K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
K0007
|
Knowledge of authentication, authorization, and access control methods. |
4 |
K0008
|
Knowledge of applicable business processes and operations of customer organizations. |
5 |
K0009
|
Knowledge of application vulnerabilities. |
6 |
K0010
|
Knowledge of communication methods, principles, and concepts that support the network infrastructure. |
3 |
K0011
|
Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware. |
3 |
K0012
|
Knowledge of capabilities and requirements analysis. |
3 |
K0013
|
Knowledge of cyber defense and vulnerability assessment tools and their capabilities. |
5 |
K0014
|
Knowledge of complex data structures. |
2 |
K0015
|
Knowledge of computer algorithms. |
6 |
K0016
|
Knowledge of computer programming principles |
3 |
K0017
|
Knowledge of concepts and practices of processing digital forensic data. |
2 |
K0018
|
Knowledge of encryption algorithms |
11 |
K0019
|
Knowledge of cryptography and cryptographic key management concepts |
8 |
K0020
|
Knowledge of data administration and data standardization policies. |
2 |
K0021
|
Knowledge of data backup and recovery. |
9 |
K0022
|
Knowledge of data mining and data warehousing principles. |
2 |
K0023
|
Knowledge of database management systems, query languages, table relationships, and views. |
2 |
K0024
|
Knowledge of database systems. |
7 |
K0025
|
Knowledge of digital rights management. |
2 |
K0026
|
Knowledge of business continuity and disaster recovery continuity of operations plans. |
5 |
K0027
|
Knowledge of organization's enterprise information security architecture. |
9 |
K0028
|
Knowledge of organization's evaluation and validation requirements. |
8 |
K0029
|
Knowledge of organization's Local and Wide Area Network connections. |
2 |
K0030
|
Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware). |
4 |
K0031
|
Knowledge of enterprise messaging systems and associated software. |
2 |
K0032
|
Knowledge of resiliency and redundancy. |
3 |
K0033
|
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
5 |
K0034
|
Knowledge of network services and protocols interactions that provide network communications. |
1 |
K0035
|
Knowledge of installation, integration, and optimization of system components. |
6 |
K0036
|
Knowledge of human-computer interaction principles. |
12 |
K0037
|
Knowledge of Security Assessment and Authorization process. |
5 |
K0038
|
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
6 |
K0039
|
Knowledge of cybersecurity and privacy principles and methods that apply to software development. |
2 |
K0040
|
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). |
5 |
K0041
|
Knowledge of incident categories, incident responses, and timelines for responses. |
1 |
K0042
|
Knowledge of incident response and handling methodologies. |
7 |
K0043
|
Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
7 |
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
K0045
|
Knowledge of information security systems engineering principles (NIST SP 800-160). |
3 |
K0046
|
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. |
4 |
K0047
|
Knowledge of information technology (IT) architectural concepts and frameworks. |
4 |
K0048
|
Knowledge of Risk Management Framework (RMF) requirements. |
8 |
K0049
|
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
8 |
K0050
|
Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
6 |
K0051
|
Knowledge of low-level computer languages (e.g., assembly languages). |
4 |
K0052
|
Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis). |
6 |
K0053
|
Knowledge of measures or indicators of system performance and availability. |
4 |
K0054
|
Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. |
3 |
K0055
|
Knowledge of microprocessors. |
4 |
K0056
|
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). |
11 |
K0057
|
Knowledge of network hardware devices and functions. |
2 |
K0058
|
Knowledge of network traffic analysis methods. |
10 |
K0059
|
Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
12 |
K0060
|
Knowledge of operating systems. |
13 |
K0061
|
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
11 |
K0062
|
Knowledge of packet-level analysis. |
2 |
K0063
|
Knowledge of parallel and distributed computing concepts. |
6 |
K0064
|
Knowledge of performance tuning tools and techniques. |
1 |
K0065
|
Knowledge of policy-based and risk adaptive access controls. |
5 |
K0066
|
Knowledge of Privacy Impact Assessments. |
6 |
K0067
|
Knowledge of process engineering concepts. |
3 |
K0068
|
Knowledge of programming language structures and logic. |
4 |
K0069
|
Knowledge of query languages such as SQL (structured query language). |
2 |
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
K0071
|
Knowledge of remote access technology concepts. |
2 |
K0072
|
Knowledge of resource management principles and techniques. |
7 |
K0073
|
Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org). |
5 |
K0074
|
Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
4 |
K0075
|
Knowledge of security system design tools, methods, and techniques. |
3 |
K0076
|
Knowledge of server administration and systems engineering theories, concepts, and methods. |
2 |
K0077
|
Knowledge of server and client operating systems. |
4 |
K0078
|
Knowledge of server diagnostic tools and fault identification techniques. |
2 |
K0079
|
Knowledge of software debugging principles. |
2 |
K0080
|
Knowledge of software design tools, methods, and techniques. |
2 |
K0081
|
Knowledge of software development models (e.g., Waterfall Model, Spiral Model). |
4 |
K0082
|
Knowledge of software engineering. |
7 |
K0083
|
Knowledge of sources, characteristics, and uses of the organization’s data assets. |
2 |
K0084
|
Knowledge of structured analysis principles and methods. |
6 |
K0085
|
WITHDRAWN: Knowledge of system and application security threats and vulnerabilities. (See K0070) |
0 |
K0086
|
Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
5 |
K0087
|
Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
4 |
K0088
|
Knowledge of systems administration concepts. |
3 |
K0089
|
Knowledge of systems diagnostic tools and fault identification techniques. |
3 |
K0090
|
Knowledge of system life cycle management principles, including software security and usability. |
10 |
K0091
|
Knowledge of systems testing and evaluation methods. |
6 |
K0092
|
Knowledge of technology integration processes. |
2 |
K0093
|
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). |
8 |
K0094
|
Knowledge of the capabilities and functionality associated with content creation technologies (e.g., wikis, social networking, content management systems, blogs). |
1 |
K0095
|
Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines). |
2 |
K0096
|
Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint). |
1 |
K0097
|
Knowledge of the characteristics of physical and virtual data storage media. |
1 |
K0098
|
Knowledge of the cyber defense Service Provider reporting structure and processes within one’s own organization. |
2 |
K0099
|
WITHDRAWN: Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. |
0 |
K0100
|
Knowledge of the enterprise information technology (IT) architecture. |
2 |
K0101
|
Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
8 |
K0102
|
Knowledge of the systems engineering process. |
7 |
K0103
|
Knowledge of the type and frequency of routine hardware maintenance. |
1 |
K0104
|
Knowledge of Virtual Private Network (VPN) security. |
4 |
K0105
|
Knowledge of web services (e.g., service-oriented architecture, Simple Object Access Protocol, and web service description language). |
2 |
K0106
|
Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities. |
6 |
K0107
|
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. |
4 |
K0108
|
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). |
11 |
K0163
|
Knowledge of critical information technology (IT) procurement requirements. |
3 |
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
K0110
|
Knowledge of adversarial tactics, techniques, and procedures. |
2 |
K0111
|
Knowledge of network tools (e.g., ping, traceroute, nslookup) |
2 |
K0112
|
Knowledge of defense-in-depth principles and network security architecture. |
1 |
K0113
|
Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
2 |
K0114
|
Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, digital scanners, electronic organizers, hard drives, memory cards, modems, network components, networked appliances, networked home control devices, printers, removable storage devices, telephones, copiers, facsimile machines, etc.). |
2 |
K0115
|
Knowledge that technology that can be exploited. |
1 |
K0116
|
Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). |
2 |
K0117
|
Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
3 |
K0118
|
Knowledge of processes for seizing and preserving digital evidence. |
3 |
K0119
|
Knowledge of hacking methodologies. |
2 |
K0120
|
Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
6 |
K0121
|
Knowledge of information security program management and project management principles and techniques. |
2 |
K0122
|
Knowledge of investigative implications of hardware, Operating Systems, and network technologies. |
2 |
K0123
|
Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). |
3 |
K0124
|
Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain. |
2 |
K0125
|
Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody. |
3 |
K0126
|
Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161) |
14 |
K0127
|
Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure). |
2 |
K0128
|
Knowledge of types and collection of persistent data. |
3 |
K0129
|
Knowledge of command-line tools (e.g., mkdir, mv, ls, passwd, grep). |
1 |
K0130
|
Knowledge of virtualization technologies and virtual machine development and maintenance. |
2 |
K0131
|
Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
3 |
K0132
|
Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. |
2 |
K0133
|
Knowledge of types of digital forensics data and how to recognize them. |
2 |
K0134
|
Knowledge of deployable forensics. |
2 |
K0135
|
Knowledge of web filtering technologies. |
2 |
K0136
|
Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts). |
1 |
K0137
|
Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA). |
1 |
K0138
|
Knowledge of Wi-Fi. |
1 |
K0139
|
Knowledge of interpreted and compiled computer languages. |
8 |
K0140
|
Knowledge of secure coding techniques. |
3 |
K0141
|
WITHDRAWN: Integrated into K0420 |
0 |
K0142
|
Knowledge of collection management processes, capabilities, and limitations. |
4 |
K0143
|
Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
3 |
K0144
|
Knowledge of social dynamics of computer attackers in a global context. |
1 |
K0145
|
Knowledge of security event correlation tools. |
2 |
K0146
|
Knowledge of the organization's core business/mission processes. |
10 |
K0147
|
Knowledge of emerging security issues, risks, and vulnerabilities. |
4 |
K0148
|
Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. |
4 |
K0149
|
Knowledge of organization's risk tolerance and/or risk management approach. |
1 |
K0150
|
Knowledge of enterprise incident response program, roles, and responsibilities. |
2 |
K0151
|
Knowledge of current and emerging threats/threat vectors. |
1 |
K0152
|
Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). |
2 |
K0153
|
Knowledge of software quality assurance process. |
2 |
K0154
|
Knowledge of supply chain risk management standards, processes, and practices. |
7 |
K0155
|
Knowledge of electronic evidence law. |
3 |
K0156
|
Knowledge of legal rules of evidence and court procedure. |
3 |
K0157
|
Knowledge of cyber defense and information security policies, procedures, and regulations. |
4 |
K0158
|
Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control). |
1 |
K0159
|
Knowledge of Voice over IP (VoIP). |
1 |
K0160
|
Knowledge of the common attack vectors on the network layer. |
2 |
K0161
|
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). |
3 |
K0162
|
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). |
3 |
K0164
|
Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). |
4 |
K0165
|
Knowledge of risk/threat assessment. |
5 |
K0166
|
WITHDRAWN: Knowledge of the nature and function of the relevant information structure. (See K0127) |
0 |
K0167
|
Knowledge of system administration, network, and operating system hardening techniques. |
7 |
K0168
|
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
11 |
K0169
|
Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. |
14 |
K0170
|
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. |
12 |
K0171
|
Knowledge of hardware reverse engineering techniques. |
1 |
K0172
|
Knowledge of middleware (e.g., enterprise service bus and message queuing). |
1 |
K0173
|
WITHDRAWN: Integrated into K0499 (prior to draft SP 800-181) |
0 |
K0174
|
Knowledge of networking protocols. |
1 |
K0175
|
Knowledge of software reverse engineering techniques. |
1 |
K0176
|
Knowledge of Extensible Markup Language (XML) schemas. |
1 |
K0177
|
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
12 |
K0178
|
Knowledge of secure software deployment methodologies, tools, and practices. |
1 |
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
K0180
|
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
9 |
K0181
|
WITHDRAWN: Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification [RFID], Infrared Networking [IR], Wireless Fidelity [Wi-Fi]. paging, cellular, satellite dishes), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. (See K0274) |
0 |
K0182
|
Knowledge of data carving tools and techniques (e.g., Foremost). |
2 |
K0183
|
Knowledge of reverse engineering concepts. |
2 |
K0184
|
Knowledge of anti-forensics tactics, techniques, and procedures. |
2 |
K0185
|
Knowledge of forensics lab design configuration and support applications (e.g., VMWare, Wireshark). |
2 |
K0186
|
Knowledge of debugging procedures and tools. |
2 |
K0187
|
Knowledge of file type abuse by adversaries for anomalous behavior. |
2 |
K0188
|
Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). |
2 |
K0189
|
Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer’s display device). |
2 |
K0190
|
Knowledge of encryption methodologies. |
1 |
K0191
|
Knowledge of signature implementation impact for viruses, malware, and attacks. |
1 |
K0192
|
Knowledge of Windows/Unix ports and services. |
1 |
K0193
|
Knowledge of advanced data remediation security features in databases. |
1 |
K0194
|
Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
5 |
K0195
|
Knowledge of data classification standards and methodologies based on sensitivity and other risk factors. |
1 |
K0196
|
Knowledge of Import/Export Regulations related to cryptography and other security technologies. |
3 |
K0197
|
Knowledge of database access application programming interfaces (e.g., Java Database Connectivity [JDBC]). |
2 |
K0198
|
Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
6 |
K0199
|
Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]). |
6 |
K0200
|
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
11 |
K0201
|
Knowledge of symmetric key rotation techniques and concepts. |
1 |
K0202
|
Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
4 |
K0203
|
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
10 |
K0204
|
Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes). |
3 |
K0205
|
Knowledge of basic system, network, and OS hardening techniques. |
1 |
K0206
|
Knowledge of ethical hacking principles and techniques. |
1 |
K0207
|
Knowledge of circuit analysis. |
2 |
K0208
|
Knowledge of computer based training and e-learning services. |
2 |
K0209
|
Knowledge of covert communication techniques. |
2 |
K0210
|
Knowledge of data backup and restoration concepts. |
1 |
K0211
|
Knowledge of confidentiality, integrity, and availability requirements. |
2 |
K0212
|
Knowledge of cybersecurity-enabled software products. |
4 |
K0269
|
Knowledge of mobile communications architecture. |
1 |
K0213
|
Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation). |
2 |
K0214
|
Knowledge of the Risk Management Framework Assessment Methodology. |
2 |
K0215
|
Knowledge of organizational training policies. |
2 |
K0216
|
Knowledge of learning levels (i.e., Bloom’s Taxonomy of learning). |
2 |
K0217
|
Knowledge of Learning Management Systems and their use in managing learning. |
2 |
K0218
|
Knowledge of learning styles (e.g., assimilator, auditory, kinesthetic). |
1 |
K0219
|
WITHDRAWN: Knowledge of local area network (LAN) and wide area network (WAN) principles. (See K0050) |
0 |
K0220
|
Knowledge of modes of learning (e.g., rote learning, observation). |
2 |
K0221
|
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
3 |
K0222
|
Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities. |
1 |
K0223
|
WITHDRAWN: Integrated into K0073 |
0 |
K0224
|
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. |
5 |
K0225
|
WITHDRAWN: Knowledge of the common networking protocol and services deployed at CC/S/A. (See K0565) |
0 |
K0226
|
Knowledge of organizational training systems. |
1 |
K0227
|
Knowledge of various types of computer architectures. |
4 |
K0228
|
Knowledge of taxonomy and semantic ontology theory. |
1 |
K0229
|
Knowledge of applications that can log errors, exceptions, and application faults and logging. |
1 |
K0230
|
Knowledge of cloud service models and how those models can limit incident response. |
1 |
K0231
|
Knowledge of crisis management protocols, processes, and techniques. |
1 |
K0232
|
WITHDRAWN: Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
0 |
K0233
|
Knowledge of the National Cybersecurity Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities. |
1 |
K0234
|
Knowledge of full spectrum cyber capabilities (e.g., defense, attack, exploitation). |
2 |
K0235
|
Knowledge of how to leverage research and development centers, think tanks, academic research, and industry systems. |
5 |
K0236
|
Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data. |
1 |
K0237
|
Knowledge of industry best practices for service desk. |
1 |
K0238
|
Knowledge of machine learning theory and principles. |
1 |
K0239
|
Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media. |
2 |
K0240
|
Knowledge of multi-level security systems and cross domain solutions. |
2 |
K0241
|
Knowledge of organizational human resource policies, processes, and procedures. |
1 |
K0242
|
Knowledge of organizational security policies. |
1 |
K0243
|
Knowledge of organizational training and education policies, processes, and procedures. |
2 |
K0244
|
Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity. |
1 |
K0245
|
Knowledge of principles and processes for conducting training and education needs assessment. |
2 |
K0246
|
Knowledge of relevant concepts, procedures, software, equipment, and technology applications. |
2 |
K0247
|
Knowledge of remote access processes, tools, and capabilities related to customer support. |
1 |
K0248
|
Knowledge of strategic theory and practice. |
1 |
K0249
|
Knowledge of sustainment technologies, processes and strategies. |
1 |
K0250
|
Knowledge of Test & Evaluation processes for learners. |
3 |
K0251
|
Knowledge of the judicial process, including the presentation of facts and evidence. |
1 |
K0252
|
Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects. |
2 |
K0253
|
WITHDRAWN: Integrated into K0227 |
0 |
K0254
|
Knowledge of binary analysis. |
1 |
K0255
|
Knowledge of network architecture concepts including topology, protocols, and components. |
1 |
K0256
|
WITHDRAWN: Integrated into K0224 |
0 |
K0257
|
Knowledge of information technology (IT) acquisition/procurement requirements. |
5 |
K0258
|
Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)). |
1 |
K0259
|
Knowledge of malware analysis concepts and methodologies. |
1 |
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
K0263
|
Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
3 |
K0264
|
Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements). |
2 |
K0265
|
Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability. |
1 |
K0266
|
Knowledge of how to evaluate the trustworthiness of the supplier and/or product. |
1 |
K0267
|
Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. |
8 |
K0268
|
Knowledge of forensic footprint identification. |
1 |
K0270
|
Knowledge of the acquisition/procurement life cycle process. |
5 |
K0271
|
Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications). |
1 |
K0272
|
Knowledge of network analysis tools used to identify software communications vulnerabilities. |
1 |
K0273
|
WITHDRAWN: Knowledge of general kill chain (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
0 |
K0274
|
Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. |
3 |
K0275
|
Knowledge of configuration management techniques. |
3 |
K0276
|
Knowledge of security management. |
3 |
K0277
|
Knowledge of current and emerging data encryption (e.g., Column and Tablespace Encryption, file and disk encryption) security features in databases (e.g. built-in cryptographic key management features). |
2 |
K0278
|
Knowledge of current and emerging data remediation security features in databases. |
1 |
K0279
|
WITHDRAWN: Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]). |
0 |
K0280
|
Knowledge of systems engineering theories, concepts, and methods. |
1 |
K0281
|
Knowledge of information technology (IT) service catalogues. |
1 |
K0282
|
WITHDRAWN: Integrated into K0200 |
0 |
K0283
|
Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
1 |
K0284
|
Knowledge of developing and applying user credential management system. |
1 |
K0285
|
Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
2 |
K0286
|
Knowledge of N-tiered typologies (e.g. including server and client operating systems). |
2 |
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
K0288
|
Knowledge of industry standard security models. |
1 |
K0289
|
Knowledge of system/server diagnostic tools and fault identification techniques. |
1 |
K0290
|
Knowledge of systems security testing and evaluation methods. |
2 |
K0291
|
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.) |
2 |
K0292
|
Knowledge of the operations and processes for incident, problem, and event management. |
1 |
K0293
|
Knowledge of integrating the organization’s goals and objectives into the architecture. |
2 |
K0294
|
Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly. |
1 |
K0295
|
Knowledge of confidentiality, integrity, and availability principles. |
1 |
K0296
|
Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
2 |
K0297
|
Knowledge of countermeasure design for identified security risks. |
4 |
K0298
|
Knowledge of countermeasures for identified security risks. |
0 |
K0299
|
Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
1 |
K0300
|
Knowledge of network mapping and recreating network topologies. |
1 |
K0301
|
Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). |
3 |
K0302
|
Knowledge of the basic operation of computers. |
1 |
K0303
|
Knowledge of the use of sub-netting tools. |
1 |
K0304
|
Knowledge of concepts and practices of processing digital forensic data. |
1 |
K0305
|
Knowledge of data concealment (e.g. encryption algorithms and steganography). |
1 |
K0306
|
WITHDRAWN: Knowledge of basic physical computer components and architectures |
0 |
K0307
|
WITHDRAWN: Knowledge of common network tools (e.g., ping, traceroute, nslookup). (See K0111) |
0 |
K0308
|
Knowledge of cryptology. |
3 |
K0309
|
Knowledge of emerging technologies that have potential for exploitation. |
2 |
K0310
|
Knowledge of hacking methodologies. |
1 |
K0311
|
Knowledge of industry indicators useful for identifying technology trends. |
2 |
K0312
|
Knowledge of intelligence gathering principles, policies, and procedures including legal authorities and restrictions. |
1 |
K0313
|
Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development). |
3 |
K0314
|
Knowledge of industry technologies’ potential cybersecurity vulnerabilities. |
2 |
K0315
|
Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing information. |
1 |
K0316
|
Knowledge of business or military operation plans, concept operation plans, orders, policies, and standing rules of engagement. |
1 |
K0317
|
Knowledge of procedures used for documenting and querying reported incidents, problems, and events. |
1 |
K0318
|
Knowledge of operating system command-line tools. |
2 |
K0319
|
Knowledge of technical delivery capabilities and their limitations. |
1 |
K0320
|
Knowledge of organization's evaluation and validation criteria. |
1 |
K0430
|
Knowledge of evasion strategies and techniques. |
2 |
K0321
|
Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software. |
1 |
K0322
|
Knowledge of embedded systems. |
10 |
K0323
|
Knowledge of system fault tolerance methodologies. |
2 |
K0324
|
Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. |
2 |
K0325
|
Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
6 |
K0326
|
Knowledge of demilitarized zones. |
2 |
K0327
|
WITHDRAWN: Knowledge of local area network (LAN), wide area network (WAN) and enterprise principles and concepts, including bandwidth management. (See K0050) |
0 |
K0328
|
WITHDRAWN: Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis. |
0 |
K0329
|
WITHDRAWN: Knowledge of statistics. |
0 |
K0330
|
Knowledge of successful capabilities to identify the solutions to less common and more complex system problems. |
1 |
K0331
|
WITHDRAWN: Knowledge of network protocols (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Dynamic Host Configuration Protocol (DHCP)), and directory services (e.g., Domain Name System (DNS)). (See K0332) |
0 |
K0332
|
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
14 |
K0333
|
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs. |
6 |
K0334
|
Knowledge of network traffic analysis (tools, methodologies, processes). |
1 |
K0335
|
Knowledge of current and emerging cyber technologies. |
2 |
K0336
|
Knowledge of access authentication methods. |
3 |
K0337
|
WITHDRAWN: Integrated into K0007 |
0 |
K0338
|
Knowledge of data mining techniques. |
1 |
K0339
|
Knowledge of how to use network analysis tools to identify vulnerabilities. |
2 |
K0340
|
WITHDRAWN: Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)). |
0 |
K0341
|
Knowledge of foreign disclosure policies and import/export control regulations as related to cybersecurity. |
1 |
K0342
|
Knowledge of penetration testing principles, tools, and techniques. |
8 |
K0343
|
Knowledge of root cause analysis techniques. |
2 |
K0344
|
Knowledge of an organization’s threat environment. |
1 |
K0345
|
WITHDRAWN: Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). |
0 |
K0346
|
Knowledge of principles and methods for integrating system components. |
1 |
K0347
|
Knowledge and understanding of operational design. |
3 |
K0348
|
WITHDRAWN: Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
0 |
K0349
|
Knowledge of website types, administration, functions, and content management system (CMS). |
8 |
K0350
|
Knowledge of accepted organization planning systems. |
3 |
K0351
|
Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
3 |
K0352
|
Knowledge of forms of intelligence support needs, topics, and focus areas. |
2 |
K0353
|
Knowledge of possible circumstances that would result in changing collection management authorities. |
2 |
K0354
|
Knowledge of relevant reporting and dissemination procedures. |
1 |
K0355
|
Knowledge of all-source reporting and dissemination procedures. |
1 |
K0356
|
Knowledge of analytic tools and techniques for language, voice and/or graphic material. |
1 |
K0357
|
WITHDRAWN: Knowledge of analytical constructs and their use in assessing the operational environment. (See K0224) |
2 |
K0358
|
Knowledge of analytical standards and the purpose of intelligence confidence levels. |
1 |
K0359
|
Knowledge of approved intelligence dissemination processes. |
1 |
K0360
|
WITHDRAWN: Knowledge of assembly code. |
0 |
K0361
|
Knowledge of asset availability, capabilities and limitations. |
2 |
K0362
|
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
9 |
K0363
|
Knowledge of auditing and logging procedures (including server-based logging). |
1 |
K0364
|
Knowledge of available databases and tools necessary to assess appropriate collection tasking. |
2 |
K0365
|
WITHDRAWN: Knowledge of basic back-up and recovery procedures including different types of backups (e.g., full, incremental). |
0 |
K0366
|
WITHDRAWN: Knowledge of basic computer components and architectures, including the functions of various peripherals. |
0 |
K0367
|
Knowledge of penetration testing. |
0 |
K0368
|
Knowledge of implants that enable cyber collection and/or preparation activities. |
1 |
K0369
|
WITHDRAWN: Knowledge of basic malicious activity concepts (e.g., footprinting, scanning and enumeration). |
0 |
K0370
|
WITHDRAWN: Knowledge of basic physical computer components and architecture, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). (See K0109) |
0 |
K0371
|
Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis). |
1 |
K0372
|
Knowledge of programming concepts (e.g., levels, structures, compiled vs. interpreted languages). |
1 |
K0431
|
Knowledge of evolving/emerging communications technologies. |
11 |
K0373
|
Knowledge of basic software applications (e.g., data storage and backup, database applications) and the types of vulnerabilities that have been found in those applications. |
1 |
K0374
|
WITHDRAWN: Knowledge of basic structure, architecture, and design of modern digital and telephony networks. (See K0599) |
1 |
K0375
|
Knowledge of wireless applications vulnerabilities. |
1 |
K0376
|
Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
1 |
K0377
|
Knowledge of classification and control markings standards, policies and procedures. |
7 |
K0378
|
WITHDRAWN: Knowledge of classification and control markings standards. (See K0377) |
0 |
K0379
|
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
7 |
K0380
|
Knowledge of collaborative tools and environments. |
2 |
K0381
|
Knowledge of collateral damage and estimating impact(s). |
1 |
K0382
|
Knowledge of collection capabilities and limitations. |
2 |
K0383
|
Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan. |
2 |
K0384
|
Knowledge of collection management functionality (e.g., positions, functions, responsibilities, products, reporting requirements). |
1 |
K0385
|
WITHDRAWN: Integrated into K0142 |
0 |
K0386
|
Knowledge of collection management tools. |
2 |
K0387
|
Knowledge of collection planning process and collection plan. |
2 |
K0388
|
Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
1 |
K0389
|
Knowledge of collection sources including conventional and non-conventional sources. |
1 |
K0390
|
Knowledge of collection strategies. |
2 |
K0391
|
Knowledge of collection systems, capabilities, and processes. |
1 |
K0392
|
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
9 |
K0393
|
Knowledge of common networking devices and their configurations. |
1 |
K0394
|
Knowledge of common reporting databases and tools. |
1 |
K0395
|
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
10 |
K0396
|
Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
1 |
K0397
|
Knowledge of security concepts in operating systems (e.g., Linux, Unix.) |
1 |
K0398
|
Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
1 |
K0399
|
Knowledge of crisis action planning and time sensitive planning procedures. |
2 |
K0400
|
Knowledge of crisis action planning for cyber operations. |
3 |
K0401
|
Knowledge of criteria for evaluating collection products. |
2 |
K0402
|
Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain. |
1 |
K0403
|
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
5 |
K0404
|
Knowledge of current collection requirements. |
2 |
K0405
|
Knowledge of current computer-based intrusion sets. |
5 |
K0406
|
Knowledge of current software and methodologies for active defense and system hardening. |
1 |
K0407
|
Knowledge of customer information needs. |
1 |
K0408
|
Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects. |
3 |
K0409
|
Knowledge of cyber intelligence/information collection capabilities and repositories. |
4 |
K0410
|
Knowledge of cyber laws and their effect on Cyber planning. |
2 |
K0411
|
Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
3 |
K0412
|
Knowledge of cyber lexicon/terminology |
2 |
K0413
|
Knowledge of cyber operation objectives, policies, and legalities. |
3 |
K0414
|
Knowledge of cyber operations support or enabling processes. |
4 |
K0415
|
Knowledge of cyber operations terminology/lexicon. |
1 |
K0416
|
Knowledge of cyber operations. |
1 |
K0417
|
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
10 |
K0418
|
Knowledge of data flow process for terminal or environment collection. |
1 |
K0419
|
Knowledge of database administration and maintenance. |
2 |
K0420
|
Knowledge of database theory. |
4 |
K0421
|
Knowledge of databases, portals and associated dissemination vehicles. |
1 |
K0422
|
Knowledge of deconfliction processes and procedures. |
3 |
K0423
|
Knowledge of deconfliction reporting to include external organization interaction. |
1 |
K0424
|
Knowledge of denial and deception techniques. |
1 |
K0425
|
Knowledge of different organization objectives at all levels, including subordinate, lateral and higher. |
2 |
K0426
|
Knowledge of dynamic and deliberate targeting. |
1 |
K0427
|
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
8 |
K0428
|
Knowledge of encryption algorithms and tools for wireless local area networks (WLANs). |
1 |
K0429
|
Knowledge of enterprise-wide information management. |
1 |
K0432
|
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
3 |
K0433
|
Knowledge of forensic implications of operating system structure and operations. |
1 |
K0434
|
WITHDRAWN: Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
0 |
K0435
|
Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
5 |
K0436
|
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. |
8 |
K0437
|
Knowledge of general Supervisory control and data acquisition (SCADA) system components. |
4 |
K0438
|
Knowledge of mobile cellular communications architecture (e.g., LTE, CDMA, GSM/EDGE and UMTS/HSPA). |
1 |
K0439
|
Knowledge of governing authorities for targeting. |
2 |
K0440
|
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. |
8 |
K0441
|
WITHDRAWN: Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise. |
0 |
K0442
|
Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
1 |
K0443
|
WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143) |
1 |
K0444
|
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). |
11 |
K0445
|
Knowledge of how modern digital and telephony networks impact cyber operations. |
9 |
K0446
|
Knowledge of how modern wireless communications systems impact cyber operations. |
8 |
K0447
|
Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
1 |
K0448
|
Knowledge of how to establish priorities for resources. |
2 |
K0449
|
Knowledge of how to extract, analyze, and use metadata. |
7 |
K0450
|
WITHDRAWN: Integrated into K0036 |
0 |
K0451
|
Knowledge of identification and reporting processes. |
1 |
K0452
|
Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. |
1 |
K0453
|
Knowledge of indications and warning. |
2 |
K0454
|
Knowledge of information needs. |
2 |
K0455
|
Knowledge of information security concepts, facilitating technologies and methods. |
3 |
K0456
|
Knowledge of intelligence capabilities and limitations. |
1 |
K0457
|
Knowledge of intelligence confidence levels. |
3 |
K0458
|
Knowledge of intelligence disciplines. |
3 |
K0459
|
Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.). |
1 |
K0460
|
Knowledge of intelligence preparation of the environment and similar processes. |
5 |
K0461
|
Knowledge of intelligence production processes. |
1 |
K0462
|
Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
2 |
K0463
|
Knowledge of intelligence requirements tasking systems. |
1 |
K0464
|
Knowledge of intelligence support to planning, execution, and assessment. |
6 |
K0465
|
Knowledge of internal and external partner cyber operations capabilities and tools. |
6 |
K0466
|
Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information. |
1 |
K0467
|
Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities). |
2 |
K0468
|
Knowledge of internal and external partner reporting. |
1 |
K0469
|
Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. |
3 |
K0470
|
Knowledge of Internet and routing protocols. |
1 |
K0471
|
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
9 |
K0472
|
Knowledge of intrusion detection systems and signature development. |
1 |
K0473
|
Knowledge of intrusion sets. |
3 |
K0474
|
Knowledge of key cyber threat actors and their equities. |
2 |
K0475
|
Knowledge of key factors of the operational environment and threat. |
2 |
K0476
|
Knowledge of language processing tools and techniques. |
1 |
K0477
|
Knowledge of leadership's Intent and objectives. |
2 |
K0478
|
Knowledge of legal considerations in targeting. |
1 |
K0479
|
Knowledge of malware analysis and characteristics. |
2 |
K0480
|
Knowledge of malware. |
8 |
K0481
|
Knowledge of methods and techniques used to detect various exploitation activities. |
1 |
K0482
|
Knowledge of methods for ascertaining collection asset posture and availability. |
2 |
K0483
|
Knowledge of methods to integrate and summarize information from any potential sources. |
1 |
K0484
|
Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
1 |
K0485
|
Knowledge of network administration. |
1 |
K0486
|
Knowledge of network construction and topology. |
1 |
K0487
|
Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
4 |
K0488
|
Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
1 |
K0489
|
Knowledge of network topology. |
1 |
K0490
|
WITHDRAWN: Integrated into K0058 |
0 |
K0491
|
Knowledge of networking and Internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
1 |
K0492
|
Knowledge of non-traditional collection methodologies. |
2 |
K0493
|
Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
1 |
K0494
|
Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. |
2 |
K0495
|
Knowledge of ongoing and future operations. |
2 |
K0496
|
Knowledge of operational asset constraints. |
2 |
K0497
|
Knowledge of operational effectiveness assessment. |
2 |
K0498
|
Knowledge of operational planning processes. |
2 |
K0499
|
Knowledge of operations security. |
8 |
K0500
|
Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
1 |
K0501
|
Knowledge of organization cyber operations programs, strategies, and resources. |
3 |
K0502
|
Knowledge of organization decision support tools and/or methods. |
2 |
K0503
|
Knowledge of organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact. |
1 |
K0504
|
Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
3 |
K0505
|
Knowledge of organization objectives and associated demand on collection management. |
2 |
K0506
|
Knowledge of organization objectives, leadership priorities, and decision-making risks. |
3 |
K0507
|
Knowledge of organization or partner exploitation of digital networks. |
6 |
K0508
|
Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
3 |
K0509
|
Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. |
1 |
K0510
|
Knowledge of organizational and partner policies, tools, capabilities, and procedures. |
1 |
K0511
|
Knowledge of organizational hierarchy and cyber decision-making processes. |
6 |
K0512
|
Knowledge of organizational planning concepts. |
3 |
K0513
|
Knowledge of organizational priorities, legal authorities and requirements submission processes. |
2 |
K0514
|
Knowledge of organizational structures and associated intelligence capabilities. |
3 |
K0515
|
WITHDRAWN: Knowledge of OSI model and underlying networking protocols (e.g., TCP/IP). |
0 |
K0516
|
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
10 |
K0517
|
Knowledge of post implementation review (PIR) approval process. |
1 |
K0518
|
Knowledge of planning activity initiation. |
2 |
K0519
|
Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning. |
2 |
K0520
|
Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
2 |
K0521
|
Knowledge of priority information, how it is derived, where it is published, how to access, etc. |
2 |
K0522
|
Knowledge of production exploitation and dissemination needs and architectures. |
1 |
K0523
|
Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities. |
1 |
K0524
|
Knowledge of relevant laws, regulations, and policies. |
1 |
K0525
|
Knowledge of required intelligence planning products associated with cyber operational planning. |
2 |
K0526
|
Knowledge of research strategies and knowledge management. |
2 |
K0527
|
Knowledge of risk management and mitigation strategies. |
2 |
K0528
|
Knowledge of satellite-based communication systems. |
1 |
K0529
|
Knowledge of scripting |
1 |
K0530
|
Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
1 |
K0531
|
Knowledge of security implications of software configurations. |
1 |
K0532
|
Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, code words). |
1 |
K0533
|
Knowledge of specific target identifiers, and their usage. |
2 |
K0534
|
Knowledge of staff management, assignment, and allocation processes. |
1 |
K0535
|
Knowledge of strategies and tools for target research. |
1 |
K0536
|
Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). |
1 |
K0537
|
Knowledge of system administration concepts for the Unix/Linux and Windows operating systems (e.g., process management, directory structure, installed applications, Access Controls). |
0 |
K0538
|
Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities |
3 |
K0539
|
Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
1 |
K0540
|
Knowledge of target communication tools and techniques. |
1 |
K0541
|
Knowledge of target cultural references, dialects, expressions, idioms, and abbreviations. |
1 |
K0542
|
Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). |
2 |
K0543
|
Knowledge of target estimated repair and recuperation times. |
1 |
K0544
|
Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
2 |
K0545
|
Knowledge of target language(s). |
1 |
K0546
|
Knowledge of target list development (i.e. Restricted, Joint, Candidate, etc.). |
1 |
K0547
|
Knowledge of target methods and procedures. |
2 |
K0548
|
Knowledge of target or threat cyber actors and procedures. |
1 |
K0549
|
Knowledge of target vetting and validation procedures. |
3 |
K0550
|
Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
2 |
K0551
|
Knowledge of targeting cycles. |
3 |
K0552
|
Knowledge of tasking mechanisms. |
2 |
K0553
|
Knowledge of tasking processes for organic and subordinate collection assets. |
1 |
K0554
|
Knowledge of tasking, collection, processing, exploitation and dissemination. |
2 |
K0555
|
Knowledge of TCP/IP networking protocols. |
1 |
K0556
|
Knowledge of telecommunications fundamentals. |
6 |
K0557
|
Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.). |
1 |
K0558
|
Knowledge of the available tools and applications associated with collection requirements and collection management. |
2 |
K0559
|
Knowledge of the basic structure, architecture, and design of converged applications. |
2 |
K0560
|
Knowledge of the basic structure, architecture, and design of modern communication networks. |
10 |
K0561
|
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
8 |
K0562
|
Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes. |
2 |
K0563
|
Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities. |
2 |
K0564
|
Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
1 |
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |
K0566
|
Knowledge of the critical information requirements and how they're used in planning. |
2 |
K0567
|
Knowledge of the data flow from collection origin to repositories and tools. |
2 |
K0568
|
Knowledge of the definition of collection management and collection management authority. |
1 |
K0569
|
Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture. |
2 |
K0570
|
Knowledge of the factors of threat that could impact collection operations. |
2 |
K0571
|
Knowledge of the feedback cycle in collection processes. |
1 |
K0572
|
Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. |
2 |
K0573
|
Knowledge of the fundamentals of digital forensics to extract actionable intelligence. |
1 |
K0574
|
Knowledge of the impact of language analysis on on-net operator functions. |
1 |
K0575
|
Knowledge of the impacts of internal and external partner staffing estimates. |
1 |
K0576
|
Knowledge of the information environment. |
1 |
K0577
|
Knowledge of the intelligence frameworks, processes, and related systems. |
2 |
K0578
|
Knowledge of the intelligence requirements development and request for information processes. |
1 |
K0579
|
Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
3 |
K0580
|
Knowledge of the organization’s established format for collection plan. |
2 |
K0581
|
Knowledge of the organization’s planning, operations and targeting cycles. |
2 |
K0582
|
Knowledge of the organizational planning and staffing process. |
2 |
K0583
|
Knowledge of the organizational plans/directives/guidance that describe objectives. |
1 |
K0584
|
Knowledge of the organizational policies/procedures for temporary transfer of collection authority. |
2 |
K0585
|
Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. |
3 |
K0586
|
Knowledge of the outputs of course of action and exercise analysis. |
2 |
K0587
|
Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products. |
2 |
K0588
|
Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization. |
2 |
K0589
|
Knowledge of the process used to assess the performance and impact of operations. |
2 |
K0590
|
Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. |
2 |
K0591
|
Knowledge of the production responsibilities and organic analysis and production capabilities. |
1 |
K0592
|
Knowledge of the purpose and contribution of target templates. |
1 |
K0593
|
Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas. |
2 |
K0594
|
Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. |
2 |
K0595
|
Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks. |
1 |
K0596
|
Knowledge of the request for information process. |
3 |
K0597
|
Knowledge of the role of network operations in supporting and facilitating other organization operations. |
1 |
K0598
|
Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
6 |
K0599
|
Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
5 |
K0600
|
Knowledge of the structure, architecture, and design of modern wireless communications systems. |
2 |
K0601
|
Knowledge of the systems/architecture/communications used for coordination. |
1 |
K0602
|
Knowledge of collection disciplines and capabilities. |
1 |
K0603
|
Knowledge of the ways in which targets or threats use the Internet. |
6 |
K0604
|
Knowledge of threat and/or target systems. |
4 |
K0605
|
Knowledge of tipping, cueing, mixing, and redundancy. |
2 |
K0606
|
Knowledge of transcript development processes and techniques (e.g., verbatim, gist, summaries). |
1 |
K0607
|
Knowledge of translation processes and techniques. |
1 |
K0608
|
Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
2 |
K0609
|
Knowledge of virtual machine technologies. |
1 |
K0610
|
Knowledge of virtualization products (VMware, Virtual PC). |
7 |
K0611
|
WITHDRAWN: Integrated into K0131 |
0 |
K0612
|
Knowledge of what constitutes a “threat” to a network. |
8 |
K0613
|
Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations. |
2 |
K0614
|
Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
7 |
K0615
|
Knowledge of privacy disclosure statements based on current laws. |
2 |
K0616
|
Knowledge of continuous monitoring, its processes, and Continuous Diagnostics and Mitigation (CDM) program activities. |
0 |
K0617
|
Knowledge of Automated security control assessments |
0 |
K0618
|
Knowledge of hardware asset management and the value of tracking the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions. |
0 |
K0619
|
Knowledge of software asset management and the value of tracking the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions. |
0 |
K0620
|
Knowledge of continuous monitoring technologies and tools. |
0 |
K0621
|
Knowledge of risk scoring. |
0 |
K0622
|
Knowledge of controls related to the use, processing, storage, and transmission of data. |
6 |
K0623
|
Knowledge of risk assessment methodologies. |
0 |
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |
K0625
|
Knowledge that patching and software updates are impractical for some networked devices. |
0 |
K0626
|
Knowledge of secure update mechanisms. |
0 |
K0627
|
Knowledge of the importance of ingress filtering to protect against automated threats that rely on spoofed network addresses. |
0 |
K0628
|
Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations. |
3 |
K0629
|
Knowledge of white/black listing |
0 |
K0630
|
Knowledge of the latest intrusion techniques, methods and documented intrusions external to the organization. |
0 |