowledge of assessment remediation requirements |
1 |
|
K1286
|
Knowledge of Business Impact Analysis (BIA) |
1 |
|
K1287
|
Knowledge of change management processes |
1 |
|
K1288
|
Knowledge of OT cybersecurity compliance requirements and best practices |
1 |
|
K1289
|
Knowledge of control system environment risks, threats, and vulnerabilities |
1 |
|
K1290
|
Knowledge of the Active Cyber Defense Cycle (ACDC) |
1 |
|
K1291
|
Knowledge of active defense principles and practices |
1 |
|
K1292
|
Knowledge of OT cybersecurity risk tolerance levels |
1 |
|
K1293
|
Knowledge of Purdue Model levels |
1 |
|
K1294
|
Knowledge of change management policies and procedures |
1 |
|
K1295
|
Knowledge of OT cybersecurity inspection and testing policies and procedures |
1 |
|
K1296
|
Knowledge of control system policies and procedures |
1 |
|
K1297
|
Knowledge of OT safety systems |
1 |
|
K1298
|
Knowledge of anomaly detection tools and techniques |
1 |
|
K1299
|
Knowledge of change management processes |
1 |
|
K1300
|
Knowledge of control system network architectures |
1 |
|
K1301
|
Knowledge of cyber incidents impacting OT |
1 |
|
K1302
|
Knowledge of industry hazards |
1 |
|
K1303
|
Knowledge of life cycle management principles and practices |
1 |
|
K1304
|
Knowledge of operational priorities |
1 |
|
K1305
|
Knowledge of OT asset management tools and techniques |
1 |
|
K1306
|
Knowledge of OT assets |
1 |
|
K1307
|
Knowledge of OT inventory principles and practices |
1 |
|
K1308
|
Knowledge of OT network detection tools and techniques |
1 |
|
K1309
|
Knowledge of OT protocols |
1 |
|
K1310
|
Knowledge of process hazard analysis (PHA) assessments |
1 |
|
K1311
|
Knowledge of system assets and boundaries |
1 |
|
K1312
|
Knowledge of human source tasking |
1 |
|
K1313
|
Knowledge of disruption, dismantlement, and deterrence strategies |
1 |
|
K1314
|
Knowledge of obfuscation tools and techniques |
1 |
|
K1315
|
Knowledge of system safety and reliability metrics |
0 |
|
K1316
|
Knowledge of system validation processes |
0 |
|
K1317
|
Knowledge of AI bias types |
0 |
|
K1318
|
Knowledge of AI model development processes |
0 |
|
K1319
|
Knowledge of code review processes |
0 |
|
K1320
|
Knowledge of common AI security risks |
0 |
|
K1321
|
Knowledge of common business and cybersecurity applications of AI systems |
0 |
|
K1322
|
Knowledge of data aggregation tools and techniques |
0 |
|
K1323
|
Knowledge of data de-identification tools and techniques |
0 |
|
K1324
|
Knowledge of data poisoning cyberattacks |
0 |
|
K1325
|
Knowledge of energy implications of resource-heavy computing systems |
0 |
|
K1326
|
Knowledge of environmental implications of resource-heavy computing systems |
0 |
|
K1327
|
Knowledge of ethical responsibilities of AI system users and providers |
0 |
|
K1328
|
Knowledge of human-AI interaction principles and practices |
0 |
|
K1329
|
Knowledge of impact of data sparsity |
0 |
|
K1330
|
Knowledge of individual and societal impacts related to risks |
0 |
|
K1331
|
Knowledge of intellectual property laws and regulations |
0 |
|
K1332
|
Knowledge of legal responsibilities of AI system users |
0 |
|
K1333
|
Knowledge of misinformation and disinformation vulnerabilities in AI systems |
0 |
|
K1334
|
Knowledge of NIST AI Risk Management Framework |
0 |
|
K1335
|
Knowledge of recall and precision metrics for classification tasks |
0 |
|
K1336
|
Knowledge of residual risk principles and practices |
0 |
|
K1337
|
Knowledge of responsible use principles and practices |
0 |
|
K1338
|
Knowledge of simulation testing tools and techniques |
0 |
|
K1339
|
Knowledge of statistical principles and practices |
0 |
|
K1340
|
Knowledge of system safety considerations |
0 |
|
K1341
|
Knowledge of test, evaluation, verification, and validation (TEVV) processes |
0 |
|
K1342
|
Knowledge of training, validation, and test data sets |
0 |
|
K1343
|
Knowledge of uncertainty measurement principles and practices |
0 |
|
K1344
|
Knowledge of data science principles and practices |
0 |
|
K1345
|
Knowledge of agentic AI principles and practices |
0 |