|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0036
|
Knowledge of human-computer interaction principles. |
12 |
|
K0058
|
Knowledge of network traffic analysis methods. |
10 |
|
K0108
|
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). |
11 |
|
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
|
K0177
|
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
12 |
|
K0221
|
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
3 |
|
K0349
|
Knowledge of website types, administration, functions, and content management system (CMS). |
8 |
|
K0357
|
WITHDRAWN: Knowledge of analytical constructs and their use in assessing the operational environment. (See K0224) |
2 |
|
K0362
|
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
9 |
|
K0377
|
Knowledge of classification and control markings standards, policies and procedures. |
7 |
|
K0392
|
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
9 |
|
K0395
|
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
10 |
|
K0405
|
Knowledge of current computer-based intrusion sets. |
5 |
|
K0409
|
Knowledge of cyber intelligence/information collection capabilities and repositories. |
4 |
|
K0410
|
Knowledge of cyber laws and their effect on Cyber planning. |
2 |
|
K0427
|
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
8 |
|
K0431
|
Knowledge of evolving/emerging communications technologies. |
11 |
|
K0436
|
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. |
8 |
|
K0437
|
Knowledge of general Supervisory control and data acquisition (SCADA) system components. |
4 |
|
K0440
|
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. |
8 |
|
K0444
|
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). |
11 |
|
K0445
|
Knowledge of how modern digital and telephony networks impact cyber operations. |
9 |
|
K0446
|
Knowledge of how modern wireless communications systems impact cyber operations. |
8 |
|
K0449
|
Knowledge of how to extract, analyze, and use metadata. |
7 |
|
K0457
|
Knowledge of intelligence confidence levels. |
3 |
|
K0458
|
Knowledge of intelligence disciplines. |
3 |
|
K0460
|
Knowledge of intelligence preparation of the environment and similar processes. |
5 |
|
K0464
|
Knowledge of intelligence support to planning, execution, and assessment. |
6 |
|
K0465
|
Knowledge of internal and external partner cyber operations capabilities and tools. |
6 |
|
K0469
|
Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. |
3 |
|
K0471
|
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
9 |
|
K0480
|
Knowledge of malware. |
8 |
|
K0507
|
Knowledge of organization or partner exploitation of digital networks. |
6 |
|
K0511
|
Knowledge of organizational hierarchy and cyber decision-making processes. |
6 |
|
K0516
|
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
10 |
|
K0533
|
Knowledge of specific target identifiers, and their usage. |
2 |
|
K0542
|
Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). |
2 |
|
K0549
|
Knowledge of target vetting and validation procedures. |
3 |
|
K0551
|
Knowledge of targeting cycles. |
3 |
|
K0556
|
Knowledge of telecommunications fundamentals. |
6 |
|
K0560
|
Knowledge of the basic structure, architecture, and design of modern communication networks. |
10 |
|
K0561
|
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
8 |
|
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |
|
K0577
|
Knowledge of the intelligence frameworks, processes, and related systems. |
2 |
|
K0598
|
Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
6 |
|
K0603
|
Knowledge of the ways in which targets or threats use the Internet. |
6 |
|
K0604
|
Knowledge of threat and/or target systems. |
4 |
|
K0610
|
Knowledge of virtualization products (VMware, Virtual PC). |
7 |
|
K0612
|
Knowledge of what constitutes a “threat” to a network. |
8 |
|
K0614
|
Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
7 |