|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0036
|
Knowledge of human-computer interaction principles. |
12 |
|
K0058
|
Knowledge of network traffic analysis methods. |
10 |
|
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
|
K0177
|
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
12 |
|
K0353
|
Knowledge of possible circumstances that would result in changing collection management authorities. |
2 |
|
K0361
|
Knowledge of asset availability, capabilities and limitations. |
2 |
|
K0364
|
Knowledge of available databases and tools necessary to assess appropriate collection tasking. |
2 |
|
K0380
|
Knowledge of collaborative tools and environments. |
2 |
|
K0382
|
Knowledge of collection capabilities and limitations. |
2 |
|
K0383
|
Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan. |
2 |
|
K0386
|
Knowledge of collection management tools. |
2 |
|
K0387
|
Knowledge of collection planning process and collection plan. |
2 |
|
K0390
|
Knowledge of collection strategies. |
2 |
|
K0392
|
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
9 |
|
K0395
|
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
10 |
|
K0401
|
Knowledge of criteria for evaluating collection products. |
2 |
|
K0404
|
Knowledge of current collection requirements. |
2 |
|
K0405
|
Knowledge of current computer-based intrusion sets. |
5 |
|
K0412
|
Knowledge of cyber lexicon/terminology |
2 |
|
K0417
|
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
10 |
|
K0419
|
Knowledge of database administration and maintenance. |
2 |
|
K0425
|
Knowledge of different organization objectives at all levels, including subordinate, lateral and higher. |
2 |
|
K0427
|
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
8 |
|
K0431
|
Knowledge of evolving/emerging communications technologies. |
11 |
|
K0435
|
Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
5 |
|
K0440
|
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. |
8 |
|
K0444
|
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). |
11 |
|
K0445
|
Knowledge of how modern digital and telephony networks impact cyber operations. |
9 |
|
K0446
|
Knowledge of how modern wireless communications systems impact cyber operations. |
8 |
|
K0448
|
Knowledge of how to establish priorities for resources. |
2 |
|
K0449
|
Knowledge of how to extract, analyze, and use metadata. |
7 |
|
K0453
|
Knowledge of indications and warning. |
2 |
|
K0454
|
Knowledge of information needs. |
2 |
|
K0467
|
Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities). |
2 |
|
K0471
|
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
9 |
|
K0474
|
Knowledge of key cyber threat actors and their equities. |
2 |
|
K0475
|
Knowledge of key factors of the operational environment and threat. |
2 |
|
K0477
|
Knowledge of leadership's Intent and objectives. |
2 |
|
K0480
|
Knowledge of malware. |
8 |
|
K0482
|
Knowledge of methods for ascertaining collection asset posture and availability. |
2 |
|
K0492
|
Knowledge of non-traditional collection methodologies. |
2 |
|
K0495
|
Knowledge of ongoing and future operations. |
2 |
|
K0496
|
Knowledge of operational asset constraints. |
2 |
|
K0498
|
Knowledge of operational planning processes. |
2 |
|
K0503
|
Knowledge of organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact. |
1 |
|
K0505
|
Knowledge of organization objectives and associated demand on collection management. |
2 |
|
K0513
|
Knowledge of organizational priorities, legal authorities and requirements submission processes. |
2 |
|
K0516
|
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
10 |
|
K0521
|
Knowledge of priority information, how it is derived, where it is published, how to access, etc. |
2 |
|
K0522
|
Knowledge of production exploitation and dissemination needs and architectures. |
1 |
|
K0526
|
Knowledge of research strategies and knowledge management. |
2 |
|
K0527
|
Knowledge of risk management and mitigation strategies. |
2 |
|
K0552
|
Knowledge of tasking mechanisms. |
2 |
|
K0553
|
Knowledge of tasking processes for organic and subordinate collection assets. |
1 |
|
K0554
|
Knowledge of tasking, collection, processing, exploitation and dissemination. |
2 |
|
K0558
|
Knowledge of the available tools and applications associated with collection requirements and collection management. |
2 |
|
K0560
|
Knowledge of the basic structure, architecture, and design of modern communication networks. |
10 |
|
K0561
|
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
8 |
|
K0562
|
Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes. |
2 |
|
K0563
|
Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities. |
2 |
|
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |
|
K0569
|
Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture. |
2 |
|
K0570
|
Knowledge of the factors of threat that could impact collection operations. |
2 |
|
K0579
|
Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
3 |
|
K0580
|
Knowledge of the organization’s established format for collection plan. |
2 |
|
K0581
|
Knowledge of the organization’s planning, operations and targeting cycles. |
2 |
|
K0583
|
Knowledge of the organizational plans/directives/guidance that describe objectives. |
1 |
|
K0584
|
Knowledge of the organizational policies/procedures for temporary transfer of collection authority. |
2 |
|
K0587
|
Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products. |
2 |
|
K0588
|
Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization. |
2 |
|
K0596
|
Knowledge of the request for information process. |
3 |
|
K0601
|
Knowledge of the systems/architecture/communications used for coordination. |
1 |
|
K0605
|
Knowledge of tipping, cueing, mixing, and redundancy. |
2 |
|
K0610
|
Knowledge of virtualization products (VMware, Virtual PC). |
7 |
|
K0612
|
Knowledge of what constitutes a “threat” to a network. |
8 |
|
K0613
|
Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations. |
2 |