|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0108
|
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). |
11 |
|
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
|
K0131
|
Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
3 |
|
K0142
|
Knowledge of collection management processes, capabilities, and limitations. |
4 |
|
K0143
|
Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
3 |
|
K0177
|
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
12 |
|
K0224
|
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. |
5 |
|
K0349
|
Knowledge of website types, administration, functions, and content management system (CMS). |
8 |
|
K0351
|
Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
3 |
|
K0354
|
Knowledge of relevant reporting and dissemination procedures. |
1 |
|
K0362
|
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
9 |
|
K0368
|
Knowledge of implants that enable cyber collection and/or preparation activities. |
1 |
|
K0371
|
Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis). |
1 |
|
K0376
|
Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
1 |
|
K0379
|
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
7 |
|
K0388
|
Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
1 |
|
K0393
|
Knowledge of common networking devices and their configurations. |
1 |
|
K0394
|
Knowledge of common reporting databases and tools. |
1 |
|
K0397
|
Knowledge of security concepts in operating systems (e.g., Linux, Unix.) |
1 |
|
K0417
|
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
10 |
|
K0418
|
Knowledge of data flow process for terminal or environment collection. |
1 |
|
K0430
|
Knowledge of evasion strategies and techniques. |
2 |
|
K0443
|
WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143) |
1 |
|
K0444
|
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). |
11 |
|
K0447
|
Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
1 |
|
K0451
|
Knowledge of identification and reporting processes. |
1 |
|
K0470
|
Knowledge of Internet and routing protocols. |
1 |
|
K0471
|
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
9 |
|
K0473
|
Knowledge of intrusion sets. |
3 |
|
K0484
|
Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
1 |
|
K0487
|
Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
4 |
|
K0489
|
Knowledge of network topology. |
1 |
|
K0509
|
Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. |
1 |
|
K0510
|
Knowledge of organizational and partner policies, tools, capabilities, and procedures. |
1 |
|
K0523
|
Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities. |
1 |
|
K0529
|
Knowledge of scripting |
1 |
|
K0535
|
Knowledge of strategies and tools for target research. |
1 |
|
K0544
|
Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
2 |
|
K0557
|
Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.). |
1 |
|
K0559
|
Knowledge of the basic structure, architecture, and design of converged applications. |
2 |
|
K0560
|
Knowledge of the basic structure, architecture, and design of modern communication networks. |
10 |
|
K0608
|
Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
2 |