|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0036
|
Knowledge of human-computer interaction principles. |
12 |
|
K0108
|
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). |
11 |
|
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
|
K0120
|
Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
6 |
|
K0347
|
Knowledge and understanding of operational design. |
3 |
|
K0349
|
Knowledge of website types, administration, functions, and content management system (CMS). |
8 |
|
K0350
|
Knowledge of accepted organization planning systems. |
3 |
|
K0352
|
Knowledge of forms of intelligence support needs, topics, and focus areas. |
2 |
|
K0355
|
Knowledge of all-source reporting and dissemination procedures. |
1 |
|
K0358
|
Knowledge of analytical standards and the purpose of intelligence confidence levels. |
1 |
|
K0362
|
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
9 |
|
K0377
|
Knowledge of classification and control markings standards, policies and procedures. |
7 |
|
K0379
|
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
7 |
|
K0392
|
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
9 |
|
K0395
|
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
10 |
|
K0399
|
Knowledge of crisis action planning and time sensitive planning procedures. |
2 |
|
K0400
|
Knowledge of crisis action planning for cyber operations. |
3 |
|
K0403
|
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
5 |
|
K0405
|
Knowledge of current computer-based intrusion sets. |
5 |
|
K0408
|
Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects. |
3 |
|
K0411
|
Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
3 |
|
K0414
|
Knowledge of cyber operations support or enabling processes. |
4 |
|
K0417
|
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
10 |
|
K0422
|
Knowledge of deconfliction processes and procedures. |
3 |
|
K0427
|
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
8 |
|
K0431
|
Knowledge of evolving/emerging communications technologies. |
11 |
|
K0432
|
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
3 |
|
K0435
|
Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
5 |
|
K0436
|
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. |
8 |
|
K0440
|
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. |
8 |
|
K0444
|
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). |
11 |
|
K0445
|
Knowledge of how modern digital and telephony networks impact cyber operations. |
9 |
|
K0446
|
Knowledge of how modern wireless communications systems impact cyber operations. |
8 |
|
K0455
|
Knowledge of information security concepts, facilitating technologies and methods. |
3 |
|
K0456
|
Knowledge of intelligence capabilities and limitations. |
1 |
|
K0459
|
Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.). |
1 |
|
K0460
|
Knowledge of intelligence preparation of the environment and similar processes. |
5 |
|
K0463
|
Knowledge of intelligence requirements tasking systems. |
1 |
|
K0464
|
Knowledge of intelligence support to planning, execution, and assessment. |
6 |
|
K0465
|
Knowledge of internal and external partner cyber operations capabilities and tools. |
6 |
|
K0471
|
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
9 |
|
K0480
|
Knowledge of malware. |
8 |
|
K0494
|
Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. |
2 |
|
K0499
|
Knowledge of operations security. |
8 |
|
K0501
|
Knowledge of organization cyber operations programs, strategies, and resources. |
3 |
|
K0502
|
Knowledge of organization decision support tools and/or methods. |
2 |
|
K0504
|
Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
3 |
|
K0506
|
Knowledge of organization objectives, leadership priorities, and decision-making risks. |
3 |
|
K0507
|
Knowledge of organization or partner exploitation of digital networks. |
6 |
|
K0508
|
Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
3 |
|
K0511
|
Knowledge of organizational hierarchy and cyber decision-making processes. |
6 |
|
K0512
|
Knowledge of organizational planning concepts. |
3 |
|
K0514
|
Knowledge of organizational structures and associated intelligence capabilities. |
3 |
|
K0517
|
Knowledge of post implementation review (PIR) approval process. |
1 |
|
K0518
|
Knowledge of planning activity initiation. |
2 |
|
K0519
|
Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning. |
2 |
|
K0525
|
Knowledge of required intelligence planning products associated with cyber operational planning. |
2 |
|
K0538
|
Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities |
3 |
|
K0556
|
Knowledge of telecommunications fundamentals. |
6 |
|
K0560
|
Knowledge of the basic structure, architecture, and design of modern communication networks. |
10 |
|
K0561
|
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
8 |
|
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |
|
K0566
|
Knowledge of the critical information requirements and how they're used in planning. |
2 |
|
K0572
|
Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. |
2 |
|
K0575
|
Knowledge of the impacts of internal and external partner staffing estimates. |
1 |
|
K0577
|
Knowledge of the intelligence frameworks, processes, and related systems. |
2 |
|
K0578
|
Knowledge of the intelligence requirements development and request for information processes. |
1 |
|
K0582
|
Knowledge of the organizational planning and staffing process. |
2 |
|
K0585
|
Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. |
3 |
|
K0586
|
Knowledge of the outputs of course of action and exercise analysis. |
2 |
|
K0589
|
Knowledge of the process used to assess the performance and impact of operations. |
2 |
|
K0590
|
Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. |
2 |
|
K0591
|
Knowledge of the production responsibilities and organic analysis and production capabilities. |
1 |
|
K0593
|
Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas. |
2 |
|
K0594
|
Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. |
2 |
|
K0595
|
Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks. |
1 |
|
K0598
|
Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
6 |
|
K0599
|
Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
5 |
|
K0602
|
Knowledge of collection disciplines and capabilities. |
1 |
|
K0603
|
Knowledge of the ways in which targets or threats use the Internet. |
6 |
|
K0610
|
Knowledge of virtualization products (VMware, Virtual PC). |
7 |
|
K0612
|
Knowledge of what constitutes a “threat” to a network. |
8 |
|
K0614
|
Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
7 |